{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:28:11Z","timestamp":1774160891671,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,5]],"date-time":"2017-10-05T00:00:00Z","timestamp":1507161600000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Cisco Systems grant","award":["585544"],"award-info":[{"award-number":["585544"]}]},{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["FP7-617805"],"award-info":[{"award-number":["FP7-617805"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Northrop Grumman Cybersecurity Research Consortium"},{"name":"NSF TC","award":["1117065"],"award-info":[{"award-number":["1117065"]}]},{"name":"NSF TWC","award":["1421910"],"award-info":[{"award-number":["1421910"]}]},{"name":"German Research Foundation","award":["SFB-1053"],"award-info":[{"award-number":["SFB-1053"]}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["N11AP20014"],"award-info":[{"award-number":["N11AP20014"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,5]]},"DOI":"10.1145\/2987550.2987574","type":"proceedings-article","created":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T08:42:53Z","timestamp":1474447373000},"page":"348-360","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["STYX"],"prefix":"10.1145","author":[{"given":"Julian James","family":"Stephen","sequence":"first","affiliation":[{"name":"Purdue University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Savvas","family":"Savvides","sequence":"additional","affiliation":[{"name":"Purdue University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vinaitheerthan","family":"Sundaram","sequence":"additional","affiliation":[{"name":"Purdue University and SensorHound Inc"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Masoud Saeida","family":"Ardekani","sequence":"additional","affiliation":[{"name":"Purdue University and Samsung Research America"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Patrick","family":"Eugster","sequence":"additional","affiliation":[{"name":"Purdue University and SensorHound Inc and TU Darmstadt"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Nest. https:\/\/nest.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"The GNU Multiple Precision Arithmetic Library. https:\/\/gmplib.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Samza. http:\/\/samza.apache.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Intel SGX. https:\/\/software.intel.com\/en-us\/isa-extensions\/intel-sgx#."},{"key":"e_1_3_2_1_5_1","unstructured":"Smart* Data Set for Sustainability http:\/\/traces.cs.umass.edu\/index.php\/Smart\/Smart."},{"key":"e_1_3_2_1_6_1","unstructured":"SmartThings http:\/\/www.smartthings.com\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Apache Storm. https:\/\/storm.apache.org\/."},{"key":"e_1_3_2_1_8_1","unstructured":"NYCs Taxi Trip Data. http:\/\/chriswhong.com\/open-data\/foil_nyc_taxi\/."},{"key":"e_1_3_2_1_9_1","unstructured":"Raspberry Pi 2012. https:\/\/www.raspberrypi.org."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1316689.1316732"},{"key":"e_1_3_2_1_11_1","volume-title":"Biennial Conf. on Innovative DataSystems Research (CIDR)","author":"Arasu A.","year":"2013","unstructured":"A. Arasu, S. Blanas, K. Eguro, R. Kaushik, D. Kossmann, R. Ramamurthy, and R. Venkatesan. Orthogonal security with Cipherbase. In Biennial Conf. on Innovative DataSystems Research (CIDR), 2013."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2668930.2688055"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989346"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066160"},{"key":"e_1_3_2_1_15_1","volume-title":"Workshop on Data Mining Applications in Sustainability (SustKDD)","author":"Barker S.","year":"2012","unstructured":"S. Barker, A. Mishra, D. Irwin, E. Cecchet, P. Shenoy, and J. Albrecht. Smart*: An open dataset and tools for enabling research in sustainable homes. In Workshop on Data Mining Applications in Sustainability (SustKDD), 2012."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2685048.2685070"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872857"},{"key":"e_1_3_2_1_19_1","first-page":"257","volume-title":"Biennial Conf. on Innovative DataSystems Research (CIDR)","volume":"3","author":"Cherniack M.","year":"2003","unstructured":"M. Cherniack, H. Balakrishnan, M. Balazinska, D. Carney, U. Cetintemel, Y. Xing, and S. Zdonik. Scalable distributed stream processing. In Biennial Conf. on Innovative DataSystems Research (CIDR), volume 3, pages 257--268, 2003."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/560131"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1834954"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_49"},{"key":"e_1_3_2_1_24_1","volume-title":"Homomorphic evaluation of the AES circuit. IACR Cryptology ePrint Archive","author":"Gentry C.","year":"2012","unstructured":"C. Gentry, S. Halevi, and N. P. Smart. Homomorphic evaluation of the AES circuit. IACR Cryptology ePrint Archive, 2012. Informal publication."},{"key":"e_1_3_2_1_25_1","volume-title":"Consumer perceptions of privacy in the Internet of things. Technical report","author":"Groopman J.","year":"2015","unstructured":"J. Groopman and S. Etlinger. Consumer perceptions of privacy in the Internet of things. Technical report, 2015."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2616448.2616472"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_28"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.72"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2742788"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2809695.2809723"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007662"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2643006"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509554"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488336"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2342763.2342773"}],"event":{"name":"SoCC '16: ACM Symposium on Cloud Computing","location":"Santa Clara CA USA","acronym":"SoCC '16","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Seventh ACM Symposium on Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2987550.2987574","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2987550.2987574","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2987550.2987574","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:48:35Z","timestamp":1763459315000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2987550.2987574"}},"subtitle":["Stream Processing with Trustworthy Cloud-based Execution"],"short-title":[],"issued":{"date-parts":[[2016,10,5]]},"references-count":37,"alternative-id":["10.1145\/2987550.2987574","10.1145\/2987550"],"URL":"https:\/\/doi.org\/10.1145\/2987550.2987574","relation":{},"subject":[],"published":{"date-parts":[[2016,10,5]]},"assertion":[{"value":"2016-10-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}