{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:19:25Z","timestamp":1763468365725,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T00:00:00Z","timestamp":1508803200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","award":["gift"],"award-info":[{"award-number":["gift"]}],"id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Multidisciplinary University Research Initiative","award":["FA9550- 12-1-0400"],"award-info":[{"award-number":["FA9550- 12-1-0400"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1513797"],"award-info":[{"award-number":["1513797"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007296","name":"Infosys Foundation","doi-asserted-by":"publisher","award":["gift"],"award-info":[{"award-number":["gift"]}],"id":[{"id":"10.13039\/501100007296","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978415","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T08:46:35Z","timestamp":1477385195000},"page":"229-241","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Safe Serializable Secure Scheduling"],"prefix":"10.1145","author":[{"given":"Isaac","family":"Sheff","sequence":"first","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Tom","family":"Magrino","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Jed","family":"Liu","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Andrew C.","family":"Myers","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Robbert","family":"van Renesse","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Distributed transactions: .NET framework 4.6. https:\/\/msdn.microsoft.com\/en-us\/library\/ms254973%28v=vs.110%29.aspx. Accessed: 2015-11-13."},{"key":"e_1_3_2_1_2_1","first-page":"3571","volume-title":"L. Liu and M. T. \u00d6zsu","author":"XA","year":"2009","unstructured":"XA standard. In L. Liu and M. T. \u00d6zsu, editors, Encyclopedia of Database Systems, pages 3571--3571. Springer US, 2009."},{"key":"e_1_3_2_1_3_1","unstructured":"O. Arden J. Liu T. Magrino and A. C. Myers. Fabric 0.3. Software release http:\/\/www.cs.cornell.edu\/projects\/fabric June 2016."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866341"},{"key":"e_1_3_2_1_5_1","volume-title":"Multilevel Secure Transaction Processing. Advances in Database Systems","author":"Atluri V.","year":"2000","unstructured":"V. Atluri, S. Jajodia, and B. George. Multilevel Secure Transaction Processing. Advances in Database Systems. Springer US, 2000."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/268530.268540"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2005.10.031"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/503339.503340"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043571"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2008.7"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491245"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"e_1_3_2_1_13_1","volume-title":"Addison-Wesley","author":"Denning D. E.","year":"1982","unstructured":"D. E. Denning. Cryptography and Data Security. Addison-Wesley, Reading, Massachusetts, 1982."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/359636.359712"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815425"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30065-3_11"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/360363.360369"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/289.291"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2699799.2699802"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.21"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629606"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1949221.1949248"},{"key":"e_1_3_2_1_26_1","volume-title":"Aug.","author":"Microsystems S.","year":"1997","unstructured":"S. Microsystems. JavaBeans (version 1.0.1-a). http:\/\/java.sun.com\/products\/javabeans\/docs\/spec.html, Aug. 1997."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/363516.363526"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/322154.322158"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14778\/2367502.2367523"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/882491.884230"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_32_1","first-page":"174","volume-title":"A model for delimited release. In 2003 International Symposium on Software Security, number 3233 in Lecture Notes in Computer Science","author":"Sabelfeld A.","year":"2004","unstructured":"A. Sabelfeld and A. C. Myers. A model for delimited release. In 2003 International Symposium on Software Security, number 3233 in Lecture Notes in Computer Science, pages 174--191. Springer-Verlag, 2004."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465357"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"I. Sheff T. Magrino J. Liu A. C. Myers and R. van Renesse. Safe serializable secure scheduling: Transactions and the trade-off between security and consistency. Technical Report 1813--44581 Cornell University Computing and Information Science Aug. 2016.","DOI":"10.1145\/2976749.2978415"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1214867"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.485627"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2003.1212703"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Vienna Austria","acronym":"CCS'16"},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978415","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978415","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:26:33Z","timestamp":1763457993000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978415"}},"subtitle":["Transactions and the Trade-Off Between Security and Consistency"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":37,"alternative-id":["10.1145\/2976749.2978415","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978415","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}