{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T12:05:30Z","timestamp":1726056330413},"publisher-location":"Cham","reference-count":60,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030337513"},{"type":"electronic","value":"9783030337520"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-33752-0_7","type":"book-chapter","created":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T21:01:49Z","timestamp":1572037309000},"page":"96-111","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Privacy Changes Everything"],"prefix":"10.1007","author":[{"given":"Jennie","family":"Rogers","sequence":"first","affiliation":[]},{"given":"Johes","family":"Bater","sequence":"additional","affiliation":[]},{"given":"Xi","family":"He","sequence":"additional","affiliation":[]},{"given":"Ashwin","family":"Machanavajjhala","sequence":"additional","affiliation":[]},{"given":"Madhav","family":"Suresh","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,23]]},"reference":[{"key":"7_CR1","unstructured":"Aggarwal, G., et al.: Two can keep a secret: a distributed architecture for secure database services. In: CIDR (2005)"},{"key":"7_CR2","unstructured":"Allen, L., et al.: Veritas: shared verifiable databases and tables in the cloud. In: 9th Biennial Conference on Innovative Data Systems Research (CIDR) (2019)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Arasu, A., et al.: Secure database-as-a-service with cipherbase. In: Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, pp. 1033\u20131036. ACM (2013)","DOI":"10.1145\/2463676.2467797"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Balke, W.T., G\u00fcntzer, U.: Multi-objective query processing for database systems. In: Proceedings of the Thirtieth International Conference on Very Large Databases, vol. 30, pp. 936\u2013947. VLDB Endowment (2004)","DOI":"10.1016\/B978-012088469-8\/50082-6"},{"issue":"6","key":"7_CR5","doi-asserted-by":"publisher","first-page":"673","DOI":"10.14778\/3055330.3055334","volume":"10","author":"J Bater","year":"2017","unstructured":"Bater, J., Elliott, G., Eggen, C., Goel, S., Kho, A., Rogers, J.: SMCQL: secure querying for federated databases. Proc. VLDB Endow. 10(6), 673\u2013684 (2017)","journal-title":"Proc. VLDB Endow."},{"issue":"3","key":"7_CR6","doi-asserted-by":"publisher","first-page":"307","DOI":"10.14778\/3291264.3291274","volume":"12","author":"J Bater","year":"2019","unstructured":"Bater, J., He, X., Ehrich, W., Machanavajjhala, A., Rogers, J.: Shrinkwrap: differentially-private query processing in private data federations. Proc. VLDB Endow. 12(3), 307\u2013320 (2019)","journal-title":"Proc. VLDB Endow."},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Bellare, M., Hoang, V.T., Keelveedhi, S., Rogaway, P.: Efficient garbling from a fixed-key blockcipher. In: 2013 IEEE Symposium on Security and Privacy, pp. 478\u2013492. IEEE Computer Society Press, Berkeley, CA, USA, 19\u201322 May 2013","DOI":"10.1109\/SP.2013.39"},{"issue":"6","key":"7_CR8","doi-asserted-by":"publisher","first-page":"690","DOI":"10.14778\/2735703.2735708","volume":"8","author":"M Benedikt","year":"2015","unstructured":"Benedikt, M., Leblay, J., Tsamoura, E.: Querying with access patterns and integrity constraints. Proc. VLDB Endow. 8(6), 690\u2013701 (2015)","journal-title":"Proc. VLDB Endow."},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Bogdanov, D., Kamm, L., Kubo, B., Rebane, R., Sokk, V., Talviste, R.: Students and taxes: a privacy-preserving social study using secure computation. In: Privacy Enhancing Technologies Symposium (PETS) (2016)","DOI":"10.1515\/popets-2016-0019"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-540-88313-5_13","volume-title":"Computer Security - ESORICS 2008","author":"D Bogdanov","year":"2008","unstructured":"Bogdanov, D., Laur, S., Willemson, J.: Sharemind: a framework for fast privacy-preserving computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192\u2013206. Springer, Heidelberg (2008). \n                      https:\/\/doi.org\/10.1007\/978-3-540-88313-5_13"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-642-03549-4_20","volume-title":"Financial Cryptography and Data Security","author":"P Bogetoft","year":"2009","unstructured":"Bogetoft, P., et al.: Secure multiparty computation goes live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 325\u2013343. Springer, Heidelberg (2009). \n                      https:\/\/doi.org\/10.1007\/978-3-642-03549-4_20"},{"key":"7_CR12","unstructured":"Chowdhury, A.R., Wang, C., He, X., Machanavajjhala, A., Jha, S.: Outis: crypto-assisted differential privacy on untrusted servers. arXiv preprint \n                      arXiv:1902.07756\n                      \n                    , pp. 1\u201330 (2019)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Crockett, E., Peikert, C., Sharp, C.: Alchemy: a language and compiler for homomorphic encryption made easy. In: CCS (2018)","DOI":"10.1145\/3243734.3243828"},{"issue":"1","key":"7_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/1900000001","volume":"1","author":"A Deshpande","year":"2007","unstructured":"Deshpande, A., Ives, Z.G., Raman, V.: Adaptive query processing. Found. Trends Databases 1(1), 1\u2013140 (2007)","journal-title":"Found. Trends Databases"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: Proceedings of the Twenty-Second ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2003, pp. 202\u2013210. ACM, New York, NY, USA (2003)","DOI":"10.1145\/773153.773173"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). \n                      https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"El-Hindi, M., Heyden, M., Binnig, C., Ramamurthy, R., Arasu, A., Kossmann, D.: BlockchainDB-towards a shared database on blockchains. In: Proceedings of the 2019 International Conference on Management of Data, pp. 1905\u20131908. ACM (2019)","DOI":"10.1145\/3299869.3320237"},{"key":"7_CR18","unstructured":"Eskandarian, S., Zaharia, M.: An oblivious general-purpose SQL database for the cloud. arXiv preprint 1710.00458 (2017)"},{"key":"7_CR19","doi-asserted-by":"publisher","unstructured":"Ge, C., He, X., Ilyas, I.F., Machanavajjhala, A.: APEx: accuracy-aware differentially private data exploration. In: Proceedings of the 2019 International Conference on Management of Data, SIGMOD 2019, pp. 177\u2013194. ACM, New York, NY, USA (2019). \n                      https:\/\/doi.org\/10.1145\/3299869.3300092","DOI":"10.1145\/3299869.3300092"},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/978-3-642-38348-9_37","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"R Gennaro","year":"2013","unstructured":"Gennaro, R., Gentry, C., Parno, B., Raykova, M.: Quadratic span programs and succinct NIZKs without PCPs. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 626\u2013645. Springer, Heidelberg (2013). \n                      https:\/\/doi.org\/10.1007\/978-3-642-38348-9_37"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic eneryption using ideal lattices. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, pp. 169\u2013178. ACM (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Gentry, C., Halevi, S., Raykova, M., Wichs, D.: Outsourcing private RAM computation. In: 2014 IEEE 55th Annual Symposium on Foundations of Computer Science, pp. 404\u2013413. IEEE (2014)","DOI":"10.1109\/FOCS.2014.50"},{"key":"7_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-662-53357-4_20","volume-title":"Financial Cryptography and Data Security","author":"D Gupta","year":"2016","unstructured":"Gupta, D., Mood, B., Feigenbaum, J., Butler, K., Traynor, P.: Using intel software guard extensions for efficient two-party secure function evaluation. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 302\u2013318. Springer, Heidelberg (2016). \n                      https:\/\/doi.org\/10.1007\/978-3-662-53357-4_20"},{"issue":"12","key":"7_CR24","first-page":"1876","volume":"8","author":"Z He","year":"2015","unstructured":"He, Z., et al.: SDB: a secure query processing system with data interoperability. VLDB 8(12), 1876\u20131879 (2015). 2150-8097\/15\/08","journal-title":"VLDB"},{"key":"7_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-540-45146-4_9","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"Y Ishai","year":"2003","unstructured":"Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145\u2013161. Springer, Heidelberg (2003). \n                      https:\/\/doi.org\/10.1007\/978-3-540-45146-4_9"},{"issue":"5","key":"7_CR26","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1145\/3187009.3177733","volume":"11","author":"N Johnson","year":"2018","unstructured":"Johnson, N., Near, J.P., Song, D.: Towards practical differential privacy for SQL queries. Proc. VLDB Endow. 11(5), 526\u2013539 (2018). \n                      https:\/\/doi.org\/10.1145\/3187009.3177733","journal-title":"Proc. VLDB Endow."},{"key":"7_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-319-78372-7_6","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"M Keller","year":"2018","unstructured":"Keller, M., Pastro, V., Rotaru, D.: Overdrive: making SPDZ great again. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10822, pp. 158\u2013189. Springer, Cham (2018). \n                      https:\/\/doi.org\/10.1007\/978-3-319-78372-7_6"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Kotsogiannis, I., Tao, Y., Machanavajjhala, A., Miklau, G., Hay, M.: Architecting a differentially private SQL engine. In: CIDR (2019)","DOI":"10.14778\/3342263.3342274"},{"issue":"12","key":"7_CR29","doi-asserted-by":"publisher","first-page":"1371","DOI":"10.14778\/3342263.3342274","volume":"12","author":"I Kotsogiannis","year":"2019","unstructured":"Kotsogiannis, I., et al.: PrivateSQL: a differentially private SQL engine. Proc. VLDB Endow. 12(12), 1371\u20131384 (2019)","journal-title":"Proc. VLDB Endow."},{"key":"7_CR30","unstructured":"Krishnan, S., Yang, Z., Goldberg, K., Hellerstein, J., Stoica, I.: Learning to optimize join queries with deep reinforcement learning. arXiv preprint \n                      arXiv:1808.03196\n                      \n                     (2018)"},{"key":"7_CR31","doi-asserted-by":"publisher","unstructured":"Liu, C., Wang, X.S., Nayak, K., Huang, Y., Shi, E.: ObliVM : a programming framework for secure computation, Oakland, pp. 359\u2013376 (2015). \n                      https:\/\/doi.org\/10.1109\/SP.2015.29","DOI":"10.1109\/SP.2015.29"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Marcus, R., Papaemmanouil, O.: Deep reinforcement learning for join order enumeration. In: Proceedings of the First International Workshop on Exploiting Artificial Intelligence Techniques for Data Management, p. 3. ACM (2018)","DOI":"10.1145\/3211954.3211957"},{"issue":"1","key":"7_CR33","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1147\/sj.421.0098","volume":"42","author":"V Markl","year":"2003","unstructured":"Markl, V., Lohman, G.M., Raman, V.: LEO: an autonomic query optimizer for DB2. IBM Syst. J. 42(1), 98\u2013106 (2003)","journal-title":"IBM Syst. J."},{"key":"7_CR34","doi-asserted-by":"publisher","unstructured":"McGregor, A., Mironov, I., Pitassi, T., Reingold, O., Talwar, K., Vadhan, S.: The limits of two-party differential privacy. In: Proceedings of the 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, FOCS 2010, pp. 81\u201390. IEEE Computer Society, Washington, DC, USA (2010). \n                      https:\/\/doi.org\/10.1109\/FOCS.2010.14","DOI":"10.1109\/FOCS.2010.14"},{"key":"7_CR35","doi-asserted-by":"publisher","unstructured":"McSherry, F.D.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, SIGMOD 2009, pp. 19\u201330. ACM, New York, NY, USA (2009). \n                      https:\/\/doi.org\/10.1145\/1559845.1559850","DOI":"10.1145\/1559845.1559850"},{"issue":"1","key":"7_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.14778\/3151113.3151114","volume":"11","author":"P Menon","year":"2017","unstructured":"Menon, P., Mowry, T.C., Pavlo, A.: Relaxed operator fusion for in-memory databases: making compilation, vectorization, and prefetching work together at last. Proc. VLDB Endow. 11(1), 1\u201313 (2017)","journal-title":"Proc. VLDB Endow."},{"key":"7_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-642-03356-8_8","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"I Mironov","year":"2009","unstructured":"Mironov, I., Pandey, O., Reingold, O., Vadhan, S.: Computational differential privacy. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 126\u2013142. Springer, Heidelberg (2009). \n                      https:\/\/doi.org\/10.1007\/978-3-642-03356-8_8"},{"issue":"11","key":"7_CR38","doi-asserted-by":"publisher","first-page":"1539","DOI":"10.14778\/3342263.3342632","volume":"12","author":"Senthil Nathan","year":"2019","unstructured":"Nathan, S., Govindarajan, C., Saraf, A., Sethi, M., Jayachandran, P.: Blockchain meets database: design and implementation of a blockchain relational database (2019)","journal-title":"Proceedings of the VLDB Endowment"},{"issue":"1","key":"7_CR39","first-page":"3","volume":"37","author":"T Neumann","year":"2014","unstructured":"Neumann, T., Leis, V.: Compiling database queries into machine code. IEEE Data Eng. Bull. 37(1), 3\u201311 (2014)","journal-title":"IEEE Data Eng. Bull."},{"key":"7_CR40","doi-asserted-by":"crossref","unstructured":"Ortiz, J., Balazinska, M., Gehrke, J., Keerthi, S.S.: Learning state representations for query optimization with deep reinforcement learning. arXiv preprint \n                      arXiv:1803.08604\n                      \n                     (2018)","DOI":"10.1145\/3209889.3209890"},{"key":"7_CR41","doi-asserted-by":"crossref","unstructured":"Parno, B., Howell, J., Gentry, C., Raykova, M.: Pinocchio: nearly practical verifiable computation. In: 2013 IEEE Symposium on Security and Privacy, pp. 238\u2013252. IEEE (2013)","DOI":"10.1109\/SP.2013.47"},{"key":"7_CR42","unstructured":"Pavlo, A., et al.: Self-driving database management systems. In: CIDR, vol. 4, p. 1 (2017)"},{"key":"7_CR43","doi-asserted-by":"crossref","unstructured":"Pirk, H., et al.: CPU and cache efficient management of memory-resident databases. In: 2013 IEEE 29th International Conference on Data Engineering (ICDE), pp. 14\u201325. IEEE (2013)","DOI":"10.1109\/ICDE.2013.6544810"},{"key":"7_CR44","doi-asserted-by":"publisher","unstructured":"Popa, R., Redfield, C.: CryptDB: protecting confidentiality with encrypted query processing. In: SOSP, pp. 85\u2013100 (2011). \n                      https:\/\/doi.org\/10.1145\/2043556.2043566","DOI":"10.1145\/2043556.2043566"},{"key":"7_CR45","doi-asserted-by":"crossref","unstructured":"Rajan, A., Qin, L., Archer, D.W., Boneh, D., Lepoint, T., Varia, M.: Callisto: a cryptographic approach to detecting serial perpetrators of sexual misconduct. In: Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, p. 49. ACM (2018)","DOI":"10.1145\/3209811.3212699"},{"key":"7_CR46","doi-asserted-by":"publisher","unstructured":"Selinger, P.G., Astrahan, M.M., Chamberlin, D.D., Lorie, R.A., Price, T.G.: Access path selection in a relational database management system. In: SIGMOD, pp. 23\u201334 (1979). \n                      https:\/\/doi.org\/10.1145\/582095.582099","DOI":"10.1145\/582095.582099"},{"key":"7_CR47","unstructured":"Suresh, M., She, Z., Wallace, W., Lahlou, A., Rogers, J.: KloakDB: a platform for analyzing sensitive data with k-anonymous query processing. CoRR abs\/1904.00411 (2019). \n                      http:\/\/arxiv.org\/abs\/1904.00411"},{"issue":"3","key":"7_CR48","doi-asserted-by":"publisher","first-page":"221","DOI":"10.14778\/2735508.2735512","volume":"8","author":"I Trummer","year":"2014","unstructured":"Trummer, I., Koch, C.: Multi-objective parametric query optimization. Proc. VLDB Endow. 8(3), 221\u2013232 (2014)","journal-title":"Proc. VLDB Endow."},{"issue":"5","key":"7_CR49","doi-asserted-by":"publisher","first-page":"289","DOI":"10.14778\/2535573.2488336","volume":"6","author":"S Tu","year":"2013","unstructured":"Tu, S., Kaashoek, M.F., Madden, S., Zeldovich, N.: Processing analytical queries over encrypted data. Proc. VLDB Endow. 6(5), 289\u2013300 (2013). \n                      https:\/\/doi.org\/10.14778\/2535573.2488336","journal-title":"Proc. VLDB Endow."},{"key":"7_CR50","doi-asserted-by":"crossref","unstructured":"Volgushev, N., Schwarzkopf, M., Getchell, B., Varia, M., Lapets, A., Bestavros, A.: Conclave: secure multi-party computation on big data. In: European Conference on Computer Systems (2019)","DOI":"10.1145\/3302424.3303982"},{"key":"7_CR51","unstructured":"Wang, F., Yun, C., Goldwasser, S., Vaikuntanathan, V., Zaharia, M.: Splinter: practical private queries on public data. In: NSDI, pp. 299\u2013313 (2017)"},{"issue":"2","key":"7_CR52","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/3003665.3003669","volume":"45","author":"W Wang","year":"2016","unstructured":"Wang, W., Zhang, M., Chen, G., Jagadish, H.V., Ooi, B.C., Tan, K.L.: Database meets deep learning: challenges and opportunities. ACM SIGMOD Record 45(2), 17\u201322 (2016)","journal-title":"ACM SIGMOD Record"},{"key":"7_CR53","doi-asserted-by":"crossref","unstructured":"Wang, X., Ranellucci, S., Katz, J.: Authenticated garbling and efficient maliciously secure two-party computation. In: CCS (2017)","DOI":"10.1145\/3133956.3134053"},{"key":"7_CR54","doi-asserted-by":"publisher","unstructured":"Wang, X.S., et al.: Oblivious data structures. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS 2014, pp. 215\u2013226 (2014). \n                      https:\/\/doi.org\/10.1145\/2660267.2660314","DOI":"10.1145\/2660267.2660314"},{"key":"7_CR55","doi-asserted-by":"crossref","unstructured":"Wei, Z., Leck, U., Link, S.: Entity integrity, referential integrity, and query optimization with embedded uniqueness constraints. In: ICDE (2019)","DOI":"10.1109\/ICDE.2019.00175"},{"key":"7_CR56","doi-asserted-by":"crossref","unstructured":"Wong, W.K., Kao, B., Cheung, D.W.L., Li, R., Yiu, S.M.: Secure query processing with data interoperability in a cloud database environment. In: SIGMOD, pp. 1395\u20131406. ACM (2014)","DOI":"10.1145\/2588555.2588572"},{"key":"7_CR57","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: FOCS, pp. 160\u2013164. IEEE (1982)","DOI":"10.1109\/SFCS.1982.38"},{"key":"7_CR58","doi-asserted-by":"crossref","unstructured":"Yao, A.C.C.: How to generate and exchange secrets (extended abstract). In: 27th FOCS, pp. 162\u2013167. IEEE Computer Society Press, Toronto, Ontario, Canada, 27\u201329 October 1986","DOI":"10.1109\/SFCS.1986.25"},{"key":"7_CR59","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Genkin, D., Katz, J., Papadopoulos, D., Papamanthou, C.: vSQL: verifying arbitrary SQL queries over dynamic outsourced databases. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 863\u2013880. IEEE (2017)","DOI":"10.1109\/SP.2017.43"},{"key":"7_CR60","unstructured":"Zheng, W., Dave, A., Beekman, J.G., Popa, R.A., Gonzalez, J.E., Stoica, I.: Opaque: an Oblivious and Encrypted Distributed Analytics Platform. In: NSDI, pp. 283\u2013298 (2017)"}],"container-title":["Lecture Notes in Computer Science","Heterogeneous Data Management, Polystores, and Analytics for Healthcare"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-33752-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T21:08:21Z","timestamp":1572037701000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-33752-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030337513","9783030337520"],"references-count":60,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-33752-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"23 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Poly","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Polystores and Other Systems for Heterogeneous Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Los Angeles, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"poly2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/view\/poly19","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}