{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:35:41Z","timestamp":1771468541008,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/deed.de"},{"start":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T00:00:00Z","timestamp":1741305600000},"content-version":"vor","delay-in-days":6,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/deed.de"}],"funder":[{"name":"SAP SE"},{"DOI":"10.13039\/100021130","name":"Bundesministerium f\u00fcr Wirtschaft und Klimaschutz","doi-asserted-by":"publisher","award":["01MK21002K"],"award-info":[{"award-number":["01MK21002K"]}],"id":[{"id":"10.13039\/100021130","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Research Center for Applied Cybersecurity ATHENE"},{"DOI":"10.13039\/501100005714","name":"Technische Universit\u00e4t Darmstadt","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100005714","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenbank Spektrum"],"published-print":{"date-parts":[[2025,3]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Cloud Database Management Systems (DBMSs), such as cloud-native analytical or serverless DBs, are experiencing rapid growth in adoption due to their flexibility and scalability. However, recent incidents with cloud providers show that the traditional model of a\u00a0trusted provider\/admin no longer applies to protect the customers\u2019 data. One promising solution that can prevent a\u00a0sole reliance on cloud and database service providers are trusted execution environments (TEEs). While past TEEs had many limitations and caused high performance overheads, recent work shows that the support of TEEs like Intel SGX for DBMS workloads improved significantly. Thus, it is time to actively integrate TEE technologies into cloud DBMSs to achieve better security that does not rely on the cloud provider. In this paper, we discuss directions for how recent TEEs can be used to build efficient and secure databases. We summarize the recent results on Intel SGX\u2019s performance for DBMS workloads and lay out the remaining research challenges that must be addressed to achieve optimal performance and thus minimize the performance cost for additional security.<\/jats:p>","DOI":"10.1007\/s13222-025-00495-8","type":"journal-article","created":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T11:20:03Z","timestamp":1741346403000},"page":"39-50","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards High-performance and Trusted Cloud DBMSs"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-7889-8152","authenticated-orcid":false,"given":"Adrian","family":"Lutsch","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5295-1316","authenticated-orcid":false,"given":"Muhammad","family":"El-Hindi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4127-8573","authenticated-orcid":false,"given":"Zsolt","family":"Istv\u00e1n","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2744-7836","authenticated-orcid":false,"given":"Carsten","family":"Binnig","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,7]]},"reference":[{"key":"495_CR1","unstructured":"Pritchard S (2024) Trends in the cloud database market. https:\/\/www.computerweekly.com\/feature\/Trends-in-the-cloud-database-market. Accessed 2024-10-14"},{"key":"495_CR2","unstructured":"Cyber Safety Review Board (2024) Review of the summer 2023 Microsoft exchange online intrusion. https:\/\/www.cisa.gov\/resources-tools\/resources\/CSRB-Review-Summer-2023-MEO-Intrusion"},{"key":"495_CR3","unstructured":"CLOUD Act. Wikipedia (2024). Accessed 2024-10-07"},{"key":"495_CR4","unstructured":"Costan V, Devadas S (2016) Intel SGX Explained. https:\/\/eprint.iacr.org\/2016\/086.pdf"},{"key":"495_CR5","unstructured":"Johnson S, Makaram R, Santoni A, Scarlata V (2021) Supporting Intel SGX on Multi-Socket Platforms. Intel Corporation. https:\/\/www.intel.com\/content\/www\/us\/en\/content-details\/843058\/supporting-intel-sgx-on-multisocket-platforms.html. Accessed 2025-01-08"},{"key":"495_CR6","unstructured":"Gramine Project (2025) Gramine\u2014a\u00a0Library OS for Unmodified Applications. https:\/\/gramineproject.io\/. Accessed 2025-01-08"},{"key":"495_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3533737.3535098","volume-title":"Data management on new hardware","author":"M El-Hindi","year":"2022","unstructured":"El-Hindi\u00a0M, Ziegler\u00a0T, Heinrich\u00a0M, Lutsch\u00a0A, Zhao\u00a0Z, Binnig\u00a0C (2022) Benchmarking the second generation of intel SGX hardware. In: Data management on new hardware DaMoN\u201922. Association for Computing Machinery, New York, pp\u00a01\u20138 https:\/\/doi.org\/10.1145\/3533737.3535098"},{"key":"495_CR8","doi-asserted-by":"publisher","first-page":"516","DOI":"10.48786\/EDBT.2025.41","volume-title":"Proceedings 28th International Conference on Extending Database Technology","author":"A Lutsch","year":"2025","unstructured":"Lutsch\u00a0A, El-Hindi\u00a0M, Heinrich\u00a0M, Ritter\u00a0D, Istv\u00e1n\u00a0Z, Binnig\u00a0C (2025) Benchmarking Analytical Query Processing in Intel SGXv2. In: Simitsis\u00a0A, Kemme\u00a0B, Queralt\u00a0A, Romero\u00a0O, Jovanovic\u00a0P (eds) Proceedings 28th International Conference on Extending Database Technology EDBT 2025, Barcelona, March 25\u201328, 2025 OpenProceedings.org, Konstanz, pp\u00a0516\u2013528 https:\/\/doi.org\/10.48786\/EDBT.2025.41"},{"key":"495_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2948618.2954331","volume-title":"Proceedings of the Hardware and Architectural Support for Security And Privacy 2016","author":"F McKeen","year":"2016","unstructured":"McKeen\u00a0F, Alexandrovich\u00a0I, Anati\u00a0I, Caspi\u00a0D, Johnson\u00a0S, Leslie-Hurd\u00a0R, Rozas\u00a0C (2016) Intel\u00ae Software Guard Extensions (Intel\u00ae SGX) Support for Dynamic Memory Management Inside an Enclave. In: Proceedings of the Hardware and Architectural Support for Security And Privacy 2016 HASP \u201916. Association for Computing Machinery, New York, pp\u00a01\u20139 https:\/\/doi.org\/10.1145\/2948618.2954331"},{"key":"495_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2487726.2488368","volume-title":"Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy","author":"F McKeen","year":"2013","unstructured":"McKeen\u00a0F, Alexandrovich\u00a0I, Berenzon\u00a0A, Rozas\u00a0CV, Shafi\u00a0H, Shanbhogue\u00a0V, Savagaonkar\u00a0UR (2013) Innovative instructions and software model for isolated execution. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy HASP \u201913. Association for Computing Machinery, New York, p\u00a01 https:\/\/doi.org\/10.1145\/2487726.2488368"},{"key":"495_CR11","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1109\/SP.2018.00025","volume-title":"2018 IEEE Symposium on Security and Privacy (SP)","author":"C Priebe","year":"2018","unstructured":"Priebe\u00a0C, Vaswani\u00a0K, Costa\u00a0M (2018) EnclaveDB: A\u00a0Secure Database Using SGX. In: 2018 IEEE Symposium on Security and Privacy (SP). IEEE, San Francisco, pp\u00a0264\u2013278 https:\/\/doi.org\/10.1109\/SP.2018.00025"},{"issue":"3","key":"495_CR12","doi-asserted-by":"publisher","first-page":"659","DOI":"10.14778\/3494124.3494146","volume":"15","author":"K Maliszewski","year":"2021","unstructured":"Maliszewski\u00a0K, Quian\u00e9-Ruiz\u00a0J\u2011A, Traub\u00a0J, Markl\u00a0V (2021) What is the price for joining securely? benchmarking equi-joins in trusted execution environments. Proc VLDB Endow 15(3):659\u2013672. https:\/\/doi.org\/10.14778\/3494124.3494146","journal-title":"Proc VLDB Endow"},{"key":"495_CR13","first-page":"645","volume-title":"2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"C-C Tsai","year":"2017","unstructured":"Tsai\u00a0C\u2011C, Porter\u00a0DE, Vij\u00a0M (2017) Graphene-SGX: A\u00a0Practical Library OS for Unmodified Applications on SGX. In: 2017 USENIX Annual Technical Conference (USENIX ATC 17). USENIX Association, Santa Clara, pp\u00a0645\u2013658 (https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/tsai)"},{"key":"495_CR14","unstructured":"Gramine Project (2025) Gramine Documentation\u2014Gramine Features. https:\/\/gramine.readthedocs.io\/en\/stable\/devel\/features.html. Accessed 2025-01-08"},{"key":"495_CR15","unstructured":"Gramine Project (2025) Gramine Documentation. https:\/\/gramine.readthedocs.io\/en\/stable\/. Accessed 2025-01-08"},{"key":"495_CR16","first-page":"173","volume-title":"17th USENIX Conference on File and Storage Technologies","author":"M Bailleu","year":"2019","unstructured":"Bailleu\u00a0M, Thalheim\u00a0J, Bhatotia\u00a0P, Fetzer\u00a0C, Honda\u00a0M, Vaswani\u00a0K (2019) SPEICHER: Securing LSM-based Key-Value Stores using Shielded Execution. In: 17th USENIX Conference on File and Storage Technologies FAST 19, pp\u00a0173\u2013190 (https:\/\/www.usenix.org\/conference\/fast19\/presentation\/bailleu)"},{"key":"495_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3302424.3303951","volume-title":"Proceedings of the Fourteenth EuroSys Conference","author":"T Kim","year":"2019","unstructured":"Kim\u00a0T, Park\u00a0J, Woo\u00a0J, Jeon\u00a0S, Huh\u00a0J (2019) ShieldStore: Shielded In-memory Key-value Storage with SGX. In: Proceedings of the Fourteenth EuroSys Conference EuroSys \u201919. Association for Computing Machinery, New York, pp\u00a01\u201315 https:\/\/doi.org\/10.1145\/3302424.3303951"},{"issue":"6","key":"495_CR18","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.14778\/3447689.3447705","volume":"14","author":"Y Sun","year":"2021","unstructured":"Sun\u00a0Y, Wang\u00a0S, Li\u00a0H, Li\u00a0F (2021) Building enclave-native storage engines for practical encrypted databases. Proc VLDB Endow 14(6):1019\u20131032. https:\/\/doi.org\/10.14778\/3447689.3447705","journal-title":"Proc VLDB Endow"},{"issue":"3","key":"495_CR19","doi-asserted-by":"publisher","first-page":"370","DOI":"10.2478\/popets-2019-0052","volume":"2019","author":"D Vinayagamurthy","year":"2019","unstructured":"Vinayagamurthy\u00a0D, Gribov\u00a0A, Gorbunov\u00a0S (2019) StealthDB: A\u00a0Scalable Encrypted Database with Full SQL Query Support. Proc Priv Enhancing Technol 2019(3):370\u2013388. https:\/\/doi.org\/10.2478\/popets-2019-0052","journal-title":"Proc Priv Enhancing Technol"},{"key":"495_CR20","doi-asserted-by":"publisher","first-page":"1511","DOI":"10.1145\/3318464.3386141","volume-title":"Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data","author":"P Antonopoulos","year":"2020","unstructured":"Antonopoulos\u00a0P, Arasu\u00a0A, Singh\u00a0KD, Eguro\u00a0K, Gupta\u00a0N, Jain\u00a0R, Kaushik\u00a0R, Kodavalla\u00a0H, Kossmann\u00a0D, Ogg\u00a0N, Ramamurthy\u00a0R, Szymaszek\u00a0J, Trimmer\u00a0J, Vaswani\u00a0K, Venkatesan\u00a0R, Zwilling\u00a0M (2020) Azure SQL Database Always Encrypted. In: Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data SIGMOD \u201920. Association for Computing Machinery, New York, pp\u00a01511\u20131525 https:\/\/doi.org\/10.1145\/3318464.3386141"},{"key":"495_CR21","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1109\/DSN48987.2021.00054","volume-title":"2021 51st Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","author":"B Fuhry","year":"2021","unstructured":"Fuhry\u00a0B, Jayanth Jain\u00a0HA, Kerschbaum\u00a0F (2021) EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database Using Enclaves. In: 2021 51st Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp\u00a0438\u2013450 https:\/\/doi.org\/10.1109\/DSN48987.2021.00054"},{"issue":"5","key":"495_CR22","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1109\/TC.2019.2963303","volume":"69","author":"Y Wang","year":"2020","unstructured":"Wang\u00a0Y, Shen\u00a0Y, Su\u00a0C, Ma\u00a0J, Liu\u00a0L, Dong\u00a0X (2020) CryptSQLite: SQLite With High Data Security. IEEE Trans Comput 69(5):666\u2013678. https:\/\/doi.org\/10.1109\/TC.2019.2963303","journal-title":"IEEE Trans Comput"},{"issue":"9","key":"495_CR23","doi-asserted-by":"publisher","first-page":"2330","DOI":"10.14778\/3598581.3598602","volume":"16","author":"K Maliszewski","year":"2023","unstructured":"Maliszewski\u00a0K, Quian\u00e9-Ruiz\u00a0J\u2011A, Markl\u00a0V (2023) Cracking-Like Join for Trusted Execution Environments. Proc VLDB Endow 16(9):2330\u20132343. https:\/\/doi.org\/10.14778\/3598581.3598602","journal-title":"Proc VLDB Endow"},{"key":"495_CR24","first-page":"689","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation","author":"S Arnautov","year":"2016","unstructured":"Arnautov\u00a0S, Trach\u00a0B, Gregor\u00a0F, Knauth\u00a0T, Martin\u00a0A, Priebe\u00a0C, Lind\u00a0J, Muthukumaran\u00a0D, O\u2019Keeffe\u00a0D, Stillwell\u00a0ML, Goltzsche\u00a0D, Eyers\u00a0D, Kapitza\u00a0R, Pietzuch\u00a0P, Fetzer\u00a0C (2016) SCONE: Secure Linux Containers with Intel SGX. In: 12th USENIX Symposium on Operating Systems Design and Implementation OSDI 16, pp\u00a0689\u2013703 (https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/arnautov)"},{"key":"495_CR25","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1145\/3064176.3064219","volume-title":"Proceedings of the Twelfth European Conference on Computer Systems","author":"M Orenbach","year":"2017","unstructured":"Orenbach\u00a0M, Lifshits\u00a0P, Minkin\u00a0M, Silberstein\u00a0M (2017) Eleos: ExitLess OS Services for SGX Enclaves. In: Proceedings of the Twelfth European Conference on Computer Systems EuroSys \u201917. Association for Computing Machinery, New York, pp\u00a0238\u2013253 https:\/\/doi.org\/10.1145\/3064176.3064219"},{"key":"495_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3662010.3663447","volume-title":"Proceedings of the 20th International Workshop on Data Management on New Hardware","author":"I Battiston","year":"2024","unstructured":"Battiston\u00a0I, Felius\u00a0L, Ansmink\u00a0S, Kuiper\u00a0L, Boncz\u00a0P (2024) DuckDB-SGX2: The Good, The Bad and The Ugly within Confidential Analytical Query Processing. In: Proceedings of the 20th International Workshop on Data Management on New Hardware DaMoN \u201924. Association for Computing Machinery, New York, pp\u00a01\u20135 https:\/\/doi.org\/10.1145\/3662010.3663447"},{"key":"495_CR27","unstructured":"El-Hindit et\u00a0al (2022) second_gen_sgx_benchmark. https:\/\/github.com\/DataManagementLab\/second_gen_sgx_benchmark. Accessed 2025-01-10"},{"key":"495_CR28","unstructured":"Lutsch et\u00a0al (2024) sgxv2-analytical-query-processing-benchmarks. https:\/\/github.com\/DataManagementLab\/sgxv2-analytical-query-processing-benchmarks. Accessed 2025-01-10"},{"issue":"1","key":"495_CR29","doi-asserted-by":"publisher","first-page":"385","DOI":"10.14778\/1687627.1687671","volume":"2","author":"T Willhalm","year":"2009","unstructured":"Willhalm\u00a0T, Popovici\u00a0N, Boshmaf\u00a0Y, Plattner\u00a0H, Zeier\u00a0A, Schaffner\u00a0J (2009) SIMD-scan: Ultra fast in-memory table scan using on-chip vector processing units. Proc VLDB Endow 2(1):385\u2013394. https:\/\/doi.org\/10.14778\/1687627.1687671","journal-title":"Proc VLDB Endow"},{"key":"495_CR30","unstructured":"Intel Corporation (2018) Speculative Store Bypass \/ CVE-2018-3639 \/ INTEL-SA-00115. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/software-security-guidance\/advisory-guidance\/speculative-store-bypass.html. Accessed 2024-05-10"},{"key":"495_CR31","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/3079856.3080208","volume-title":"Proceedings of the 44th Annual International Symposium on Computer Architecture","author":"O Weisse","year":"2017","unstructured":"Weisse\u00a0O, Bertacco\u00a0V, Austin\u00a0T (2017) Regaining Lost Cycles with HotCalls: A\u00a0Fast Interface for SGX Secure Enclaves. In: Proceedings of the 44th Annual International Symposium on Computer Architecture ISCA \u201917. Association for Computing Machinery, New York, pp\u00a081\u201393 https:\/\/doi.org\/10.1145\/3079856.3080208"},{"key":"495_CR32","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/3268935.3268942","volume-title":"Proceedings of the 3rd Workshop on System Software for Trusted Execution","author":"H Tian","year":"2018","unstructured":"Tian\u00a0H, Zhang\u00a0Q, Yan\u00a0S, Rudnitsky\u00a0A, Shacham\u00a0L, Yariv\u00a0R, Milshten\u00a0N (2018) Switchless Calls Made Practical in Intel SGX. In: Proceedings of the 3rd Workshop on System Software for Trusted Execution SysTEX \u201918. Association for Computing Machinery, New York, pp\u00a022\u201327 https:\/\/doi.org\/10.1145\/3268935.3268942"},{"key":"495_CR33","unstructured":"Lutsch et\u00a0al (2025) full-DBMS-in-SGX-experiments. https:\/\/github.com\/DataManagementLab\/full-DBMS-in-SGX-experiments. Accessed 2025-01-10"},{"key":"495_CR34","doi-asserted-by":"publisher","first-page":"313","DOI":"10.5441\/002\/EDBT.2019.28","volume-title":"Advances in Database Technology","author":"M Dreseler","year":"2019","unstructured":"Dreseler\u00a0M, Kossmann\u00a0J, Boissier\u00a0M, Klauck\u00a0S, Uflacker\u00a0M, Plattner\u00a0H (2019) Hyrise Re-engineered: An Extensible Database System for Research in Relational In-Memory Data Management. In: Herschel\u00a0M, Galhardas\u00a0H, Reinwald\u00a0B, Fundulaki\u00a0I, Binnig\u00a0C, Kaoudi\u00a0Z (eds) Advances in Database Technology 22nd International Conference on Extending Database Technology, EDBT 2019, Lisbon, March 26\u201329, 2019 OpenProceedings.org, Konstanz, pp\u00a0313\u2013324 https:\/\/doi.org\/10.5441\/002\/EDBT.2019.28"},{"key":"495_CR35","unstructured":"Jemalloc (2024) https:\/\/jemalloc.net\/. Accessed 2024-12-28"},{"key":"495_CR36","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1145\/2723372.2747644","volume-title":"Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data","author":"I M\u00fcller","year":"2015","unstructured":"M\u00fcller\u00a0I, Sanders\u00a0P, Lacurie\u00a0A, Lehner\u00a0W, F\u00e4rber\u00a0F (2015) Cache-Efficient Aggregation: Hashing Is Sorting. In: Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data SIGMOD \u201915. Association for Computing Machinery, New York, pp\u00a01123\u20131136 https:\/\/doi.org\/10.1145\/2723372.2747644"},{"issue":"4","key":"495_CR37","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/3568027","volume":"47","author":"T Do","year":"2023","unstructured":"Do\u00a0T, Graefe\u00a0G, Naughton\u00a0J (2023) Efficient sorting, duplicate removal, grouping, and aggregation. ACM Trans Database Syst 47(4):16\u201311635. https:\/\/doi.org\/10.1145\/3568027","journal-title":"ACM Trans Database Syst"},{"issue":"10","key":"495_CR38","doi-asserted-by":"publisher","first-page":"1064","DOI":"10.14778\/2336664.2336678","volume":"5","author":"M-C Albutiu","year":"2012","unstructured":"Albutiu\u00a0M\u2011C, Kemper\u00a0A, Neumann\u00a0T (2012) Massively parallel sort-merge joins in main memory multi-core database systems. Proc VLDB Endow 5(10):1064\u20131075. https:\/\/doi.org\/10.14778\/2336664.2336678","journal-title":"Proc VLDB Endow"}],"container-title":["Datenbank-Spektrum"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13222-025-00495-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13222-025-00495-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13222-025-00495-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T19:40:08Z","timestamp":1742413208000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13222-025-00495-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["495"],"URL":"https:\/\/doi.org\/10.1007\/s13222-025-00495-8","relation":{},"ISSN":["1618-2162","1610-1995"],"issn-type":[{"value":"1618-2162","type":"print"},{"value":"1610-1995","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3]]},"assertion":[{"value":"15 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A.\u00a0Lutsch, M.\u00a0El-Hindi, Z.\u00a0Istv\u00e1n and C.\u00a0Binnig certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}