{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T18:56:36Z","timestamp":1767898596907,"version":"3.49.0"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030224950","type":"print"},{"value":"9783030224967","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22496-7_6","type":"book-chapter","created":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T13:02:34Z","timestamp":1559739754000},"page":"91-107","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Using Trusted Execution Environments for Secure Stream Processing of Medical Data"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3455-7563","authenticated-orcid":false,"given":"Carlos","family":"Segarra","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7183-6257","authenticated-orcid":false,"given":"Ricard","family":"Delgado-Gonzalo","sequence":"additional","affiliation":[]},{"given":"Mathieu","family":"Lemay","sequence":"additional","affiliation":[]},{"given":"Pierre-Louis","family":"Aublin","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Pietzuch","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1493-6603","authenticated-orcid":false,"given":"Valerio","family":"Schiavoni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,6]]},"reference":[{"key":"6_CR1","unstructured":"ARM TrustZone Developer. https:\/\/developer.arm.com\/technologies\/trustzone"},{"key":"6_CR2","unstructured":"Coming Soon: Amazon EC2 C5 Instances, the next generation of Compute Optimized instances. http:\/\/amzn.to\/2nmIiH9"},{"key":"6_CR3","unstructured":"Data-in-use protection on IBM Cloud using Intel SGX. https:\/\/www.ibm.com\/blogs\/bluemix\/2018\/05\/data-use-protection-ibm-cloud-using-intel-sgx\/"},{"key":"6_CR4","unstructured":"Docker Documentation: Docker Compose. https:\/\/docs.docker.com\/compose\/"},{"key":"6_CR5","unstructured":"Docker: What is a Container? https:\/\/www.docker.com\/resources\/what-container"},{"key":"6_CR6","unstructured":"Eclipse Paho MQTT Implementation. https:\/\/www.eclipse.org\/paho\/"},{"key":"6_CR7","unstructured":"Intel Software Guard Extension for Linux OS Driver on GitHub. https:\/\/github.com\/intel\/linux-sgx-driver"},{"key":"6_CR8","unstructured":"MQTT Communication Protocol. http:\/\/mqtt.org\/"},{"key":"6_CR9","unstructured":"Open Portable Trusted Execution Environment. https:\/\/www.op-tee.org"},{"key":"6_CR10","unstructured":"RDD Programming Guide. https:\/\/spark.apache.org\/docs\/latest\/rdd-programming-guide.html"},{"key":"6_CR11","unstructured":"SGX-LKL on Github. https:\/\/github.com\/lsds\/sgx-lkl"},{"key":"6_CR12","unstructured":"Spark Documentation: REST API. https:\/\/spark.apache.org\/docs\/latest\/monitoring.html#rest-api"},{"key":"6_CR13","unstructured":"Spectre Attack SGX on Github. https:\/\/github.com\/lsds\/spectre-attack-sgx"},{"key":"6_CR14","unstructured":"The Scala Programming Language. https:\/\/www.scala-lang.org\/"},{"key":"6_CR15","unstructured":"D3.2 SecureCloud: Specification and Implementation of Reusable Secure Microservices (2017). https:\/\/www.securecloudproject.eu\/wp-content\/uploads\/D3.2.pdf"},{"key":"6_CR16","unstructured":"Apache Foundation: Spark streaming programming guide. https:\/\/spark.apache.org\/docs\/2.2.0\/streaming-programming-guide.html"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Armbrust, M., et al.: Structured streaming: a declarative API for real-time applications in Apache Spark. In: ACM SIGMOD 2018 (2018)","DOI":"10.1145\/3183713.3190664"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Armbrust, M., et al.: Spark SQL: relational data processing in Spark. In: ACM SIGMOD 2015 (2015)","DOI":"10.1145\/2723372.2742797"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Barbosa, M., et al.: SAFETHINGS: data security by design in the IoT. In: IEEE EDCC 2017 (2017)","DOI":"10.1109\/EDCC.2017.33"},{"key":"6_CR20","unstructured":"Costan, V., Devadas, S.: Intel SGX explained. IACR 2016 (2016)"},{"key":"6_CR21","unstructured":"Darrow, B.: Google is first in line to get Intel\u2019s next-gen server chip. http:\/\/for.tn\/2lLdUtD"},{"key":"6_CR22","unstructured":"Gartner: Leading the IoT Gartner Insights on how to lead in a connected world (2017)"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: ACM STOC 2009 (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1007\/978-3-642-32009-5_49","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"C Gentry","year":"2012","unstructured":"Gentry, C., Halevi, S., Smart, N.P.: Homomorphic evaluation of the AES circuit. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 850\u2013867. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_49"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"G\u00f6ttel, C., et al.: Security, performance and energy trade-offs of hardware-assisted memory protection mechanisms. In: IEEE SRDS 2018 (2018)","DOI":"10.1109\/SRDS.2018.00024"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Gueron, S.: A memory encryption engine suitable for general purpose processors. IACR 2016","DOI":"10.1109\/MSP.2016.124"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Havet, A., et al.: SecureStreams: a reactive middleware framework for secure data stream processing. In: ACM DES 2017 (2017)","DOI":"10.1109\/IC2E.2017.50"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Koliousis, A., et al.: SABER: window-based hybrid stream processing for heterogeneous architectures. In: ACM SIGMOD 2016 (2016)","DOI":"10.1145\/2882903.2882906"},{"key":"6_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-0690-6","volume-title":"Signal and Image Processing in Medical Applications","author":"A Kumar","year":"2016","unstructured":"Kumar, A., Shaik, F., Rahim, B.A., Kumar, D.S.: Signal and Image Processing in Medical Applications. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-981-10-0690-6"},{"key":"6_CR30","doi-asserted-by":"publisher","first-page":"1043","DOI":"10.1161\/01.CIR.93.5.1043","volume":"93","author":"M Malik","year":"1996","unstructured":"Malik, M.: Heart rate variability: standards of measurement, physiological interpretation, and clinical use. Circulation 93, 1043\u20131065 (1996)","journal-title":"Circulation"},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"McKeen, F., et al.: Innovative instructions and software model for isolated execution. In: HASP 2013 (2013)","DOI":"10.1145\/2487726.2488368"},{"key":"6_CR32","unstructured":"Miao, H., Park, H., Jeon, M., Pekhimenko, G., McKinley, K.S., Lin, F.X.: StreamBox: modern stream processing on a multicore machine. In: USENIX ATC 2017 (2017)"},{"key":"6_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48910-X_16"},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"Par\u00e1k, J., Tarniceriu, A., Renevey, P., Bertschi, M., Delgado-Gonzalo, R., Korhonen, I.: Evaluation of the beat-to-beat detection accuracy of PulseOn wearable optical heart rate monitor. In: IEEE EMBC 2015 (2015)","DOI":"10.1109\/EMBC.2015.7320273"},{"key":"6_CR35","doi-asserted-by":"crossref","unstructured":"Puthal, D., Nepal, S., Ranjan, R., Chen, J.: DPBSV - an efficient and secure scheme for big sensing data stream. In: IEEE TRUSTCOM 2015 (2015)","DOI":"10.1109\/Trustcom.2015.381"},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"Renevey, P., et al.: Respiratory and cardiac monitoring at night using a wrist wearable optical system. In: IEEE EMBC 2018 (2018)","DOI":"10.1109\/EMBC.2018.8512881"},{"key":"6_CR37","unstructured":"Russinovich, M.: Introducing Azure Confidential Computing. https:\/\/azure.microsoft.com\/en-us\/blog\/introducing-azure-confidential-computing\/"},{"key":"6_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-60876-1_1","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"M Schwarz","year":"2017","unstructured":"Schwarz, M., Weiser, S., Gruss, D., Maurice, C., Mangard, S.: Malware guard extension: using SGX to conceal cache attacks. In: Polychronakis, M., Meier, M. (eds.) DIMVA 2017. LNCS, vol. 10327, pp. 3\u201324. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-60876-1_1"},{"key":"6_CR39","doi-asserted-by":"publisher","first-page":"258","DOI":"10.3389\/fpubh.2017.00258","volume":"5","author":"F Shaffer","year":"2017","unstructured":"Shaffer, F., Ginsberg, J.P.: An overview of heart rate variability metrics and norms. Front. Pub. Health 5, 258 (2017). https:\/\/doi.org\/10.3389\/fpubh.2017.00258","journal-title":"Front. Pub. Health"},{"key":"6_CR40","doi-asserted-by":"crossref","unstructured":"Stephen, J.J., Savvides, S., Sundaram, V., Ardekani, M.A., Eugster, P.: STYX: stream processing with trustworthy cloud-based execution. In: ACM SoCC 2016 (2016)","DOI":"10.1145\/2987550.2987574"},{"key":"6_CR41","doi-asserted-by":"crossref","unstructured":"Tetali, S.D., Lesani, M., Majumdar, R., Millstein, T.: MrCrypt: static analysis for secure cloud computations. In: ACM OOPSLA 2013 (2013)","DOI":"10.1145\/2509136.2509554"},{"key":"6_CR42","unstructured":"Van Bulck, J., et al.: Foreshadow: extracting the keys to the Intel SGX kingdom with transient out-of-order execution. In: USENIX Security 2018 (2018)"},{"key":"6_CR43","doi-asserted-by":"crossref","unstructured":"Van Zaen, J., Ch\u00e9telat, O., Lemay, M., Calvo, E.M., Delgado-Gonzalo, R.: Classification of cardiac arrhythmias from single lead ECG with a convolutional recurrent neural network. In: BIOSTEC 2019 (2019)","DOI":"10.5220\/0007347900330041"},{"key":"6_CR44","doi-asserted-by":"crossref","unstructured":"Venkataraman, S., et al.: Drizzle: fast and adaptable stream processing at scale. In: ACM OSP 2017 (2017)","DOI":"10.1145\/3132747.3132750"},{"key":"6_CR45","doi-asserted-by":"publisher","first-page":"094006","DOI":"10.1088\/1361-6579\/aad9ed","volume":"39","author":"Z Xiong","year":"2018","unstructured":"Xiong, Z., Nash, M., Cheng, E., Fedorov, V., Stiles, M., Zhao, J.: ECG signal classification for the detection of cardiac arrhythmias using a convolutional recurrent neural network. Physiol. Measur. 39, 094006 (2018)","journal-title":"Physiol. Measur."},{"key":"6_CR46","unstructured":"Zaharia, M., Chowdhury, M., Franklin, M.J., Shenker, S., Stoica, I.: Spark: cluster computing with working sets. In: USENIX HotCloud 2010 (2010)"},{"key":"6_CR47","doi-asserted-by":"crossref","unstructured":"Zaharia, M., Das, T., Li, H., Shenker, S., Stoica, I.: Discretized streams: an efficient and fault-tolerant model for stream processing on large clusters. In: USENIX HotCloud 2012 (2012)","DOI":"10.21236\/ADA575859"},{"key":"6_CR48","first-page":"56","volume":"59","author":"M Zaharia","year":"2016","unstructured":"Zaharia, M., et al.: Apache spark: a unified engine for big data processing. Commun. ACM 2016 59, 56\u201365 (2016)","journal-title":"Commun. ACM 2016"},{"key":"6_CR49","unstructured":"Zheng, W., Dave, A., Beekman, J.G., Popa, E.A., Gonzalez, J.E., Stoica, I.: Opaque: an oblivious and encrypted distributed analytics platform. In: USENIX NSDI 2017 (2017)"}],"container-title":["Lecture Notes in Computer Science","Distributed Applications and Interoperable Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22496-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,5]],"date-time":"2023-06-05T00:03:59Z","timestamp":1685923439000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22496-7_6"}},"subtitle":["(Case Study Paper)"],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030224950","9783030224967"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22496-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"6 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Distributed Applications and Interoperable Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kongens Lyngby","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dais2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.discotec.org\/2019\/dais","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}