{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:41Z","timestamp":1763468201754,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,15]],"date-time":"2014-09-15T00:00:00Z","timestamp":1410739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005014","name":"Northrop Grumman","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100005014","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007289","name":"Purdue Research Foundation","doi-asserted-by":"publisher","award":["204533"],"award-info":[{"award-number":["204533"]}],"id":[{"id":"10.13039\/100007289","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["N11AP20014"],"award-info":[{"award-number":["N11AP20014"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,15]]},"DOI":"10.1145\/2642937.2643006","type":"proceedings-article","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T14:22:41Z","timestamp":1410963761000},"page":"277-288","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Program analysis for secure big data processing"],"prefix":"10.1145","author":[{"given":"Julian","family":"James Stephen","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Savvas","family":"Savvides","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Russell","family":"Seidel","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Patrick","family":"Eugster","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,9,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon EC2. http:\/\/amazon.com\/ec2.  Amazon EC2. http:\/\/amazon.com\/ec2."},{"key":"e_1_3_2_1_2_1","unstructured":"Apache Pig. http:\/\/pig.apache.org.  Apache Pig. http:\/\/pig.apache.org."},{"key":"e_1_3_2_1_3_1","unstructured":"Apache PigMix benchmark. https:\/\/cwiki.apache.org\/confluence\/display\/PIG\/PigMix.  Apache PigMix benchmark. https:\/\/cwiki.apache.org\/confluence\/display\/PIG\/PigMix."},{"key":"e_1_3_2_1_4_1","unstructured":"HElib. https:\/\/github.com\/shaih\/HElib.  HElib. https:\/\/github.com\/shaih\/HElib."},{"key":"e_1_3_2_1_5_1","unstructured":"The GNU Multiple Precision Arithmetic Library. https:\/\/gmplib.org\/.  The GNU Multiple Precision Arithmetic Library. https:\/\/gmplib.org\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Wikipedia database download. http:\/\/en.wikipedia.org\/wiki\/Wikipedia: Database_download.  Wikipedia database download. http:\/\/en.wikipedia.org\/wiki\/Wikipedia: Database_download."},{"key":"e_1_3_2_1_7_1","unstructured":"Zero MQ. http:\/\/zeromq.org.  Zero MQ. http:\/\/zeromq.org."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065184"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/3088723.3088749"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.126"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806638"},{"key":"e_1_3_2_1_12_1","first-page":"1","volume-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10","author":"Chlipala A.","unstructured":"A. Chlipala . Static checking of dynamically-varying security policies in database-backed applications . In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10 , pages 1 --. USENIX Association, 2010. A. Chlipala. Static checking of dynamically-varying security policies in database-backed applications. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10, pages 1--. USENIX Association, 2010."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/560131"},{"key":"e_1_3_2_1_14_1","first-page":"137","volume-title":"OSDI","author":"Dean J.","year":"2004","unstructured":"J. Dean and S. Ghemawat . MapReduce: Simplified Data Processing on Large Clusters . In OSDI , pages 137 -- 150 , 2004 . J. Dean and S. Ghemawat. MapReduce: Simplified Data Processing on Large Clusters. In OSDI, pages 137--150, 2004."},{"key":"e_1_3_2_1_15_1","volume-title":"Process your Data with Apache Pig","author":"DeveloperWorks I.","year":"2012","unstructured":"I. DeveloperWorks . Process your Data with Apache Pig , 2012 . http:\/\/www.ibm.com\/developerworks\/library\/l-apachepigdataquery\/. I. DeveloperWorks. Process your Data with Apache Pig, 2012. http:\/\/www.ibm.com\/developerworks\/library\/l-apachepigdataquery\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773173"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_32"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_3_2_1_19_1","first-page":"75","volume-title":"Attribute-Based. In CRYPTO","volume":"1","author":"Gentry C.","year":"2013","unstructured":"C. Gentry , A. Sahai , and B. Waters . Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster , Attribute-Based. In CRYPTO , volume 1 , pages 75 -- 92 , Aug. 2013 . C. Gentry, A. Sahai, and B. Waters. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based. In CRYPTO, volume 1, pages 75--92, Aug. 2013."},{"key":"e_1_3_2_1_20_1","unstructured":"Hadoop. Hadoop. http:\/\/hadoop.apache.org\/.  Hadoop. Hadoop. http:\/\/hadoop.apache.org\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273005"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1103845.1094840"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2012.30"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1255329.1255333"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376726"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.21"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_1_29_1","first-page":"297","volume-title":"NSDI","author":"Roy I.","year":"2010","unstructured":"I. Roy , S. T. V. Setty , A. Kilzer , V. Shmatikov , and E. Witchel . Airavat: Security and Privacy for MapReduce . In NSDI , pages 297 -- 312 , 2010 . I. Roy, S. T. V. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: Security and Privacy for MapReduce. In NSDI, pages 297--312, 2010."},{"key":"e_1_3_2_1_30_1","first-page":"10","volume-title":"Proceedings of the 21st USENIX Conference on Security Symposium","author":"Santos N.","year":"2012","unstructured":"N. Santos , R. Rodrigues , K. P. Gummadi , and S. Saroiu . Policy-sealed data: A new abstraction for building trusted cloud services . In Proceedings of the 21st USENIX Conference on Security Symposium , pages 10 -- 10 . USENIX Association , 2012 . N. Santos, R. Rodrigues, K. P. Gummadi, and S. Saroiu. Policy-sealed data: A new abstraction for building trusted cloud services. In Proceedings of the 21st USENIX Conference on Security Symposium, pages 10--10. USENIX Association, 2012."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/647930.740558"},{"key":"e_1_3_2_1_32_1","volume-title":"HotClouds","author":"Schwarzkopf M.","year":"2012","unstructured":"M. Schwarzkopf , D. Murray , and S. Hand . The Seven Deadly Sins of Cloud Computing Research . In HotClouds , 2012 . M. Schwarzkopf, D. Murray, and S. Hand. The Seven Deadly Sins of Cloud Computing Research. In HotClouds, 2012."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2010.5496972"},{"key":"e_1_3_2_1_34_1","first-page":"82","volume-title":"Middleware","author":"Stephen J. J.","year":"2013","unstructured":"J. J. Stephen and P. Eugster . Assured Cloud-Based Data Analysis with ClusterBFT . In Middleware , pages 82 -- 102 , 2013 . J. J. Stephen and P. Eugster. Assured Cloud-Based Data Analysis with ClusterBFT. In Middleware, pages 82--102, 2013."},{"key":"e_1_3_2_1_35_1","volume-title":"HotCloud","author":"Stephen J. J.","year":"2014","unstructured":"J. J. Stephen , S. Savvides , R. Seidel , and P. Eugster . Practical Confidentiality Preserving Big Data Analysis . In HotCloud , 2014 . J. J. Stephen, S. Savvides, R. Seidel, and P. Eugster. Practical Confidentiality Preserving Big Data Analysis. In HotCloud, 2014."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509554"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488336"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629604"},{"key":"e_1_3_2_1_39_1","volume-title":"HotCloud'10","author":"Zaharia M.","year":"2010","unstructured":"M. Zaharia , M. Chowdhury , M. J. Franklin , S. Shenker , and I. Stoica . Spark: Cluster computing with working sets . HotCloud'10 , 2010 . M. Zaharia, M. Chowdhury, M. J. Franklin, S. Shenker, and I. Stoica. Spark: Cluster computing with working sets. HotCloud'10, 2010."}],"event":{"name":"ASE '14: ACM\/IEEE International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","M\u00e4lardalen University M\u00e4lardalen University","IEEE CS"],"location":"Vasteras Sweden","acronym":"ASE '14"},"container-title":["Proceedings of the 29th ACM\/IEEE International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642937.2643006","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2642937.2643006","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:09Z","timestamp":1750229769000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642937.2643006"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,15]]},"references-count":39,"alternative-id":["10.1145\/2642937.2643006","10.1145\/2642937"],"URL":"https:\/\/doi.org\/10.1145\/2642937.2643006","relation":{},"subject":[],"published":{"date-parts":[[2014,9,15]]},"assertion":[{"value":"2014-09-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}