Search - IFIP Open Digital Library Access content directly

Filter your results

27 results
Structure: Internal structure identifier : 300759
Image document

Advanced Flow Models for Computing the Reputation of Internet Domains

Hussien Othman , Ehud Gudes , Nurit Gal-Oz
11th IFIP International Conference on Trust Management (TM), Jun 2017, Gothenburg, Sweden. pp.119-134, ⟨10.1007/978-3-319-59171-1_10⟩
Conference papers hal-01651160v1
Image document

Private and Secure Secret Shared MapReduce (Extended Abstract)

Shlomi Dolev , Yin Li , Shantanu Sharma
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.151-160, ⟨10.1007/978-3-319-41483-6_11⟩
Conference papers hal-01633670v1
Image document

PUA Detection Based on Bundle Installer Characteristics

Amir Lukach , Ehud Gudes , Asaf Shabtai
34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.261-273, ⟨10.1007/978-3-030-49669-2_15⟩
Conference papers hal-03243639v1
Image document

Simulation Analysis of Sweet Pepper Harvesting Operations

Zohar Elkoby , Bert van ’t Ooster , Yael Edan
IFIP International Conference on Advances in Production Management Systems (APMS), Sep 2014, Ajaccio, France. pp.441-448, ⟨10.1007/978-3-662-44733-8_55⟩
Conference papers hal-01387286v1
Image document

An ABAC Model with Trust and Gossiping (ABAC–TG) for Online Social Networks

Adi Swissa , Ehud Gudes
35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.377-392, ⟨10.1007/978-3-030-81242-3_22⟩
Conference papers hal-03677023v1
Image document

Reputation - from Social Perception to Internet Security

Ehud Gudes
9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. pp.3-10, ⟨10.1007/978-3-319-18491-3_1⟩
Conference papers hal-01416199v1
Image document

Attacking and Defending Dynamic Analysis System-Calls Based IDS

Ishai Rosenberg , Ehud Gudes
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.103-119, ⟨10.1007/978-3-319-45931-8_7⟩
Conference papers hal-01639619v1
Image document

Load-Balancing Adaptive Clustering Refinement Algorithm for Wireless Sensor Network Clusters

Gal Oren , Leonid Barenboim , Harel Levin
15th International Conference on Wired/Wireless Internet Communication (WWIC), Jun 2017, St. Petersburg, Russia. pp.157-173, ⟨10.1007/978-3-319-61382-6_13⟩
Conference papers hal-01675417v1
Image document

Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases

Yossif Shalabi , Ehud Gudes
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.3-19, ⟨10.1007/978-3-319-61176-1_1⟩
Conference papers hal-01684347v1
Image document

Schemes for Privately Computing Trust and Reputation

Nurit Gal-Oz , Niv Gilboa , Ehud Gudes
4th IFIP WG 11.11 International on Trust Management (TM), Jun 2010, Morioka, Japan. pp.1-16, ⟨10.1007/978-3-642-13446-3_1⟩
Conference papers hal-01061315v1

Trust Management V

Ian Wakeman , Ehud Gudes , Christian Damsgaard Jensen , Jason Crampton
Springer, AICT-358, 2011, IFIP Advances in Information and Communication Technology, ⟨10.1007/978-3-642-22200-9⟩
Books hal-01568672v1
Image document

Comparative Evaluation of Node-Link and Sankey Diagrams for the Cyber Security Domain

Rotem Blinder , Ofer Biller , Adir Even , Oded Sofer , Noam Tractinsky , et al.
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.497-518, ⟨10.1007/978-3-030-29381-9_31⟩
Conference papers hal-02544537v1
Image document

A Role and Trust Access Control Model for Preserving Privacy and Image Anonymization in Social Networks

Nadav Voloch , Priel Nissim , Mor Elmakies , Ehud Gudes
13th IFIP International Conference on Trust Management (IFIPTM), Jul 2019, Copenhagen, Denmark. pp.19-27, ⟨10.1007/978-3-030-33716-2_2⟩
Conference papers hal-03182609v1
Image document

Identifying Knots of Trust in Virtual Communities

Nurit Gal-Oz , Ran Yahalom , Ehud Gudes
5th International Conference on Trust Management (TM), Jun 2011, Copenhagen, Denmark. pp.67-81, ⟨10.1007/978-3-642-22200-9_8⟩
Conference papers hal-01568691v1
Image document

Evaluating Multivariate Visualizations as Multi-objective Decision Aids

Meirav Taieb-Maimon , Lior Limonad , David Amid , David Boaz , Ateret Anaby-Tavor
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.419-436, ⟨10.1007/978-3-642-40483-2_29⟩
Conference papers hal-01497451v1
Image document

Code Type Revealing Using Experiments Framework

Rami Sharon , Ehud Gudes
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.193-206, ⟨10.1007/978-3-642-31540-4_15⟩
Conference papers hal-01534762v1
Image document

Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic

Mayank Agarwal , Rami Puzis , Jawad Haj-Yahya , Polina Zilberman , Yuval Elovici
33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.216-230, ⟨10.1007/978-3-319-99828-2_16⟩
Conference papers hal-02023723v1
Image document

The Effect of the Existence of Defective Items in Assembly Operations

Moshe Eben-Chaime
IFIP International Conference on Advances in Production Management Systems (APMS), Sep 2014, Ajaccio, France. pp.449-454, ⟨10.1007/978-3-662-44733-8_56⟩
Conference papers hal-01387287v1
Image document

Transfer Learning for Content-Based Recommender Systems Using Tree Matching

Naseem Biadsy , Lior Rokach , Armin Shmilovici
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.387-399
Conference papers hal-01506793v1
Image document

Data Integrity Verification in Column-Oriented NoSQL Databases

Grisha Weintraub , Ehud Gudes
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.165-181, ⟨10.1007/978-3-319-95729-6_11⟩
Conference papers hal-01954409v1
Image document

Efficient and Enhanced Solutions for Content Sharing in DRM Systems

Michal Davidson , Ehud Gudes , Tamir Tassa
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.373-381, ⟨10.1007/978-3-662-43936-4_25⟩
Conference papers hal-01284873v1
Image document

Liability Exposure when 3D-Printed Parts Fall from the Sky

Lynne Graves , Mark Yampolskiy , Wayne King , Sofia Belikovetsky , Yuval Elovici
12th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2018, Arlington, VA, United States. pp.39-64, ⟨10.1007/978-3-030-04537-1_3⟩
Conference papers hal-02076297v1

Trust Management VIII

Jianying Zhou , Nurit Gal-Oz , Jie Zhang , Ehud Gudes
Springer, AICT-430, 2014, IFIP Advances in Information and Communication Technology, 978-3-662-43812-1. ⟨10.1007/978-3-662-43813-8⟩
Books hal-01381694v1
Image document

Publishing Differentially Private Medical Events Data

Sigal Shaked , Lior Rokach
International Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.219-235, ⟨10.1007/978-3-319-45507-5_15⟩
Conference papers hal-01635024v1
Image document

Knots Maintenance for Optimal Management of Trust Relations

Libi Gur , Nurit Gal-Oz , Ehud Gudes
8th IFIP International Conference on Trust Management (IFIPTM), Jul 2014, Singapore, Singapore. pp.189-204, ⟨10.1007/978-3-662-43813-8_13⟩
Conference papers hal-01381688v1
Image document

Let Us Talk to People, Not to Computers": Obstacles for Establishing Relationships and Trust in Social Workers’ Online Communities of Practice

Azi Lev-On , Odelia Adler
5th International Conference on Electronic Participation (ePart), Sep 2013, Koblenz, Germany. pp.80-94, ⟨10.1007/978-3-642-40346-0_8⟩
Conference papers hal-01491233v1
Image document

A Topology Based Flow Model for Computing Domain Reputation

Igor Mishsky , Nurit Gal-Oz , Ehud Gudes
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.277-292, ⟨10.1007/978-3-319-20810-7_20⟩
Conference papers hal-01745814v1