{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T13:04:10Z","timestamp":1754485450113,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,28]],"date-time":"2016-10-28T00:00:00Z","timestamp":1477612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["644579, 644412"],"award-info":[{"award-number":["644579, 644412"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["609611"],"award-info":[{"award-number":["609611"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,28]]},"DOI":"10.1145\/2996429.2996438","type":"proceedings-article","created":{"date-parts":[[2016,10,31]],"date-time":"2016-10-31T12:29:21Z","timestamp":1477916961000},"page":"35-46","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Encrypting Analytical Web Applications"],"prefix":"10.1145","author":[{"given":"Benny","family":"Fuhry","sequence":"first","affiliation":[{"name":"SAP Research, Karlsruhe, Germany"}]},{"given":"Walter","family":"Tighzert","sequence":"additional","affiliation":[{"name":"SAP Research, Karlsruhe, Germany"}]},{"given":"Florian","family":"Kerschbaum","sequence":"additional","affiliation":[{"name":"SAP Research, Karlsruhe, Germany"}]}],"member":"320","published-online":{"date-parts":[[2016,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/www.ciphercloud.com\/.  http:\/\/www.ciphercloud.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/www.eweek.com\/c\/a\/Security\/Salesforcecom-Acquires-SaaS-Encryption-Provider-Navajo-Systems-331154.  http:\/\/www.eweek.com\/c\/a\/Security\/Salesforcecom-Acquires-SaaS-Encryption-Provider-Navajo-Systems-331154."},{"key":"e_1_3_2_1_3_1","unstructured":"http:\/\/www.perspecsys.com\/.  http:\/\/www.perspecsys.com\/."},{"key":"e_1_3_2_1_4_1","unstructured":"http:\/\/www.vaultive.com\/.  http:\/\/www.vaultive.com\/."},{"key":"e_1_3_2_1_5_1","unstructured":"http:\/\/scn.sap.com\/servlet\/JiveServlet\/downloadBody\/60270--102--1--222286\/HANA_SPS08_NEW_SHINE.pdf.  http:\/\/scn.sap.com\/servlet\/JiveServlet\/downloadBody\/60270--102--1--222286\/HANA_SPS08_NEW_SHINE.pdf."},{"key":"e_1_3_2_1_6_1","unstructured":"Apache JMeter - apache JMeter#8482;.  Apache JMeter - apache JMeter#8482;."},{"key":"e_1_3_2_1_7_1","unstructured":"G. Aggarwal M. Bawa P. Ganesan H. Garcia-Molina K. Kenthapadi R. Motwani U. Srivastava D. Thomas and Y. Xu. Two can keep a secret: a distributed architecture for secure database services. 2005.  G. Aggarwal M. Bawa P. Ganesan H. Garcia-Molina K. Kenthapadi R. Motwani U. Srivastava D. Thomas and Y. Xu. Two can keep a secret: a distributed architecture for secure database services. 2005."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054122"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2033036.2033080"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23264"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.49"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1805974.1805978"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2590701.2590705"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.122"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"C. Evans C. Palmer and R. Sleevi. Public Key Pinning Extension for HTTP. RFC 7469 (Proposed Standard) Apr. 2015.  C. Evans C. Palmer and R. Sleevi. Public Key Pinning Extension for HTTP. RFC 7469 (Proposed Standard) Apr. 2015.","DOI":"10.17487\/RFC7469"},{"volume-title":"Springer Verlag","year":"2010","author":"Foresti S.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564717"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660297"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660326"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517570802372468"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09699-5_2"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655188.1655197"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813629"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529730"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39256-6_13"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1926325.1926343"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660277"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/11766155_29"},{"volume-title":"Proceedings of the 8th IFIP International Summer School on Privacy and Identity Management for Emerging Services and Technologies","year":"2013","author":"K\u00f6hler J.","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813651"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_1_36_1","unstructured":"M. Pizzo R. Handl and M. Zurmuehl. Odata version 4.0 part 1: protocol. Technical report OASIS http:\/\/docs.oasis-open.org\/odata\/odata\/v4.0\/odata-v4.0-part1-protocol.pdf 2014.  M. Pizzo R. Handl and M. Zurmuehl. Odata version 4.0 part 1: protocol. Technical report OASIS http:\/\/docs.oasis-open.org\/odata\/odata\/v4.0\/odata-v4.0-part1-protocol.pdf 2014."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055817"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.38"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"volume-title":"Proceedings of the 11th Symposium on Networked Systems Design and Implementation, NSDI","year":"2014","author":"Popa R. A.","key":"e_1_3_2_1_40_1"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2013.109"},{"volume-title":"Proceedings of the 21st IEEE Symposium on Security and Privacy, S&P","year":"2000","author":"Song D. X.","key":"e_1_3_2_1_43_1"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Vienna Austria","acronym":"CCS'16"},"container-title":["Proceedings of the 2016 ACM on Cloud Computing Security Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2996429.2996438","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2996429.2996438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:11Z","timestamp":1750220591000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2996429.2996438"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,28]]},"references-count":42,"alternative-id":["10.1145\/2996429.2996438","10.1145\/2996429"],"URL":"https:\/\/doi.org\/10.1145\/2996429.2996438","relation":{},"subject":[],"published":{"date-parts":[[2016,10,28]]},"assertion":[{"value":"2016-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}