{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:25Z","timestamp":1750221325690,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8750-15-2-0092"],"award-info":[{"award-number":["FA8750-15-2-0092"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1228639"],"award-info":[{"award-number":["1228639"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3139550.3139558","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T12:31:37Z","timestamp":1509453097000},"page":"41-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["BIOS ORAM"],"prefix":"10.1145","author":[{"given":"Michael T.","family":"Goodrich","sequence":"first","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Verifiable Oblivious Storage. In 17th Int. Conf. on Practice and Theory in Public-Key Cryptography (PKC) (LNCS)","volume":"8383","author":"Apon Daniel","year":"2014"},{"volume-title":"20th ASIACRYPT. 62--81. https:\/\/doi.org\/10.1007\/978-3-662-45608-8_4","author":"Chung Kai-Min","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/356770.356776"},{"key":"e_1_3_2_1_5_1","unstructured":"Thomas H. Cormen Charles E. Leiserson Ronald L. Rivest and Clifford Stein. 2009. Introduction to Algorithms (3rd ed.). The MIT Press.  Thomas H. Cormen Charles E. Leiserson Ronald L. Rivest and Clifford Stein. 2009. Introduction to Algorithms (3rd ed.). The MIT Press."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19571-6_10"},{"key":"e_1_3_2_1_7_1","volume-title":"Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM. In 13th Int. Conf. on Theory of Cryptography (TCC) (LNCS)","volume":"9563","author":"Devadas Srinivas","year":"2016"},{"volume-title":"Optimizing ORAM and Using It Efficiently for Secure Computation. In 13th Int. Symp. on Privacy Enhancing Technologies (PETS). Springer, 1--18","year":"2013","author":"Gentry Craig","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_1_10_1","volume-title":"28th Int. Colloq. on Automata, Languages and Programming (ICALP) (LNCS)","volume":"6756","author":"Michael","year":"2012"},{"volume-title":"Oblivious RAM Simulation with Efficient Worst-case Access Overhead. In 3rd Cloud Computing Security Workshop. 95--100","year":"2011","author":"Goodrich Michael T.","key":"e_1_3_2_1_11_1"},{"volume-title":"Practical Oblivious Storage. In 2nd ACM Conf. on Data and Application Security and Privacy (CODASPY). 13--24","year":"2012","author":"Goodrich Michael T.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973099.14"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36763-2_5"},{"volume":"8881","volume-title":"Data-Oblivious Graph Algorithms in Outsourced External Memory. In 8th Int. Conf. on Combinatorial Optimization and Applications (COCOA) (LNCS)","author":"Michael","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","unstructured":"Michael T. Goodrich and Roberto Tamassia. 2014. Algorithm Design and Applications (1st ed.). Wiley Publishing.  Michael T. Goodrich and Roberto Tamassia. 2014. Algorithm Design and Applications (1st ed.). Wiley Publishing."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973099.13"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511813603"},{"key":"e_1_3_2_1_19_1","volume-title":"The Melbourne Shuffle: Improving Oblivious Storage in the Cloud. In Int. Colloq. on Automata, Languages, and Programming (ICALP) (LNCS)","volume":"8573","author":"Ohrimenko Olga","year":"2014"},{"volume-title":"Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors. In 40th ACM Int. Symp. on Computer Architecture (ISCA). 571--582","year":"2013","author":"Ren Ling","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","volume-title":"17th Int. Conf. on the Theory and Application of Cryptology and Information Security (ASIACRYPT) (LNCS)","volume":"7073","author":"Shi Elaine","year":"2011"},{"volume-title":"Multi-cloud Oblivious Storage. In 2013 ACM Conf. on Computer and Communications Security (CCS). 247--258","year":"2013","author":"Stefanov Emil","key":"e_1_3_2_1_23_1"},{"volume-title":"ObliviStore: High Performance Oblivious Cloud Storage. In IEEE Symp. on Security and Privacy (SP). 253--267","year":"2013","author":"Stefanov E.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813634"},{"volume-title":"Oblivious Data Structures. In ACM Conf. on Computer and Communications Security (CCS). 215--226","year":"2014","author":"Wang Xiao Shaun","key":"e_1_3_2_1_27_1"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 on Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139550.3139558","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3139550.3139558","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3139550.3139558","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:14:01Z","timestamp":1750212841000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139550.3139558"}},"subtitle":["Improved Privacy-Preserving Data Access for Parameterized Outsourced Storage"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":25,"alternative-id":["10.1145\/3139550.3139558","10.1145\/3139550"],"URL":"https:\/\/doi.org\/10.1145\/3139550.3139558","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}