{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:10:41Z","timestamp":1743117041667,"version":"3.40.3"},"publisher-location":"Cham","reference-count":79,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030710545"},{"type":"electronic","value":"9783030710552"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-71055-2_1","type":"book-chapter","created":{"date-parts":[[2021,3,3]],"date-time":"2021-03-03T06:02:43Z","timestamp":1614751363000},"page":"3-24","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Polystore Based Database Operating System (DBOS)"],"prefix":"10.1007","author":[{"given":"Michael","family":"Cafarella","sequence":"first","affiliation":[]},{"given":"David","family":"DeWitt","sequence":"additional","affiliation":[]},{"given":"Vijay","family":"Gadepally","sequence":"additional","affiliation":[]},{"given":"Jeremy","family":"Kepner","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Kozyrakis","sequence":"additional","affiliation":[]},{"given":"Tim","family":"Kraska","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Stonebraker","sequence":"additional","affiliation":[]},{"given":"Matei","family":"Zaharia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,4]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","unstructured":"Agrawal, S.R., et al.: A many-core architecture for in-memory data processing. In: Proceedings of the 50th Annual IEEE\/ACM International Symposium on Microarchitecture, MICRO-50 2017, pp. 245\u2013258. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3123939.3123985","DOI":"10.1145\/3123939.3123985"},{"key":"1_CR2","unstructured":"Ardelean, D., Diwan, A., Erdman, C.: Performance analysis of cloud applications. In: 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2018), pp. 405\u2013417. USENIX Association, Renton (2018). https:\/\/www.usenix.org\/conference\/nsdi18\/presentation\/ardelean"},{"key":"1_CR3","doi-asserted-by":"publisher","unstructured":"Arnold, J., Kaashoek, M.F.: Ksplice: Automatic rebootless kernel updates. In: Proceedings of the 4th ACM European Conference on Computer Systems, EuroSys 2009, pp. 187\u2013198. Association for Computing Machinery, New York (2009). https:\/\/doi.org\/10.1145\/1519065.1519085","DOI":"10.1145\/1519065.1519085"},{"key":"1_CR4","doi-asserted-by":"publisher","unstructured":"Atlidakis, V., Andrus, J., Geambasu, R., Mitropoulos, D., Nieh, J.: POSIX abstractions in modern operating systems: the old, the new, and the missing. In: Proceedings of the Eleventh European Conference on Computer Systems, EuroSys 2016. Association for Computing Machinery, New York (2016). https:\/\/doi.org\/10.1145\/2901318.2901350","DOI":"10.1145\/2901318.2901350"},{"issue":"4","key":"1_CR5","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/3015146","volume":"60","author":"L Barroso","year":"2017","unstructured":"Barroso, L., Marty, M., Patterson, D., Ranganathan, P.: Attack of the killer microseconds. Commun. ACM 60(4), 48\u201354 (2017). https:\/\/doi.org\/10.1145\/3015146","journal-title":"Commun. ACM"},{"issue":"148","key":"1_CR6","first-page":"13","volume":"2006","author":"M Bauer","year":"2006","unstructured":"Bauer, M.: Paranoid penguin: an introduction to Novell AppArmor. Linux J. 2006(148), 13 (2006)","journal-title":"Linux J."},{"key":"1_CR7","doi-asserted-by":"publisher","unstructured":"Baumann, A., et al.: The multikernel: a new OS architecture for scalable multicore systems. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, SOSP 2009, pp. 29\u201344. Association for Computing Machinery, New York (2009). https:\/\/doi.org\/10.1145\/1629575.1629579","DOI":"10.1145\/1629575.1629579"},{"key":"1_CR8","unstructured":"Belay, A., Bittau, A., Mashtizadeh, A., Terei, D., Mazi\u00e8res, D., Kozyrakis, C.: Dune: Safe user-level access to privileged CPU features. In: Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, OSDI 2012, pp. 335\u2013348. USENIX Association, USA (2012)"},{"key":"1_CR9","unstructured":"Belay, A., Prekas, G., Klimovic, A., Grossman, S., Kozyrakis, C., Bugnion, E.: IX: A protected dataplane operating system for high throughput and low latency. In: 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2014), pp. 49\u201365. USENIX Association, Broomfield (2014). https:\/\/www.usenix.org\/conference\/osdi14\/technical-sessions\/presentation\/belay"},{"key":"1_CR10","doi-asserted-by":"publisher","unstructured":"Bhat, S.S., Eqbal, R., Clements, A.T., Kaashoek, M.F., Zeldovich, N.: Scaling a file system to many cores using an operation log. In: Proceedings of the 26th Symposium on Operating Systems Principles, SOSP 2017, pp. 69\u201386. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3132747.3132779","DOI":"10.1145\/3132747.3132779"},{"key":"1_CR11","unstructured":"Boyd-Wickizer, S., et al.: An analysis of linux scalability to many cores. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI 2010, pp. 1\u201316. USENIX Association, USA (2010)"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Byun, C., et al.: Large scale parallelization using file-based communications. In: 2019 IEEE High Performance Extreme Computing Conference (HPEC), pp. 1\u20137 (2019)","DOI":"10.1109\/HPEC.2019.8916221"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Byun, C., et al.: LLMapReduce: multi-level map-reduce for high performance data analysis. In: 2016 IEEE High Performance Extreme Computing Conference (HPEC), pp. 1\u20138 (2016)","DOI":"10.1109\/HPEC.2016.7761618"},{"key":"1_CR14","doi-asserted-by":"publisher","unstructured":"Byun, C., et al.: Optimizing Xeon phi for interactive data analysis. In: 2019 IEEE High Performance Extreme Computing Conference (HPEC) (2019). https:\/\/doi.org\/10.1109\/hpec.2019.8916300","DOI":"10.1109\/hpec.2019.8916300"},{"key":"1_CR15","doi-asserted-by":"publisher","unstructured":"Cailliau, P., Davis, T., Gadepally, V., Kepner, J., Lipman, R., Lovitz, J., Ouaknine, K.: RedisGraph graphBLAS enabled graph database. IEEE (2019). https:\/\/doi.org\/10.1109\/ipdpsw.2019.00054","DOI":"10.1109\/ipdpsw.2019.00054"},{"key":"1_CR16","unstructured":"Cantrill, B.M., Shapiro, M.W., Leventhal, A.H.: Dynamic instrumentation of production systems. In: Proceedings of the Annual Conference on USENIX Annual Technical Conference, ATEC 2004, p. 2. USENIX Association, USA (2004)"},{"key":"1_CR17","unstructured":"Carbune, V., Coppey, T., Daryin, A., Deselaers, T., Sarda, N., Yagnik, J.: SmartChoices: hybridizing programming and machine learning. In: Reinforcement Learning for Real Life (RL4RealLife) Workshop in the 36th International Conference on Machine Learning (ICML) (2019). https:\/\/arxiv.org\/abs\/1810.00619"},{"issue":"12","key":"1_CR18","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/3368454","volume":"62","author":"P Castro","year":"2019","unstructured":"Castro, P., Ishakian, V., Muthusamy, V., Slominski, A.: The rise of serverless computing. Commun. ACM 62(12), 44\u201354 (2019)","journal-title":"Commun. ACM"},{"key":"1_CR19","doi-asserted-by":"publisher","unstructured":"Chamberlin, D.D., et al.: A history and evaluation of system R. Commun. ACM 24(10), 632\u2013646 (1981). https:\/\/doi.org\/10.1145\/358769.358784","DOI":"10.1145\/358769.358784"},{"key":"1_CR20","doi-asserted-by":"publisher","unstructured":"Chandra, R., Kim, T., Zeldovich, N.: Asynchronous intrusion recovery for interconnected web services, pp. 213\u2013227 (2013). https:\/\/doi.org\/10.1145\/2517349.2522725","DOI":"10.1145\/2517349.2522725"},{"key":"1_CR21","doi-asserted-by":"publisher","unstructured":"Cortez, E., Bonde, A., Muzio, A., Russinovich, M., Fontoura, M., Bianchini, R.: Resource central: understanding and predicting workloads for improved resource management in large cloud platforms. In: Proceedings of the 26th Symposium on Operating Systems Principles, SOSP 2017, pp. 153\u2013167. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3132747.3132772","DOI":"10.1145\/3132747.3132772"},{"issue":"2","key":"1_CR22","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/2408776.2408794","volume":"56","author":"J Dean","year":"2013","unstructured":"Dean, J., Barroso, L.A.: The tail at scale. Commun. ACM 56(2), 74\u201380 (2013). https:\/\/doi.org\/10.1145\/2408776.2408794","journal-title":"Commun. ACM"},{"key":"1_CR23","doi-asserted-by":"publisher","unstructured":"Delimitrou, C., Kozyrakis, C.: Paragon: QoS-aware scheduling for heterogeneous datacenters. In: Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2013, pp. 77\u201388. Association for Computing Machinery, New York (2013). https:\/\/doi.org\/10.1145\/2451116.2451125","DOI":"10.1145\/2451116.2451125"},{"key":"1_CR24","doi-asserted-by":"publisher","unstructured":"Feiner, P., Brown, A.D., Goel, A.: Comprehensive kernel instrumentation via dynamic binary translation. In: Proceedings of the Seventeenth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS XVII, pp. 135\u2013146. Association for Computing Machinery, New York (2012). https:\/\/doi.org\/10.1145\/2150976.2150992","DOI":"10.1145\/2150976.2150992"},{"key":"1_CR25","unstructured":"Fouladi, S., et al.: From laptop to lambda: outsourcing everyday jobs to thousands of transient functional containers. In: 2019 USENIX Annual Technical Conference (USENIX ATC 2019), pp. 475\u2013488. USENIX Association, Renton (2019). https:\/\/www.usenix.org\/conference\/atc19\/presentation\/fouladi"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Fuller, B., et al.: SoK: cryptographically protected database search, pp. 172\u2013191 (2017)","DOI":"10.1109\/SP.2017.10"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Gadepally, V., et al.: The bigDAWG polystore system and architecture, pp. 1\u20136 (2016)","DOI":"10.1109\/HPEC.2016.7761636"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Gadepally, V., et al.: Computing on masked data to improve the security of big data, pp. 1\u20136 (2015)","DOI":"10.1109\/THS.2015.7225312"},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Gadepally, V., et al.: D4M: Bringing associative arrays to database engines, pp. 1\u20136 (2015)","DOI":"10.1109\/HPEC.2015.7322472"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Gadepally, V., et al.: Heterogeneous Data Management, Polystores, and Analytics for Healthcare: VLDB 2019 Workshops, Poly and DMAH, Revised Selected Papers, vol. 11721. Springer Nature (2019)","DOI":"10.1007\/978-3-030-33752-0"},{"key":"1_CR31","doi-asserted-by":"publisher","unstructured":"Gan, Y., et al.: An open-source benchmark suite for microservices and their hardware-software implications for cloud & edge systems. In: Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2019, pp. 3\u201318. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3297858.3304013","DOI":"10.1145\/3297858.3304013"},{"key":"1_CR32","unstructured":"Gleixner, T.: Refactoring the Linux kernel (2017). https:\/\/kernel-recipes.org\/en\/2017\/talks\/refactoring-the-linux-kernel\/"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Hutchison, D., Kepner, J., Gadepally, V., Fuchs, A.: Graphulo implementation of server-side sparse matrix multiply in the accumulo database. In: 2015 IEEE High Performance Extreme Computing Conference (HPEC), pp. 1\u20137 (2015)","DOI":"10.1109\/HPEC.2015.7322448"},{"issue":"7","key":"1_CR34","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/3360307","volume":"63","author":"NP Jouppi","year":"2020","unstructured":"Jouppi, N.P., et al.: A domain-specific supercomputer for training deep neural networks. Commun. ACM 63(7), 67\u201378 (2020). https:\/\/doi.org\/10.1145\/3360307","journal-title":"Commun. ACM"},{"key":"1_CR35","unstructured":"Kamath, A.K., Monis, L., Karthik, A.T., Talawar, B.: Storage class memory: principles, problems, and possibilities (2019)"},{"key":"1_CR36","doi-asserted-by":"publisher","unstructured":"Kedia, P., Bansal, S.: Fast dynamic binary translation for the kernel. In: Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles, SOSP 2013, pp. 101\u2013115. Association for Computing Machinery, New York (2013). https:\/\/doi.org\/10.1145\/2517349.2522718","DOI":"10.1145\/2517349.2522718"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Kepner, J., et al.: Mathematical foundations of the graphBLAS, pp. 1\u20139 (2016)","DOI":"10.1109\/HPEC.2016.7761646"},{"key":"1_CR38","doi-asserted-by":"crossref","unstructured":"Kepner, J., et al.: TabulaROSA: tabular operating system architecture for massively parallel heterogeneous compute engines. In: 2018 IEEE High Performance extreme Computing Conference (HPEC), pp. 1\u20138 (2018)","DOI":"10.1109\/HPEC.2018.8547577"},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"Kepner, J., et al.: Associative array model of SQL, NoSQL, and NewSQL databases, pp. 1\u20139 (2016)","DOI":"10.1109\/HPEC.2016.7761647"},{"key":"1_CR40","doi-asserted-by":"crossref","unstructured":"Kepner, J., et al.: Computing on masked data: a high performance method for improving big data veracity, pp. 1\u20136 (2014)","DOI":"10.1109\/HPEC.2014.7040946"},{"key":"1_CR41","doi-asserted-by":"crossref","unstructured":"Kepner, J.: Parallel MATLAB for multicore and multinode computers. SIAM (2009)","DOI":"10.1137\/1.9780898718126"},{"key":"1_CR42","doi-asserted-by":"publisher","unstructured":"Kepner, J., Cho, K., Claffy, K., Gadepally, V., Michaleas, P., Milechin, L.: Hypersparse neural network analysis of large-scale internet traffic. IEEE (2019). https:\/\/doi.org\/10.1109\/hpec.2019.8916263","DOI":"10.1109\/hpec.2019.8916263"},{"key":"1_CR43","doi-asserted-by":"crossref","unstructured":"Kepner, J., et al.: 75,000,000,000 streaming inserts\/second using hierarchical hypersparse graphblas matrices (2020)","DOI":"10.1109\/IPDPSW50202.2020.00046"},{"key":"1_CR44","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/10617.001.0001","volume-title":"Mathematics of Big Data: Spreadsheets, Databases, Matrices, and Graphs","author":"J Kepner","year":"2018","unstructured":"Kepner, J., Jananthan, H.: Mathematics of Big Data: Spreadsheets, Databases, Matrices, and Graphs. MIT Press, Massachusetts (2018)"},{"key":"1_CR45","doi-asserted-by":"publisher","first-page":"9598","DOI":"10.1109\/ACCESS.2018.2888601","volume":"7","author":"Y Khan","year":"2019","unstructured":"Khan, Y., Zimmermann, A., Jha, A., Gadepally, V., D\u2019Aquin, M., Sahay, R.: One size does not fit all: Querying web polystores. IEEE Access 7, 9598\u20139617 (2019)","journal-title":"IEEE Access"},{"key":"1_CR46","unstructured":"Kim, T., Wang, X., Zeldovich, N., Kaashoek, M.F.: Intrusion recovery using selective re-execution. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI 2010, pp. 89\u2013104. USENIX Association, USA (2010)"},{"key":"1_CR47","doi-asserted-by":"publisher","unstructured":"Klimovic, A., Litz, H., Kozyrakis, C.: Reflex: Remote flash $$=$$ local flash. In: Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2017, pp. 345\u2013359. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3037697.3037732","DOI":"10.1145\/3037697.3037732"},{"key":"1_CR48","unstructured":"Klimovic, A., Wang, Y., Stuedi, P., Trivedi, A., Pfefferle, J., Kozyrakis, C.: Pocket: elastic ephemeral storage for serverless analytics. In: 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2018), pp. 427\u2013444. USENIX Association, Carlsbad (2018). https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/klimovic"},{"key":"1_CR49","unstructured":"Larabel, M.: The performance cost to selinux on fedora 31 (2020). https:\/\/www.phoronix.com\/scan.php?page=article&item=fedora-31-selinux&num=1"},{"key":"1_CR50","doi-asserted-by":"crossref","unstructured":"Leiserson, C.E., et al.: There\u2019s plenty of room at the top: what will drive computer performance after Moore\u2019s law? Science 368(6495) (2020)","DOI":"10.1126\/science.aam9744"},{"key":"1_CR51","unstructured":"Scaling in the Linux networking stack. https:\/\/www.kernel.org\/doc\/html\/latest\/networking\/scaling.html"},{"key":"1_CR52","doi-asserted-by":"publisher","unstructured":"Lozi, J.P., Lepers, B., Funston, J., Gaud, F., Qu\u00e9ma, V., Fedorova, A.: The Linux scheduler: a decade of wasted cores. In: Proceedings of the Eleventh European Conference on Computer Systems, EuroSys 2016. Association for Computing Machinery, New York (2016). https:\/\/doi.org\/10.1145\/2901318.2901326","DOI":"10.1145\/2901318.2901326"},{"key":"1_CR53","doi-asserted-by":"publisher","unstructured":"Lozi, J.P., Lepers, B., Funston, J., Gaud, F., Qu\u00e9ma, V., Fedorova, A.: The Linux scheduler: a decade of wasted cores. In: Proceedings of the Eleventh European Conference on Computer Systems, EuroSys 2016. Association for Computing Machinery, New York (2016). https:\/\/doi.org\/10.1145\/2901318.2901326","DOI":"10.1145\/2901318.2901326"},{"key":"1_CR54","doi-asserted-by":"crossref","unstructured":"Lu, J., Holubov\u00e1, I., Cautis, B.: Multi-model databases and tightly integrated polystores: current practices, comparisons, and open challenges, pp. 2301\u20132302 (2018)","DOI":"10.1145\/3269206.3274269"},{"key":"1_CR55","doi-asserted-by":"publisher","unstructured":"Mao, H., Schwarzkopf, M., Venkatakrishnan, S.B., Meng, Z., Alizadeh, M.: Learning scheduling algorithms for data processing clusters. In: Wu, J., Hall, W. (eds.) Proceedings of the ACM Special Interest Group on Data Communication, SIGCOMM 2019, Beijing, China, 19\u201323 August 2019, pp. 270\u2013288. ACM (2019). https:\/\/doi.org\/10.1145\/3341302.3342080","DOI":"10.1145\/3341302.3342080"},{"key":"1_CR56","unstructured":"Mirhoseini, A., Goldie, A., Pham, H., Steiner, B., Le, Q.V., Dean, J.: Hierarchical planning for device placement (2018). https:\/\/openreview.net\/pdf?id=Hkc-TeZ0W"},{"key":"1_CR57","unstructured":"Mitchell, C., Geng, Y., Li, J.: Using one-sided RDMA reads to build a fast, CPU-efficient key-value store. In: Proceedings of the 2013 USENIX Conference on Annual Technical Conference, USENIX ATC 2013, pp. 103\u2013114. USENIX Association, USA (2013)"},{"issue":"4","key":"1_CR58","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/1218063.1217942","volume":"40","author":"Y Padioleau","year":"2006","unstructured":"Padioleau, Y., Lawall, J.L., Muller, G.: Understanding collateral evolution in Linux device drivers. SIGOPS Oper. Syst. Rev. 40(4), 59\u201371 (2006). https:\/\/doi.org\/10.1145\/1218063.1217942","journal-title":"SIGOPS Oper. Syst. Rev."},{"issue":"11","key":"1_CR59","doi-asserted-by":"publisher","first-page":"1664","DOI":"10.14778\/3342263.3342641","volume":"12","author":"R Poddar","year":"2019","unstructured":"Poddar, R., Boelter, T., Popa, R.A.: Arx: an encrypted database using semantically secure encryption. Proc. VLDB Endowment 12(11), 1664\u20131678 (2019)","journal-title":"Proc. VLDB Endowment"},{"key":"1_CR60","unstructured":"Poimboeuf, J.: Introducing kpatch: dynamic kernel patching (2014). http:\/\/rhelblog.redhat.com\/2014\/02\/26\/kpatch\/"},{"key":"1_CR61","doi-asserted-by":"crossref","unstructured":"Popa, R.A., Redfield, C.M., Zeldovich, N., Balakrishnan, H.: CryptDB: protecting confidentiality with encrypted query processing. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pp. 85\u2013100 (2011)","DOI":"10.1145\/2043556.2043566"},{"key":"1_CR62","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.jpdc.2017.06.009","volume":"111","author":"A Reuther","year":"2018","unstructured":"Reuther, A., et al.: Scalable system scheduling for HPC and big data. J. Parallel Distrib. Comput. 111, 76\u201392 (2018). https:\/\/doi.org\/10.1016\/j.jpdc.2017.06.009","journal-title":"J. Parallel Distrib. Comput."},{"key":"1_CR63","doi-asserted-by":"publisher","unstructured":"Reuther, A., et al.: Interactive supercomputing on 40,000 cores for machine learning and data analysis. In: 2018 IEEE High Performance extreme Computing Conference (HPEC) (2018). https:\/\/doi.org\/10.1109\/hpec.2018.8547629","DOI":"10.1109\/hpec.2018.8547629"},{"key":"1_CR64","unstructured":"Shan, Y., Huang, Y., Chen, Y., Zhang, Y.: LegoOS: a disseminated, distributed OS for hardware resource disaggregation. In: Proceedings of the 13th USENIX Conference on Operating Systems Design and Implementation, OSDI 2018, pp. 69\u201387. USENIX Association, USA (2018)"},{"key":"1_CR65","unstructured":"Smalley, S., Vance, C., Salamon, W.: Implementing SELinux as a Linux security module. Technical report (2001)"},{"key":"1_CR66","unstructured":"The snowflake cloud data platform. https:\/\/www.snowflake.com\/"},{"key":"1_CR67","unstructured":"Song, C., Lee, B., Lu, K., Harris, W., Kim, T., Lee, W.: Enforcing kernel security invariants with data flow integrity. In: 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA, 21\u201324 February 2016. The Internet Society (2016). http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2017\/09\/enforcing-kernal-security-invariants-data-flow-integrity.pdf"},{"key":"1_CR68","doi-asserted-by":"crossref","unstructured":"Stonebraker, M., \u00c7etintemel, U.: \u201cOne size fits all\u201d an idea whose time has come and gone. In: Making Databases Work: the Pragmatic Wisdom of Michael Stonebraker, pp. 441\u2013462 (2018)","DOI":"10.1145\/3226595.3226636"},{"key":"1_CR69","doi-asserted-by":"crossref","unstructured":"Tan, R., Chirkova, R., Gadepally, V., Mattson, T.G.: Enabling query processing across heterogeneous data models: a survey, pp. 3211\u20133220 (2017)","DOI":"10.1109\/BigData.2017.8258302"},{"key":"1_CR70","unstructured":"Thumshin, J.: Introduction to the Linux block I\/O layer (2016). https:\/\/media.ccc.de\/v\/784-introduction-to-the-linux-block-i-o-layer"},{"key":"1_CR71","doi-asserted-by":"publisher","unstructured":"Tsai, C.C., Jain, B., Abdul, N.A., Porter, D.E.: A study of modern Linux API usage and compatibility: what to support when you\u2019re supporting. In: Proceedings of the Eleventh European Conference on Computer Systems, EuroSys 2016. Association for Computing Machinery, New York (2016). https:\/\/doi.org\/10.1145\/2901318.2901341","DOI":"10.1145\/2901318.2901341"},{"key":"1_CR72","unstructured":"Weisenthal, J.: Reinhart and Rogoff: \u2018full stop\u2019, we made a microsoft excel blunder in our debt study, and it makes a difference (2013). https:\/\/www.businessinsider.com\/reinhart-and-rogoff-admit-excel-blunder-2013-4"},{"key":"1_CR73","unstructured":"Wikipedia: AWS Lambda (2020). https:\/\/en.wikipedia.org\/wiki\/AWS_Lambda"},{"key":"1_CR74","unstructured":"Wikipedia: General data protection regulation (2020). https:\/\/en.wikipedia.org\/wiki\/General_Data_Protection_Regulation"},{"key":"1_CR75","unstructured":"Attribute-based access control \u2013 Wikipedia, the free encyclopedia (2020). https:\/\/en.wikipedia.org\/w\/index.php?title=Attribute-based_access_control&oldid=967477902"},{"key":"1_CR76","unstructured":"Completely fair scheduler \u2013 Wikipedia, the free encyclopedia (2020). https:\/\/en.wikipedia.org\/w\/index.php?title=Completely_Fair_Scheduler&oldid=959791832"},{"key":"1_CR77","doi-asserted-by":"crossref","unstructured":"Yakoubov, S., Gadepally, V., Schear, N., Shen, E., Yerukhimovich, A.: A survey of cryptographic approaches to securing big-data analytics in the cloud, pp. 1\u20136 (2014)","DOI":"10.1109\/HPEC.2014.7040943"},{"key":"1_CR78","doi-asserted-by":"publisher","unstructured":"Zamanian, E., Yu, X., Stonebraker, M., Kraska, T.: Rethinking database high availability with RDMA networks. Proc. VLDB Endow. 12(11), 1637\u20131650 (2019). https:\/\/doi.org\/10.14778\/3342263.3342639","DOI":"10.14778\/3342263.3342639"},{"issue":"11","key":"1_CR79","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/2018396.2018419","volume":"54","author":"N Zeldovich","year":"2011","unstructured":"Zeldovich, N., Boyd-Wickizer, S., Kohler, E., Mazi\u00e8res, D.: Making information flow explicit in HiStar. Commun. ACM 54(11), 93\u2013101 (2011). https:\/\/doi.org\/10.1145\/2018396.2018419","journal-title":"Commun. ACM"}],"container-title":["Lecture Notes in Computer Science","Heterogeneous Data Management, Polystores, and Analytics for Healthcare"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-71055-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T06:13:47Z","timestamp":1724566427000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-71055-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030710545","9783030710552"],"references-count":79,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-71055-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"4 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Poly","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"VLDB Workshop on Polystore Systems for Heterogeneous Data in Multiple Databases with Privacy and Security Assurances","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"poly2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}