1973 …2024

Research activity per year

Filter
Chapter

Search results

  • 2004

    A secure workflow model based on distributed constrained role and task assignment for the internet

    Moodahi, I., Gudes, E., Lavee, O. & Meisels, A., 1 Jan 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lopez, J., Qing, S. & Okamoto, E. (eds.). Springer Verlag, p. 171-186 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3269).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    7 Scopus citations
  • A structure preserving database encryption scheme

    Elovici, Y., Waisenberg, R., Shmueli, E. & Gudes, E., 1 Jan 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Jonker, W. & Petkovic, M. (eds.). Springer Verlag, p. 28-40 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3178).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    27 Scopus citations