Search - IFIP Open Digital Library Access content directly

Filter your results

12 results
hal_authIdPerson_i : 978093
Image document

Advanced Flow Models for Computing the Reputation of Internet Domains

Hussien Othman , Ehud Gudes , Nurit Gal-Oz
11th IFIP International Conference on Trust Management (TM), Jun 2017, Gothenburg, Sweden. pp.119-134, ⟨10.1007/978-3-319-59171-1_10⟩
Conference papers hal-01651160v1
Image document

Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases

Yossif Shalabi , Ehud Gudes
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.3-19, ⟨10.1007/978-3-319-61176-1_1⟩
Conference papers hal-01684347v1
Image document

Sharing-Habits Based Privacy Control in Social Networks

Silvie Levy , Ehud Gudes , Nurit Gal-Oz
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.217-232, ⟨10.1007/978-3-319-41483-6_16⟩
Conference papers hal-01633684v1
Image document

Reputation - from Social Perception to Internet Security

Ehud Gudes
9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. pp.3-10, ⟨10.1007/978-3-319-18491-3_1⟩
Conference papers hal-01416199v1

Trust Management V

Ian Wakeman , Ehud Gudes , Christian Damsgaard Jensen , Jason Crampton
Springer, AICT-358, 2011, IFIP Advances in Information and Communication Technology, ⟨10.1007/978-3-642-22200-9⟩
Books hal-01568672v1
Image document

Identifying Knots of Trust in Virtual Communities

Nurit Gal-Oz , Ran Yahalom , Ehud Gudes
5th International Conference on Trust Management (TM), Jun 2011, Copenhagen, Denmark. pp.67-81, ⟨10.1007/978-3-642-22200-9_8⟩
Conference papers hal-01568691v1
Image document

Code Type Revealing Using Experiments Framework

Rami Sharon , Ehud Gudes
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.193-206, ⟨10.1007/978-3-642-31540-4_15⟩
Conference papers hal-01534762v1
Image document

Data Integrity Verification in Column-Oriented NoSQL Databases

Grisha Weintraub , Ehud Gudes
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.165-181, ⟨10.1007/978-3-319-95729-6_11⟩
Conference papers hal-01954409v1
Image document

Efficient and Enhanced Solutions for Content Sharing in DRM Systems

Michal Davidson , Ehud Gudes , Tamir Tassa
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.373-381, ⟨10.1007/978-3-662-43936-4_25⟩
Conference papers hal-01284873v1

Trust Management VIII

Jianying Zhou , Nurit Gal-Oz , Jie Zhang , Ehud Gudes
Springer, AICT-430, 2014, IFIP Advances in Information and Communication Technology, 978-3-662-43812-1. ⟨10.1007/978-3-662-43813-8⟩
Books hal-01381694v1
Image document

Knots Maintenance for Optimal Management of Trust Relations

Libi Gur , Nurit Gal-Oz , Ehud Gudes
8th IFIP International Conference on Trust Management (IFIPTM), Jul 2014, Singapore, Singapore. pp.189-204, ⟨10.1007/978-3-662-43813-8_13⟩
Conference papers hal-01381688v1
Image document

A Topology Based Flow Model for Computing Domain Reputation

Igor Mishsky , Nurit Gal-Oz , Ehud Gudes
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.277-292, ⟨10.1007/978-3-319-20810-7_20⟩
Conference papers hal-01745814v1