{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:20Z","timestamp":1763468060382,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T00:00:00Z","timestamp":1328572800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,2,7]]},"DOI":"10.1145\/2133601.2133604","type":"proceedings-article","created":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T15:39:28Z","timestamp":1328629168000},"page":"13-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["Practical oblivious storage"],"prefix":"10.1145","author":[{"given":"Michael T.","family":"Goodrich","sequence":"first","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Michael","family":"Mitzenmacher","sequence":"additional","affiliation":[{"name":"Harvard University, Cambridge, MA, USA"}]},{"given":"Olga","family":"Ohrimenko","sequence":"additional","affiliation":[{"name":"Brown University, Providence, RI, USA"}]},{"given":"Roberto","family":"Tamassia","sequence":"additional","affiliation":[{"name":"Brown University, Providence, RI, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,2,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806716"},{"key":"e_1_3_2_1_2_1","unstructured":"Amazon. Amazon S3 Service. http:\/\/aws.amazon.com\/s3-sla\/.  Amazon. Amazon S3 Service. http:\/\/aws.amazon.com\/s3-sla\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02927-1_11"},{"key":"e_1_3_2_1_4_1","volume-title":"CSAIL","author":"Boneh D.","year":"2011","unstructured":"D. Boneh , D. Mazi\u00e8res , and R. A. Popa . Remote oblivious storage: Making oblivious RAM practical. Technical report , CSAIL , MIT , 2011 . http:\/\/dspace.mit.edu\/handle\/1721.1\/62006. D. Boneh, D. Mazi\u00e8res, and R. A. Popa. Remote oblivious storage: Making oblivious RAM practical. Technical report, CSAIL, MIT, 2011. http:\/\/dspace.mit.edu\/handle\/1721.1\/62006."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.20"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1987260.1987274"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1568639"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/2027223.2027282"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046680"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2095116.2095130"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1137\/080728743"},{"key":"e_1_3_2_1_13_1","series-title":"The Art of Computer Programming","volume-title":"Seminumerical Algorithms","author":"Knuth D. E.","year":"1998","unstructured":"D. E. Knuth . Seminumerical Algorithms , volume 2 of The Art of Computer Programming . Addison-Wesley , Reading, MA , 3 rd edition, 1998 . D. E. Knuth. Seminumerical Algorithms, volume 2 of The Art of Computer Programming. Addison-Wesley, Reading, MA, 3rd edition, 1998.","edition":"3"},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. ACM-SIAM Symp. on Discrete Algorithms (SODA), 2012","author":"Kushilevitz E.","year":"2011","unstructured":"E. Kushilevitz , S. Lu , and R. Ostrovsky . On the (in)security of hash-based oblivious RAM and a new balancing scheme . In Proc. ACM-SIAM Symp. on Discrete Algorithms (SODA), 2012 . To appear. Preliminary version in http:\/\/eprint.iacr.org\/ 2011 \/327. E. Kushilevitz, S. Lu, and R. Ostrovsky. On the (in)security of hash-based oblivious RAM and a new balancing scheme. In Proc. ACM-SIAM Symp. on Discrete Algorithms (SODA), 2012. To appear. Preliminary version in http:\/\/eprint.iacr.org\/2011\/327."},{"key":"e_1_3_2_1_15_1","unstructured":"Microsoft Corp. Windows Azure. http:\/\/www.microsoft.com\/windowsazure.  Microsoft Corp. Windows Azure. http:\/\/www.microsoft.com\/windowsazure."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.002"},{"key":"e_1_3_2_1_17_1","series-title":"LNCS","first-page":"502","volume-title":"Advances in Cryptology (CRYPTO)","author":"Pinkas B.","year":"2010","unstructured":"B. Pinkas and T. Reinman . Oblivious RAM revisited . In T. Rabin, editor, Advances in Cryptology (CRYPTO) , volume 6223 of LNCS , pages 502 -- 519 . Springer , 2010 . B. Pinkas and T. Reinman. Oblivious RAM revisited. In T. Rabin, editor, Advances in Cryptology (CRYPTO), volume 6223 of LNCS, pages 502--519. Springer, 2010."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/322123.322138"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_11"},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. Network and Distributed System Security Symposium (NDSS)","author":"Stefanov E.","year":"2012","unstructured":"E. Stefanov , E. Shi , and D. Song . Towards Practical Oblivious RAM . In Proc. Network and Distributed System Security Symposium (NDSS) , 2012 . To appear. Preliminary version in http:\/\/arxiv.org\/abs\/1106.3652. E. Stefanov, E. Shi, and D. Song. Towards Practical Oblivious RAM. In Proc. Network and Distributed System Security Symposium (NDSS), 2012. To appear. Preliminary version in http:\/\/arxiv.org\/abs\/1106.3652."},{"key":"e_1_3_2_1_21_1","volume-title":"M.-Y","author":"Vitter J. S.","year":"2008","unstructured":"J. S. Vitter . External sorting and permuting . In M.-Y . Kao, editor, Encyclopedia of Algorithms. Springer , 2008 . J. S. Vitter. External sorting and permuting. In M.-Y. Kao, editor, Encyclopedia of Algorithms. Springer, 2008."},{"key":"e_1_3_2_1_22_1","volume-title":"Usable PIR. In Proc. Network and Distributed System Security Symposium (NDSS)","author":"Williams P.","year":"2008","unstructured":"P. Williams and R. Sion . Usable PIR. In Proc. Network and Distributed System Security Symposium (NDSS) , 2008 . P. Williams and R. Sion. Usable PIR. In Proc. Network and Distributed System Security Symposium (NDSS), 2008."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455790"}],"event":{"name":"CODASPY'12: Second ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"San Antonio Texas USA","acronym":"CODASPY'12"},"container-title":["Proceedings of the second ACM conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2133601.2133604","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2133601.2133604","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:05:52Z","timestamp":1750241152000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2133601.2133604"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,2,7]]},"references-count":23,"alternative-id":["10.1145\/2133601.2133604","10.1145\/2133601"],"URL":"https:\/\/doi.org\/10.1145\/2133601.2133604","relation":{},"subject":[],"published":{"date-parts":[[2012,2,7]]},"assertion":[{"value":"2012-02-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}