Search - Working Groups Access content directly

Filter your results

12 results
Image document

Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases

Yossif Shalabi , Ehud Gudes
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.3-19, ⟨10.1007/978-3-319-61176-1_1⟩
Conference papers hal-01684347v1
Image document

The Effect of the Existence of Defective Items in Assembly Operations

Moshe Eben-Chaime
IFIP International Conference on Advances in Production Management Systems (APMS), Sep 2014, Ajaccio, France. pp.449-454, ⟨10.1007/978-3-662-44733-8_56⟩
Conference papers hal-01387287v1
Image document

Transfer Learning for Content-Based Recommender Systems Using Tree Matching

Naseem Biadsy , Lior Rokach , Armin Shmilovici
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.387-399
Conference papers hal-01506793v1
Image document

Data Integrity Verification in Column-Oriented NoSQL Databases

Grisha Weintraub , Ehud Gudes
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.165-181, ⟨10.1007/978-3-319-95729-6_11⟩
Conference papers hal-01954409v1
Image document

Efficient and Enhanced Solutions for Content Sharing in DRM Systems

Michal Davidson , Ehud Gudes , Tamir Tassa
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.373-381, ⟨10.1007/978-3-662-43936-4_25⟩
Conference papers hal-01284873v1
Image document

Publishing Differentially Private Medical Events Data

Sigal Shaked , Lior Rokach
International Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.219-235, ⟨10.1007/978-3-319-45507-5_15⟩
Conference papers hal-01635024v1
Image document

Simulation Analysis of Sweet Pepper Harvesting Operations

Zohar Elkoby , Bert van ’t Ooster , Yael Edan
IFIP International Conference on Advances in Production Management Systems (APMS), Sep 2014, Ajaccio, France. pp.441-448, ⟨10.1007/978-3-662-44733-8_55⟩
Conference papers hal-01387286v1
Image document

Private and Secure Secret Shared MapReduce (Extended Abstract)

Shlomi Dolev , Yin Li , Shantanu Sharma
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.151-160, ⟨10.1007/978-3-319-41483-6_11⟩
Conference papers hal-01633670v1
Image document

PUA Detection Based on Bundle Installer Characteristics

Amir Lukach , Ehud Gudes , Asaf Shabtai
34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.261-273, ⟨10.1007/978-3-030-49669-2_15⟩
Conference papers hal-03243639v1
Image document

Code Type Revealing Using Experiments Framework

Rami Sharon , Ehud Gudes
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.193-206, ⟨10.1007/978-3-642-31540-4_15⟩
Conference papers hal-01534762v1
Image document

An ABAC Model with Trust and Gossiping (ABAC–TG) for Online Social Networks

Adi Swissa , Ehud Gudes
35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.377-392, ⟨10.1007/978-3-030-81242-3_22⟩
Conference papers hal-03677023v1
Image document

A Topology Based Flow Model for Computing Domain Reputation

Igor Mishsky , Nurit Gal-Oz , Ehud Gudes
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.277-292, ⟨10.1007/978-3-319-20810-7_20⟩
Conference papers hal-01745814v1