{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,11]],"date-time":"2026-05-11T11:00:19Z","timestamp":1778497219688,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,23]],"date-time":"2011-10-23T00:00:00Z","timestamp":1319328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["CNS-0716273 IIS-1065219"],"award-info":[{"award-number":["CNS-0716273 IIS-1065219"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0716273 IIS-1065219"],"award-info":[{"award-number":["CNS-0716273 IIS-1065219"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,23]]},"DOI":"10.1145\/2043556.2043566","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"85-100","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":885,"title":["CryptDB"],"prefix":"10.1145","author":[{"given":"Raluca Ada","family":"Popa","sequence":"first","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Catherine M. S.","family":"Redfield","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Nickolai","family":"Zeldovich","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Hari","family":"Balakrishnan","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]}],"member":"320","published-online":{"date-parts":[[2011,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1770560.1770563"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1788494.1788500"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/3088723.3088749"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1760749.1760788"},{"key":"e_1_3_2_1_6_1","volume-title":"Gawker","author":"Chen A.","year":"2010","unstructured":"A. Chen . GCreep : Google engineer stalked teens, spied on chats . Gawker , September 2010 . http:\/\/gawker.com\/5637234\/. A. Chen. GCreep: Google engineer stalked teens, spied on chats. Gawker, September 2010. http:\/\/gawker.com\/5637234\/."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 9th Symposium on Operating Systems Design and Implementation","author":"Chlipala A.","year":"2010","unstructured":"A. Chlipala . Static checking of dynamically-varying security policies in database-backed applications . In Proceedings of the 9th Symposium on Operating Systems Design and Implementation , Vancouver, Canada , October 2010 . A. Chlipala. Static checking of dynamically-varying security policies in database-backed applications. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation, Vancouver, Canada, October 2010."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 16th Network and Distributed System Security Symposium","author":"Chow S. S. M.","year":"2009","unstructured":"S. S. M. Chow , J.-H. Lee , and L. Subramanian . Two-party computation model for privacy-preserving queries over distributed databases . In Proceedings of the 16th Network and Distributed System Security Symposium , February 2009 . S. S. M. Chow, J.-H. Lee, and L. Subramanian. Two-party computation model for privacy-preserving queries over distributed databases. In Proceedings of the 16th Network and Distributed System Security Symposium, February 2009."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1813084.1813120"},{"key":"e_1_3_2_1_10_1","volume-title":"Computer World","author":"Cooney M.","year":"2009","unstructured":"M. Cooney . IBM touts encryption innovation; new technology performs calculations on encrypted data without decrypting it . Computer World , June 2009 . M. Cooney. IBM touts encryption innovation; new technology performs calculations on encrypted data without decrypting it. Computer World, June 2009."},{"key":"e_1_3_2_1_11_1","first-page":"235","volume-title":"Proceedings of the 5th Biennial Conference on Innovative Data Systems Research","author":"Curino C.","year":"2011","unstructured":"C. Curino , E. P. C. Jones , R. A. Popa , N. Malviya , E. Wu , S. Madden , H. Balakrishnan , and N. Zeldovich . Relational cloud: A database-as-a-service for the cloud . In Proceedings of the 5th Biennial Conference on Innovative Data Systems Research , pages 235 -- 241 , Pacific Grove, CA , January 2011 . C. Curino, E. P. C. Jones, R. A. Popa, N. Malviya, E. Wu, S. Madden, H. Balakrishnan, and N. Zeldovich. Relational cloud: A database-as-a-service for the cloud. In Proceedings of the 5th Biennial Conference on Innovative Data Systems Research, pages 235--241, Pacific Grove, CA, January 2011."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948124"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/646765.704120"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 9th Symposium on Operating Systems Design and Implementation","author":"Feldman A. J.","year":"2010","unstructured":"A. J. Feldman , W. P. Zeller , M. J. Freedman , and E. W. Felten . SPORC: Group collaboration using untrusted cloud resources . In Proceedings of the 9th Symposium on Operating Systems Design and Implementation , Vancouver, Canada , October 2010 . A. J. Feldman, W. P. Zeller, M. J. Freedman, and E. W. Felten. SPORC: Group collaboration using untrusted cloud resources. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation, Vancouver, Canada, October 2010."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1325851.1325912"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881412.1881445"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/519078"},{"key":"e_1_3_2_1_21_1","volume-title":"Forbes","author":"Greenberg A.","year":"2011","unstructured":"A. Greenberg . DARPA will spend 20 million to search for crypto's holy grail . Forbes , April 2011 . A. Greenberg. DARPA will spend 20 million to search for crypto's holy grail. Forbes, April 2011."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564717"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 17th Usenix Security Symposium","author":"Halderman J. A.","year":"2008","unstructured":"J. A. Halderman , S. D. Schoen , N. Heninger , W. Clarkson , W. Paul , J. A. Calandrino , A. J. Feldman , J. Appelbaum , and E. W. Felten . Lest we remember: Cold boot attacks on encryption keys . In Proceedings of the 17th Usenix Security Symposium , San Jose, CA, July- August 2008 . J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten. Lest we remember: Cold boot attacks on encryption keys. In Proceedings of the 17th Usenix Security Symposium, San Jose, CA, July-August 2008."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_28"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/50063.214387"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535706_24"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems","author":"Kohler E.","year":"2008","unstructured":"E. Kohler . Hot crap! In Proceedings of the Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems , San Francisco, CA , April 2008 . E. Kohler. Hot crap! In Proceedings of the Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems, San Francisco, CA, April 2008."},{"key":"e_1_3_2_1_28_1","first-page":"91","volume-title":"Proceedings of the 6th Symposium on Operating Systems Design and Implementation","author":"Li J.","year":"2004","unstructured":"J. Li , M. Krohn , D. Mazieres , and D. Shasha . Secure untrusted data repository (SUNDR) . In Proceedings of the 6th Symposium on Operating Systems Design and Implementation , pages 91 -- 106 , San Francisco, CA , December 2004 . J. Li, M. Krohn, D. Mazieres, and D. Shasha. Secure untrusted data repository (SUNDR). In Proceedings of the 6th Symposium on Operating Systems Design and Implementation, pages 91--106, San Francisco, CA, December 2004."},{"key":"e_1_3_2_1_29_1","first-page":"271","volume-title":"Proceedings of the 14th Usenix Security Symposium","author":"Livshits V. B.","year":"2005","unstructured":"V. B. Livshits and M. S. Lam . Finding security vulnerabilities in Java applications with static analysis . In Proceedings of the 14th Usenix Security Symposium , pages 271 -- 286 , Baltimore, MD , August 2005 . V. B. Livshits and M. S. Lam. Finding security vulnerabilities in Java applications with static analysis. In Proceedings of the 14th Usenix Security Symposium, pages 271--286, Baltimore, MD, August 2005."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 9th Symposium on Operating Systems Design and Implementation","author":"Mahajan P.","year":"2010","unstructured":"P. Mahajan , S. Setty , S. Lee , A. Clement , L. Alvisi , M. Dahlin , and M. Walfish . Depot: Cloud storage with minimal trust . In Proceedings of the 9th Symposium on Operating Systems Design and Implementation , Vancouver, Canada , October 2010 . P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi, M. Dahlin, and M. Walfish. Depot: Cloud storage with minimal trust. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation, Vancouver, Canada, October 2010."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094840"},{"key":"e_1_3_2_1_32_1","unstructured":"National Vulnerability Database. CVE statistics. http:\/\/web.nvd.nist.gov\/view\/vuln\/statistics February 2011.  National Vulnerability Database. CVE statistics. http:\/\/web.nvd.nist.gov\/view\/vuln\/statistics February 2011."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.120"},{"key":"e_1_3_2_1_34_1","unstructured":"Oracle Corporation. Oracle advanced security. http:\/\/www.oracle.com\/technetwork\/database\/options\/advanced-security\/.  Oracle Corporation. Oracle advanced security. http:\/\/www.oracle.com\/technetwork\/database\/options\/advanced-security\/."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.21"},{"key":"e_1_3_2_1_37_1","unstructured":"R. A. Popa C. M. S. Redfield N. Zeldovich and H. Balakrishnan. CryptDB web site. http:\/\/css.csail.mit.edu\/cryptdb\/.  R. A. Popa C. M. S. Redfield N. Zeldovich and H. Balakrishnan. CryptDB web site. http:\/\/css.csail.mit.edu\/cryptdb\/."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002181.2002212"},{"key":"e_1_3_2_1_40_1","unstructured":"Privacy Rights Clearinghouse. Chronology of data breaches. http:\/\/www.privacyrights.org\/data-breach.  Privacy Rights Clearinghouse. Chronology of data breaches. http:\/\/www.privacyrights.org\/data-breach."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007631"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 10th Network and Distributed System Security Symposium","author":"Shacham H.","year":"2003","unstructured":"H. Shacham , N. Modadugu , and D. Boneh . Sirius: Securing remote untrusted storage . In Proceedings of the 10th Network and Distributed System Security Symposium , 2003 . H. Shacham, N. Modadugu, and D. Boneh. Sirius: Securing remote untrusted storage. In Proceedings of the 10th Network and Distributed System Security Symposium, 2003."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.29"},{"key":"e_1_3_2_1_44_1","unstructured":"V. Shoup. NTL: A library for doing number theory. http:\/\/www.shoup.net\/ntl\/ August 2009.  V. Shoup. NTL: A library for doing number theory. http:\/\/www.shoup.net\/ntl\/ August 2009."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/1083592.1083663"},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the 21st IEEE Symposium on Security and Privacy","author":"Song D. X.","year":"2000","unstructured":"D. X. Song , D. Wagner , and A. Perrig . Practical techniques for searches on encrypted data . In Proceedings of the 21st IEEE Symposium on Security and Privacy , Oakland, CA , May 2000 . D. X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In Proceedings of the 21st IEEE Symposium on Security and Privacy, Oakland, CA, May 2000."},{"key":"e_1_3_2_1_47_1","unstructured":"M. Taylor. MySQL proxy. https:\/\/launchpad.net\/mysql-proxy.  M. Taylor. MySQL proxy. https:\/\/launchpad.net\/mysql-proxy."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/174613.174614"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/11863908_29"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629604"}],"event":{"name":"SOSP '11: ACM SIGOPS 23nd Symposium on Operating Systems Principles","location":"Cascais Portugal","acronym":"SOSP '11","sponsor":["INESC Systems and Computer Engineering Institute","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043556.2043566","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2043556.2043566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:18Z","timestamp":1750240458000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043556.2043566"}},"subtitle":["protecting confidentiality with encrypted query processing"],"short-title":[],"issued":{"date-parts":[[2011,10,23]]},"references-count":48,"alternative-id":["10.1145\/2043556.2043566","10.1145\/2043556"],"URL":"https:\/\/doi.org\/10.1145\/2043556.2043566","relation":{},"subject":[],"published":{"date-parts":[[2011,10,23]]},"assertion":[{"value":"2011-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}