{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T14:22:05Z","timestamp":1768400525630,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,9,24]],"date-time":"2017-09-24T00:00:00Z","timestamp":1506211200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["#1117065, #1421910, #1618923"],"award-info":[{"award-number":["#1117065, #1421910, #1618923"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100008536","name":"Amazon Web Services","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100008536","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004351","name":"Cisco Systems","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004351","id-type":"DOI","asserted-by":"publisher"}]},{"name":"ERC","award":["#617805"],"award-info":[{"award-number":["#617805"]}]},{"DOI":"10.13039\/100005014","name":"Northrop Grumman","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100005014","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,9,24]]},"DOI":"10.1145\/3127479.3129256","type":"proceedings-article","created":{"date-parts":[[2017,9,27]],"date-time":"2017-09-27T12:34:00Z","timestamp":1506515640000},"page":"479-492","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Secure data types"],"prefix":"10.1145","author":[{"given":"Savvas","family":"Savvides","sequence":"first","affiliation":[{"name":"Purdue University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Julian James","family":"Stephen","sequence":"additional","affiliation":[{"name":"Purdue University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Masoud Saeida","family":"Ardekani","sequence":"additional","affiliation":[{"name":"Purdue University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vinaitheerthan","family":"Sundaram","sequence":"additional","affiliation":[{"name":"Purdue University and SensorHound Inc"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Patrick","family":"Eugster","sequence":"additional","affiliation":[{"name":"Purdue University and SensorHound Inc and TU Darmstadt"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2017,9,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apache Pig. http:\/\/pig.apache.org.  Apache Pig. http:\/\/pig.apache.org."},{"key":"e_1_3_2_1_2_1","unstructured":"BigDigits multiple-precision arithmetic library. http:\/\/www.di-mgt.com.au\/bigdigits.html.  BigDigits multiple-precision arithmetic library. http:\/\/www.di-mgt.com.au\/bigdigits.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Intel SGX. https:\/\/software.intel.com\/en-us\/isa-extensions\/intel-sgx.  Intel SGX. https:\/\/software.intel.com\/en-us\/isa-extensions\/intel-sgx."},{"key":"e_1_3_2_1_4_1","unstructured":"SGX Virtualization. https:\/\/01.org\/intel-software-guard-extensions\/sgx-virtualization.  SGX Virtualization. https:\/\/01.org\/intel-software-guard-extensions\/sgx-virtualization."},{"key":"e_1_3_2_1_5_1","unstructured":"2014. Intel Software Guard Extensions Programming Reference. (2014). https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf.  2014. Intel Software Guard Extensions Programming Reference. (2014). https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf."},{"key":"e_1_3_2_1_6_1","unstructured":"2014. Synopsys Inc. Open Source Report 2014. (2014). http:\/\/go.coverity.com\/rs\/157-LQW-289\/images\/2014-Coverity-Scan-Report.pdf.  2014. Synopsys Inc. Open Source Report 2014. (2014). http:\/\/go.coverity.com\/rs\/157-LQW-289\/images\/2014-Coverity-Scan-Report.pdf."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMlim035027"},{"key":"e_1_3_2_1_8_1","volume-title":"Orthogonal Security with Cipherbase. In Biennial Conf. on Innovative DataSystems Research (CIDR).","author":"Arasu Arvind","year":"2013","unstructured":"Arvind Arasu , Spyros Blanas , Ken Eguro , Raghav Kaushik , Donald Kossmann , Ravishankar Ramamurthy , and Ramarathnam Venkatesan . 2013 . Orthogonal Security with Cipherbase. In Biennial Conf. on Innovative DataSystems Research (CIDR). Arvind Arasu, Spyros Blanas, Ken Eguro, Raghav Kaushik, Donald Kossmann, Ravishankar Ramamurthy, and Ramarathnam Venkatesan. 2013. Orthogonal Security with Cipherbase. In Biennial Conf. on Innovative DataSystems Research (CIDR)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Alessandro Armando Roberto Carbone Luca Compagna Jorge Cuellar and Llanos Tobarra. 2008. Formal Analysis of SAML 2.0 Web Browser Single Sign-on: Breaking the SAML-based Single Sign-on for Google Apps. In W. on Formal Methods in Security Engineering (FMSE). 1--10.  Alessandro Armando Roberto Carbone Luca Compagna Jorge Cuellar and Llanos Tobarra. 2008. Formal Analysis of SAML 2.0 Web Browser Single Sign-on: Breaking the SAML-based Single Sign-on for Google Apps. In W. on Formal Methods in Security Engineering (FMSE). 1--10.","DOI":"10.1145\/1456396.1456397"},{"key":"e_1_3_2_1_10_1","volume-title":"SCONE: Secure Linux Containers with Intel SGX. In Symp. on Op. Sys. Design and Implementation (OSDI). 689--703","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov , Bohdan Trach , Franz Gregor , Thomas Knauth , Andre Martin , Christian Priebe , Joshua Lind , Divya Muthukumaran , Dan O'Keefe , Mark L Stillwell , David Goltzsche , Dave Eyers , R\u00fcdiger Kapitza , Peter Pietzuch , and Christof Fetzer . 2016 . SCONE: Secure Linux Containers with Intel SGX. In Symp. on Op. Sys. Design and Implementation (OSDI). 689--703 . Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'Keefe, Mark L Stillwell, David Goltzsche, Dave Eyers, R\u00fcdiger Kapitza, Peter Pietzuch, and Christof Fetzer. 2016. SCONE: Secure Linux Containers with Intel SGX. In Symp. on Op. Sys. Design and Implementation (OSDI). 689--703."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.38"},{"key":"e_1_3_2_1_12_1","volume-title":"Symp. on Op. Sys. Design and Implementation (OSDI). 267--283","author":"Baumann Andrew","unstructured":"Andrew Baumann , Marcus Peinado , and Galen C. Hunt . 2014. Shielding Applications from an Untrusted Cloud with Haven . In Symp. on Op. Sys. Design and Implementation (OSDI). 267--283 . Andrew Baumann, Marcus Peinado, and Galen C. Hunt. 2014. Shielding Applications from an Untrusted Cloud with Haven. In Symp. on Op. Sys. Design and Implementation (OSDI). 267--283."},{"key":"e_1_3_2_1_13_1","volume-title":"Dhinakaran Vinayagamurthy and Sergey Gorbunov","author":"Fisch Dan Boneh","year":"2016","unstructured":"Dan Boneh Ben A. Fisch , Dhinakaran Vinayagamurthy and Sergey Gorbunov . 2016 . Iron : Functional Encryption using Intel SGX. Cryptology ePrint Archive, Report 2016\/1071. (2016). http:\/\/eprint.iacr.org\/2016\/1071. Dan Boneh Ben A. Fisch, Dhinakaran Vinayagamurthy and Sergey Gorbunov. 2016. Iron: Functional Encryption using Intel SGX. Cryptology ePrint Archive, Report 2016\/1071. (2016). http:\/\/eprint.iacr.org\/2016\/1071."},{"key":"e_1_3_2_1_14_1","volume-title":"Order-Preserving Symmetric Encryption. In Int. Conf. on The Theory and Applications of Cryptographic Techniques (EUROCRYPT). 224--241","author":"Boldyreva Alexandra","year":"2009","unstructured":"Alexandra Boldyreva , Nathan Chenette , Younho Lee , and Adam O'Neill . 2009 . Order-Preserving Symmetric Encryption. In Int. Conf. on The Theory and Applications of Cryptographic Techniques (EUROCRYPT). 224--241 . Alexandra Boldyreva, Nathan Chenette, Younho Lee, and Adam O'Neill. 2009. Order-Preserving Symmetric Encryption. In Int. Conf. on The Theory and Applications of Cryptographic Techniques (EUROCRYPT). 224--241."},{"key":"e_1_3_2_1_15_1","volume-title":"Order-preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions. In Annual Int. Cryptology Conf. (CRYPTO). Springer-Verlag, 578--595","author":"Boldyreva Alexandra","year":"2011","unstructured":"Alexandra Boldyreva , Nathan Chenette , and Adam O'Neill . 2011 . Order-preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions. In Annual Int. Cryptology Conf. (CRYPTO). Springer-Verlag, 578--595 . Alexandra Boldyreva, Nathan Chenette, and Adam O'Neill. 2011. Order-preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions. In Annual Int. Cryptology Conf. (CRYPTO). Springer-Verlag, 578--595."},{"key":"e_1_3_2_1_16_1","volume-title":"Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation. In Int. Conf. on The Theory and Applications of Cryptographic Techniques (EUROCRYPT). 563--594","author":"Boneh Dan","year":"2015","unstructured":"Dan Boneh , Kevin Lewi , Mariana Raykova , Amit Sahai , Mark Zhandry , and Joe Zimmerman . 2015 . Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation. In Int. Conf. on The Theory and Applications of Cryptographic Techniques (EUROCRYPT). 563--594 . Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, and Joe Zimmerman. 2015. Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation. In Int. Conf. on The Theory and Applications of Cryptographic Techniques (EUROCRYPT). 563--594."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2988336.2988350"},{"key":"e_1_3_2_1_18_1","volume-title":"Horner's method of approximation anticipated by Ruffini. Bull. Amer. Math. Soc. 17, 8 (05","author":"Cajori Florian","year":"1911","unstructured":"Florian Cajori . 1911. Horner's method of approximation anticipated by Ruffini. Bull. Amer. Math. Soc. 17, 8 (05 1911 ), 409--414. Florian Cajori. 1911. Horner's method of approximation anticipated by Ruffini. Bull. Amer. Math. Soc. 17, 8 (05 1911), 409--414."},{"key":"e_1_3_2_1_19_1","volume-title":"Practical Order-Revealing Encryption with Limited Leakage. In Int. Conf. on Fast Software Encryption (FSE) (FSE","author":"Chenette Nathan","year":"2016","unstructured":"Nathan Chenette , Kevin Lewi , Stephen A. Weis , and David J. Wu . 2016 . Practical Order-Revealing Encryption with Limited Leakage. In Int. Conf. on Fast Software Encryption (FSE) (FSE 2016 ). 474--493. Nathan Chenette, Kevin Lewi, Stephen A. Weis, and David J. Wu. 2016. Practical Order-Revealing Encryption with Limited Leakage. In Int. Conf. on Fast Software Encryption (FSE) (FSE 2016). 474--493."},{"key":"e_1_3_2_1_20_1","unstructured":"Cloudera. A TPC-DS like benchmark for Cloudera Impala. https:\/\/github.com\/cloudera\/impala-tpcds-kit.  Cloudera. A TPC-DS like benchmark for Cloudera Impala. https:\/\/github.com\/cloudera\/impala-tpcds-kit."},{"key":"e_1_3_2_1_21_1","volume-title":"FNR: Arbitrary Length Small Domain Block Cipher Proposal. In Int. Conf. on Security, Privacy, and Applied Cryptography Engineering (SPACE). 146--154","author":"Dara Sashank","unstructured":"Sashank Dara and Scott R. Fluhrer . 2014 . FNR: Arbitrary Length Small Domain Block Cipher Proposal. In Int. Conf. on Security, Privacy, and Applied Cryptography Engineering (SPACE). 146--154 . Sashank Dara and Scott R. Fluhrer. 2014. FNR: Arbitrary Length Small Domain Block Cipher Proposal. In Int. Conf. on Security, Privacy, and Applied Cryptography Engineering (SPACE). 146--154."},{"key":"e_1_3_2_1_23_1","volume-title":"A Lattice Model of Secure Information Flow. Commun. ACM","author":"Denning Dorothy E.","year":"1976","unstructured":"Dorothy E. Denning . 1976. A Lattice Model of Secure Information Flow. Commun. ACM ( 1976 ), 236--243. Dorothy E. Denning. 1976. A Lattice Model of Secure Information Flow. Commun. ACM (1976), 236--243."},{"key":"e_1_3_2_1_24_1","volume-title":"Denning","author":"Denning Dorothy E.","year":"1977","unstructured":"Dorothy E. Denning and Peter J . Denning . 1977 . Certification of Programs for Secure Information Flow. Commun. ACM ( 1977), 504--513. Dorothy E. Denning and Peter J. Denning. 1977. Certification of Programs for Secure Information Flow. Commun. ACM (1977), 504--513."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_3_2_1_26_1","volume-title":"Rich Queries on Encrypted Data: Beyond Exact Matches. In Symp. on Research in Computer Security (ESORICS). 123--145","author":"Faber Sky","year":"2015","unstructured":"Sky Faber , Stanislaw Jarecki , Hugo Krawczyk , Quan Nguyen , Marcel-Catalin Rosu , and Michael Steiner . 2015 . Rich Queries on Encrypted Data: Beyond Exact Matches. In Symp. on Research in Computer Security (ESORICS). 123--145 . Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel-Catalin Rosu, and Michael Steiner. 2015. Rich Queries on Encrypted Data: Beyond Exact Matches. In Symp. on Research in Computer Security (ESORICS). 123--145."},{"key":"e_1_3_2_1_27_1","volume-title":"Refinement Types for ML. In Conf. on Prog. Lang. Design and Implementation (PLDI). ACM, 268--277","author":"Freeman Tim","year":"1991","unstructured":"Tim Freeman and Frank Pfenning . 1991 . Refinement Types for ML. In Conf. on Prog. Lang. Design and Implementation (PLDI). ACM, 268--277 . Tim Freeman and Frank Pfenning. 1991. Refinement Types for ML. In Conf. on Prog. Lang. Design and Implementation (PLDI). ACM, 268--277."},{"key":"e_1_3_2_1_29_1","volume-title":"Smart","author":"Gentry Craig","year":"2012","unstructured":"Craig Gentry , Shai Halevi , and Nigel P . Smart . 2012 . Homomorphic Evaluation of the AES Circuit. IACR Cryptology ePrint Archive (2012). Informal publication. Craig Gentry, Shai Halevi, and Nigel P. Smart. 2012. Homomorphic Evaluation of the AES Circuit. IACR Cryptology ePrint Archive (2012). Informal publication."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.44"},{"key":"e_1_3_2_1_31_1","volume-title":"Int. Conf. on the Mgt. of Data (SIGMOD). 216--227","author":"Hacig\u00fcm\u00fcs Hakan","year":"2002","unstructured":"Hakan Hacig\u00fcm\u00fcs , Balakrishna R. Iyer , Chen Li , and Sharad Mehrotra . 2002 . Executing SQL over encrypted data in the database-service-provider model . In Int. Conf. on the Mgt. of Data (SIGMOD). 216--227 . Hakan Hacig\u00fcm\u00fcs, Balakrishna R. Iyer, Chen Li, and Sharad Mehrotra. 2002. Executing SQL over encrypted data in the database-service-provider model. In Int. Conf. on the Mgt. of Data (SIGMOD). 216--227."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Alon Y. Halevy. 2001. Answering Queries Using Views: A Survey. The VLDB Journal 270--294.  Alon Y. Halevy. 2001. Answering Queries Using Views: A Survey. The VLDB Journal 270--294.","DOI":"10.1007\/s007780100054"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"A. Hosangadi F. Fallah and R. Kastner. 2006. Optimizing Polynomial Expressions by Algebraic Factorization and Common Subexpression Elimination. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2006) 2012--2022.  A. Hosangadi F. Fallah and R. Kastner. 2006. Optimizing Polynomial Expressions by Algebraic Factorization and Common Subexpression Elimination. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2006) 2012--2022.","DOI":"10.1109\/TCAD.2006.875712"},{"key":"e_1_3_2_1_34_1","volume-title":"Frequency-Hiding Order-Preserving Encryption. In Int. Conf. on on Computer and Communications Security (CCS). ACM, 656--667","author":"Kerschbaum Florian","year":"2015","unstructured":"Florian Kerschbaum . 2015 . Frequency-Hiding Order-Preserving Encryption. In Int. Conf. on on Computer and Communications Security (CCS). ACM, 656--667 . Florian Kerschbaum. 2015. Frequency-Hiding Order-Preserving Encryption. In Int. Conf. on on Computer and Communications Security (CCS). ACM, 656--667."},{"key":"e_1_3_2_1_35_1","volume-title":"Sylvia Ratnasamy, and Zhi Liu.","author":"Lan Chang","year":"2016","unstructured":"Chang Lan , Justine Sherry , Raluca Ada Popa , Sylvia Ratnasamy, and Zhi Liu. 2016 . Embark : Securely Outsourcing Middleboxes to the Cloud. In Networked Sys. Design and Implem. (NSDI) . 255--273. Chang Lan, Justine Sherry, Raluca Ada Popa, Sylvia Ratnasamy, and Zhi Liu. 2016. Embark: Securely Outsourcing Middleboxes to the Cloud. In Networked Sys. Design and Implem. (NSDI). 255--273."},{"key":"e_1_3_2_1_36_1","volume-title":"Int. Conf. on on Computer and Communications Security (CCS). 1167--1178","author":"Lewi Kevin","unstructured":"Kevin Lewi and David J. Wu . 2016. Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds . In Int. Conf. on on Computer and Communications Security (CCS). 1167--1178 . Kevin Lewi and David J. Wu. 2016. Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds. In Int. Conf. on on Computer and Communications Security (CCS). 1167--1178."},{"key":"e_1_3_2_1_37_1","volume-title":"Savagaonkar","author":"McKeen Frank","year":"2013","unstructured":"Frank McKeen , Ilya Alexandrovich , Alex Berenzon , Carlos V. Rozas , Hisham Shafi , Vedvyas Shanbhogue , and Uday R . Savagaonkar . 2013 . Innovative instructions and software model for isolated execution. In W. on Hardware and Architectural Support for Security and Privacy (HASP) . 10. Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V. Rozas, Hisham Shafi, Vedvyas Shanbhogue, and Uday R. Savagaonkar. 2013. Innovative instructions and software model for isolated execution. In W. on Hardware and Architectural Support for Security and Privacy (HASP). 10."},{"key":"e_1_3_2_1_38_1","volume-title":"Inference Attacks on Property-Preserving Encrypted Databases. In Int. Conf. on on Computer and Communications Security (CCS). ACM, 644--655","author":"Naveed Muhammad","unstructured":"Muhammad Naveed , Seny Kamara , and Charles V. Wright . 2015 . Inference Attacks on Property-Preserving Encrypted Databases. In Int. Conf. on on Computer and Communications Security (CCS). ACM, 644--655 . Muhammad Naveed, Seny Kamara, and Charles V. Wright. 2015. Inference Attacks on Property-Preserving Encrypted Databases. In Int. Conf. on on Computer and Communications Security (CCS). ACM, 644--655."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376726"},{"key":"e_1_3_2_1_40_1","unstructured":"Kay Ousterhout Ryan Rasti Sylvia Ratnasamy Scott Shenker and Byung-Gon Chun. 2015. Making Sense of Performance in Data Analytics Frameworks. In Networked Sys. Design and Implem. (NSDI). 293--307.  Kay Ousterhout Ryan Rasti Sylvia Ratnasamy Scott Shenker and Byung-Gon Chun. 2015. Making Sense of Performance in Data Analytics Frameworks. In Networked Sys. Design and Implem. (NSDI). 293--307."},{"key":"e_1_3_2_1_41_1","volume-title":"Public-key Cryptosystems Based on Composite Degree Residuosity Classes. In Int. Conf. on The Theory and Applications of Cryptographic Techniques (EUROCRYPT). 223--238","author":"Paillier Pascal","year":"1999","unstructured":"Pascal Paillier . 1999 . Public-key Cryptosystems Based on Composite Degree Residuosity Classes. In Int. Conf. on The Theory and Applications of Cryptographic Techniques (EUROCRYPT). 223--238 . Pascal Paillier. 1999. Public-key Cryptosystems Based on Composite Degree Residuosity Classes. In Int. Conf. on The Theory and Applications of Cryptographic Techniques (EUROCRYPT). 223--238."},{"key":"e_1_3_2_1_42_1","volume-title":"Symp. on Op. Sys. Design and Implementation (OSDI).","author":"Papadimitriou Antonis","year":"2016","unstructured":"Antonis Papadimitriou , Ranjita Bhagwan , Nishanth Chandran , Ramachandran Ramjee , Andreas Haeberlen , Harmeet Singh , Abhishek Modi , and Saikrishna Badrinarayanan . 2016 . Big Data Analytics over Encrypted Datasets with Seabed . In Symp. on Op. Sys. Design and Implementation (OSDI). Antonis Papadimitriou, Ranjita Bhagwan, Nishanth Chandran, Ramachandran Ramjee, Andreas Haeberlen, Harmeet Singh, Abhishek Modi, and Saikrishna Badrinarayanan. 2016. Big Data Analytics over Encrypted Datasets with Seabed. In Symp. on Op. Sys. Design and Implementation (OSDI)."},{"key":"e_1_3_2_1_43_1","volume-title":"An Ideal-Security Protocol for Order-Preserving Encoding. In Symp. on Security and Privacy (S&P). 463--477","author":"Popa Raluca Ada","year":"2013","unstructured":"Raluca Ada Popa , Frank H. Li , and Nickolai Zeldovich . 2013 . An Ideal-Security Protocol for Order-Preserving Encoding. In Symp. on Security and Privacy (S&P). 463--477 . Raluca Ada Popa, Frank H. Li, and Nickolai Zeldovich. 2013. An Ideal-Security Protocol for Order-Preserving Encoding. In Symp. on Security and Privacy (S&P). 463--477."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_46_1","volume-title":"Talos: Encrypted Query Processing for the Internet of Things. In Conf. on Embedded Networked Sensor Sys. (SenSys).","author":"Shafagh Hossein","year":"2015","unstructured":"Hossein Shafagh , Anwar Hithnawi , Andreas Droscher , Simon Duquennoy , and Wen Hu . 2015 . Talos: Encrypted Query Processing for the Internet of Things. In Conf. on Embedded Networked Sensor Sys. (SenSys). Hossein Shafagh, Anwar Hithnawi, Andreas Droscher, Simon Duquennoy, and Wen Hu. 2015. Talos: Encrypted Query Processing for the Internet of Things. In Conf. on Embedded Networked Sensor Sys. (SenSys)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787502"},{"key":"e_1_3_2_1_48_1","volume-title":"Practical Techniques for Searches on Encrypted Data. In Symp. on Security and Privacy (S&P). 44--55","author":"Song Dawn Xiaodong","year":"2000","unstructured":"Dawn Xiaodong Song , David Wagner , and Adrian Perrig . 2000 . Practical Techniques for Searches on Encrypted Data. In Symp. on Security and Privacy (S&P). 44--55 . Dawn Xiaodong Song, David Wagner, and Adrian Perrig. 2000. Practical Techniques for Searches on Encrypted Data. In Symp. on Security and Privacy (S&P). 44--55."},{"key":"e_1_3_2_1_49_1","unstructured":"Julian James Stephen Savvas Savvides Russell Seidel and Patrick Eugster. 2014. Practical Confidentiality Preserving Big Data Analysis. In W. on Hot Topics in Cloud Computing (HotCloud).  Julian James Stephen Savvas Savvides Russell Seidel and Patrick Eugster. 2014. Practical Confidentiality Preserving Big Data Analysis. In W. on Hot Topics in Cloud Computing (HotCloud)."},{"key":"e_1_3_2_1_50_1","volume-title":"Int. Conf. on Automated Software Engineering (ASE). 277--288","author":"Stephen Julian James","year":"2014","unstructured":"Julian James Stephen , Savvas Savvides , Russell Seidel , and Patrick Th. Eugster . 2014 . Program analysis for secure big data processing . In Int. Conf. on Automated Software Engineering (ASE). 277--288 . Julian James Stephen, Savvas Savvides, Russell Seidel, and Patrick Th. Eugster. 2014. Program analysis for secure big data processing. In Int. Conf. on Automated Software Engineering (ASE). 277--288."},{"key":"e_1_3_2_1_51_1","volume-title":"STYX: Stream Processing with Trustworthy Cloud-based Execution. In Symp. on Cloud Computing (SoCC). 348--360","author":"Stephen Julian James","year":"2016","unstructured":"Julian James Stephen , Savvas Savvides , Vinaitheerthan Sundaram , Masoud Saeida Ardekani , and Patrick Eugster . 2016 . STYX: Stream Processing with Trustworthy Cloud-based Execution. In Symp. on Cloud Computing (SoCC). 348--360 . Julian James Stephen, Savvas Savvides, Vinaitheerthan Sundaram, Masoud Saeida Ardekani, and Patrick Eugster. 2016. STYX: Stream Processing with Trustworthy Cloud-based Execution. In Symp. on Cloud Computing (SoCC). 348--360."},{"key":"e_1_3_2_1_52_1","volume-title":"Conf. on Object-Oriented Prog. Sys., Lang. and Applications (OOPSLA). 271--286","author":"Tetali Sai Deep","unstructured":"Sai Deep Tetali , Mohsen Lesani , Rupak Majumdar , and Todd D. Millstein . 2013. Mr-Crypt: Static analysis for secure cloud computations . In Conf. on Object-Oriented Prog. Sys., Lang. and Applications (OOPSLA). 271--286 . Sai Deep Tetali, Mohsen Lesani, Rupak Majumdar, and Todd D. Millstein. 2013. Mr-Crypt: Static analysis for secure cloud computations. In Conf. on Object-Oriented Prog. Sys., Lang. and Applications (OOPSLA). 271--286."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488336"},{"key":"e_1_3_2_1_54_1","volume-title":"ARIA: Automatic Resource Inference and Allocation for Mapreduce Environments. In Int. Conf. on Autonomic Computing (ICAC). 235--244","author":"Verma Abhishek","unstructured":"Abhishek Verma , Ludmila Cherkasova , and Roy H. Campbell . 2011 . ARIA: Automatic Resource Inference and Allocation for Mapreduce Environments. In Int. Conf. on Autonomic Computing (ICAC). 235--244 . Abhishek Verma, Ludmila Cherkasova, and Roy H. Campbell. 2011. ARIA: Automatic Resource Inference and Allocation for Mapreduce Environments. In Int. Conf. on Autonomic Computing (ICAC). 235--244."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-1996-42-304"},{"key":"e_1_3_2_1_56_1","unstructured":"Matei Zaharia Mosharaf Chowdhury Tathagata Das Ankur Dave Justin Ma Murphy McCauly Michael J. Franklin Scott Shenker and Ion Stoica. 2012. Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing. In Networked Sys. Design and Implem. (NSDI). 15--28.  Matei Zaharia Mosharaf Chowdhury Tathagata Das Ankur Dave Justin Ma Murphy McCauly Michael J. Franklin Scott Shenker and Ion Stoica. 2012. Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing. In Networked Sys. Design and Implem. (NSDI). 15--28."},{"key":"e_1_3_2_1_57_1","volume-title":"Joseph E. Gonzalez, and Ion Stoica.","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng , Ankur Dave , Jethro G. Beekman , Raluca Ada Popa , Joseph E. Gonzalez, and Ion Stoica. 2017 . Opaque : An Oblivious and Encrypted Distributed Analytics Platform. In Networked Sys. Design and Implem. (NSDI) . 283--298. Wenting Zheng, Ankur Dave, Jethro G. Beekman, Raluca Ada Popa, Joseph E. Gonzalez, and Ion Stoica. 2017. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In Networked Sys. Design and Implem. (NSDI). 283--298."}],"event":{"name":"SoCC '17: ACM Symposium on Cloud Computing","location":"Santa Clara California","acronym":"SoCC '17","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 2017 Symposium on Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3127479.3129256","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3127479.3129256","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3127479.3129256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:10Z","timestamp":1750217830000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3127479.3129256"}},"subtitle":["a simple abstraction for confidentiality-preserving data analytics"],"short-title":[],"issued":{"date-parts":[[2017,9,24]]},"references-count":55,"alternative-id":["10.1145\/3127479.3129256","10.1145\/3127479"],"URL":"https:\/\/doi.org\/10.1145\/3127479.3129256","relation":{},"subject":[],"published":{"date-parts":[[2017,9,24]]},"assertion":[{"value":"2017-09-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}