{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:54Z","timestamp":1750306554141,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,21]],"date-time":"2015-10-21T00:00:00Z","timestamp":1445385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["1440\/14"],"award-info":[{"award-number":["1440\/14"]}],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,21]]},"DOI":"10.1145\/2814228.2814237","type":"proceedings-article","created":{"date-parts":[[2015,11,3]],"date-time":"2015-11-03T20:06:54Z","timestamp":1446581214000},"page":"76-89","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Separation of powers in the cloud: where applications and users become peers"],"prefix":"10.1145","author":[{"given":"David H.","family":"Lorenz","sequence":"first","affiliation":[{"name":"Open University, Israel \/ Technion, Israel"}]},{"given":"Boaz","family":"Rosenan","sequence":"additional","affiliation":[{"name":"Open University, Israel \/ University of Haifa, Israel"}]}],"member":"320","published-online":{"date-parts":[[2015,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/155183.155225"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065214"},{"volume-title":"Addison Wesley","year":"1995","author":"Abiteboul S.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2494444.2494447"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755937"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24206-9_16"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588562"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"M. Y. Becker C. Fournet and A. D. Gordon. SecPAL: Design and semantics of a decentralized authorization language. Journal of Computer Security (JCS) 18(4):597\u2013643 2010.   M. Y. Becker C. Fournet and A. D. Gordon. SecPAL: Design and semantics of a decentralized authorization language. Journal of Computer Security (JCS) 18(4):597\u2013643 2010.","DOI":"10.3233\/JCS-2009-0364"},{"issue":"1","key":"e_1_3_2_1_9_1","first-page":"75","article-title":"Disruptive technologies: Catching the wave","volume":"13","author":"Bower J. L.","year":"1996","journal-title":"The Journal of Product Innovation Management"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1929529.1929536"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640108"},{"key":"e_1_3_2_1_12_1","unstructured":"Y. Bu V. R. Borkar M. J. Carey J. Rosen N. Polyzotis T. Condie M. Weimer and R. Ramakrishnan. Scaling Datalog for machine learning on big data. CoRR abs\/1203.0160 2012.  Y. Bu V. R. Borkar M. J. Carey J. Rosen N. Polyzotis T. Condie M. Weimer and R. Ramakrishnan. Scaling Datalog for machine learning on big data. CoRR abs\/1203.0160 2012."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559795.1559809"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.43410"},{"key":"e_1_3_2_1_15_1","unstructured":"K. L. Clark and S.-A. T\u00e4rnlund. Logic Programming. Academic Press New York 1982.   K. L. Clark and S.-A. T\u00e4rnlund. Logic Programming. Academic Press New York 1982."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"W. F. Clocksin and C. S. Mellish. Programming in Prolog. Springer fifth edition 2003.  W. F. Clocksin and C. S. Mellish. Programming in Prolog. Springer fifth edition 2003.","DOI":"10.1007\/978-3-642-55481-0"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830540"},{"key":"e_1_3_2_1_18_1","unstructured":"E. Evans. Cassandra by example May 2010. http:\/\/www. rackspace.com\/blog\/cassandra-by-example\/.  E. Evans. Cassandra by example May 2010. http:\/\/www. rackspace.com\/blog\/cassandra-by-example\/."},{"key":"e_1_3_2_1_19_1","unstructured":"D. Featherston. Cassandra: Principles and application. CS591 Advanced Seminar Department of Computer Science University of Illinois at Urbana-Champaign Aug. 2010. http: \/\/d2fn.com\/cassandra-cs591-su10-fthrstn2.pdf.  D. Featherston. Cassandra: Principles and application. CS591 Advanced Seminar Department of Computer Science University of Illinois at Urbana-Champaign Aug. 2010. http: \/\/d2fn.com\/cassandra-cs591-su10-fthrstn2.pdf."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2008.8"},{"key":"e_1_3_2_1_21_1","first-page":"366","volume-title":"Proceedings of the 6th International Conference on Pervasive Computing and Applications (ICPCA\u201911)","author":"Han J.","year":"2011"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989456"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1743546.1743574"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/359131.359136"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/35043.35046"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1773912.1773922"},{"volume-title":"Prentice Hall","year":"1989","author":"van der Lans R. F.","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.185"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661136.2661151"},{"volume-title":"DC 20036, May 2015.","author":"Madden M.","key":"e_1_3_2_1_31_1"},{"volume-title":"MIT Press","year":"2003","author":"Messerschmitt D. G.","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","unstructured":"J. Patel. Cassandra data modeling best practices part 1 July 2012. http:\/\/www.ebaytechblog.com\/2012\/07\/16\/ cassandra-data-modeling-best-practices-part-1\/.  J. Patel. Cassandra data modeling best practices part 1 July 2012. http:\/\/www.ebaytechblog.com\/2012\/07\/16\/ cassandra-data-modeling-best-practices-part-1\/."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1394127.1394128"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/0743-1066(94)00039-9"},{"volume-title":"Addison-Wesley","year":"2012","author":"Sadalage P. J.","key":"e_1_3_2_1_36_1"}],"event":{"name":"SPLASH '15: Conference on Systems, Programming, Languages, and Applications: Software for Humanity","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Pittsburgh PA USA","acronym":"SPLASH '15"},"container-title":["2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (Onward!)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2814228.2814237","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2814228.2814237","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:47Z","timestamp":1750227167000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2814228.2814237"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,21]]},"references-count":36,"alternative-id":["10.1145\/2814228.2814237","10.1145\/2814228"],"URL":"https:\/\/doi.org\/10.1145\/2814228.2814237","relation":{},"subject":[],"published":{"date-parts":[[2015,10,21]]},"assertion":[{"value":"2015-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}