{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T02:05:51Z","timestamp":1773194751484,"version":"3.50.1"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/acsacw69556.2025.00045","type":"proceedings-article","created":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T19:56:13Z","timestamp":1773086173000},"page":"349-356","source":"Crossref","is-referenced-by-count":0,"title":["PrivPicket: Privacy Preserving Serverless Workflows via Optimized Dummy Node Insertion"],"prefix":"10.1109","author":[{"given":"Surabhi","family":"Garg","sequence":"first","affiliation":[{"name":"TCS Innovation Lab,New Delhi,India"}]},{"given":"Ratul Kishore","family":"Saha","sequence":"additional","affiliation":[{"name":"TCS Innovation Lab,Mumbai,India"}]},{"given":"Manju","family":"Ramesh","sequence":"additional","affiliation":[{"name":"TCS Innovation Lab,Mumbai,India"}]},{"given":"Rajan M","family":"A","sequence":"additional","affiliation":[{"name":"TCS Innovation Lab,Bangalore,India"}]},{"given":"Dheeraj","family":"Chahal","sequence":"additional","affiliation":[{"name":"TCS Innovation Lab,Mumbai,India"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Aws cloudwatch logs"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3117767"},{"key":"ref3","article-title":"An empirical study of sensitive information in logs","author":"Aghili","year":"2024"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3715779"},{"key":"ref5","article-title":"Sdlog: A deep learning framework for detecting sensitive information in software logs","author":"Aghili","year":"2025"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/app10155208"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-61816-1_5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3276488"},{"issue":"2012","key":"ref9","first-page":"1","article-title":"Standardizing cyber threat intelligence information with the structured threat information expression (stix)","volume":"11","author":"Barnum","year":"2012","journal-title":"Mitre Corporation"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-012-0084-6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103433"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICPM57379.2022.9980619"},{"key":"ref13","first-page":"74","article-title":"Role-based access controls, 15th nist-ncsc national computer security conf","volume":"73","author":"Ferraiolo","year":"1992","journal-title":"Baltimore, MD"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E61754.2024.00034"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid57682.2023.00049"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3303771"},{"key":"ref17","volume-title":"retail Nordstrom technology. hello, retail!","year":"2019"},{"key":"ref18","article-title":"Guarding serverless applications with seclambda","author":"Jegan","year":"2020"},{"key":"ref19","article-title":"Cloud programming simplified: A berkeley view on serverless computing","author":"Jonas","year":"2019"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD49709.2020.00050"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2906149"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INES.2013.6632823"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E48712.2020.00023"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-10542-5_9"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68279-0_5"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.005.2100335"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-022-00347-w"},{"key":"ref28","first-page":"8","article-title":"Serverless computing architecture security and quality analysis for back-end development","volume":"7","author":"Ngo","year":"2020","journal-title":"Journal of The Colloquium for Information Systems Security Education"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICoAC44903.2018.8939081"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS56262.2023.10041365"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E61754.2024.00031"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427665"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3406011"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3510611"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3049599"},{"key":"ref36","article-title":"Accelerating the cloud with heterogeneous computing","volume-title":"3rd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 11)","author":"Suneja"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3400286.3418261"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2019.8919967"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21074-8_15"},{"key":"ref40","first-page":"133","article-title":"Peeking behind the curtains of serverless platforms","volume-title":"2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Wang"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-3296-8_5"}],"event":{"name":"2025 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,9]]}},"container-title":["2025 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11417955\/11417996\/11418022.pdf?arnumber=11418022","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T05:28:35Z","timestamp":1773120515000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11418022\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/acsacw69556.2025.00045","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}