{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:51:52Z","timestamp":1740099112762,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,10]],"date-time":"2019-04-10T00:00:00Z","timestamp":1554854400000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CCF-1319384"],"award-info":[{"award-number":["CCF-1319384"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,4,10]]},"DOI":"10.1145\/3190619.3190638","type":"proceedings-article","created":{"date-parts":[[2018,4,11]],"date-time":"2018-04-11T12:31:17Z","timestamp":1523449877000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["SecureMR"],"prefix":"10.1145","author":[{"given":"Yao","family":"Dong","sequence":"first","affiliation":[{"name":"Rensselaer Polytechnic Institute"}]},{"given":"Ana","family":"Milanova","sequence":"additional","affiliation":[{"name":"Rensselaer Polytechnic Institute"}]},{"given":"Julian","family":"Dolby","sequence":"additional","affiliation":[{"name":"IBM Thomas J. Watson Research Center"}]}],"member":"320","published-online":{"date-parts":[[2018,4,10]]},"reference":[{"volume-title":"PUMA: Purdue MapReduce Benchmarks Suite. Technical Report","year":"2012","author":"Ahmad Faraz","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"Alfred V. Aho Monica S. Lam Ravi Sethi and Jeffrey D. Ullman. 2006. Compilers: Principles Techniques and Tools (2Nd Edition). Addison-Wesley Longman Publishing Co. Inc. Boston MA USA.   Alfred V. Aho Monica S. Lam Ravi Sethi and Jeffrey D. Ullman. 2006. Compilers: Principles Techniques and Tools (2Nd Edition). Addison-Wesley Longman Publishing Co. Inc. Boston MA USA."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294265"},{"key":"e_1_3_2_1_4_1","unstructured":"Michael Cooney. 2009. IBM touts encryption innovation: New technology performs calculations on encrypted data without decrypting it. Network World (June 2009).  Michael Cooney. 2009. IBM touts encryption innovation: New technology performs calculations on encrypted data without decrypting it. Network World (June 2009)."},{"key":"e_1_3_2_1_5_1","unstructured":"Thomas H. Cormen Charles E. Leiserson Ronald L. Rivest and Clifford Stein. 2009. Introduction to Algorithms Third Edition (3rd ed.). The MIT Press.   Thomas H. Cormen Charles E. Leiserson Ronald L. Rivest and Clifford Stein. 2009. Introduction to Algorithms Third Edition (3rd ed.). The MIT Press."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2972206.2972209"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666444"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/2008684.2008697"},{"key":"e_1_3_2_1_10_1","unstructured":"Google Cloud Platform 2017. Cloud Dataproc. (2017). https:\/\/cloud.google.com\/dataproc  Google Cloud Platform 2017. Cloud Dataproc. (2017). https:\/\/cloud.google.com\/dataproc"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Manish Gupta Edith Schonberg and Harini Srinivasan. 1995. A unified data-flow framework for optimizing communication. Springer Berlin Heidelberg Berlin Heidelberg 266--282.   Manish Gupta Edith Schonberg and Harini Srinivasan. 1995. A unified data-flow framework for optimizing communication. Springer Berlin Heidelberg Berlin Heidelberg 266--282.","DOI":"10.1007\/BFb0025884"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.508249"},{"key":"e_1_3_2_1_13_1","unstructured":"Flemming Nielson Hanne R. Nielson and Chris Hankin. 2010. Principles of Program Analysis. Springer Publishing Company Incorporated.   Flemming Nielson Hanne R. Nielson and Chris Hankin. 2010. Principles of Program Analysis. Springer Publishing Company Incorporated."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487568.2487569"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559865"},{"key":"e_1_3_2_1_17_1","unstructured":"Pig Mix 2013. PIGMIX2 Benchmarks. (2013). https:\/\/cwiki.apache.org\/confluence\/display\/PIG\/PigMix  Pig Mix 2013. PIGMIX2 Benchmarks. (2013). https:\/\/cwiki.apache.org\/confluence\/display\/PIG\/PigMix"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_1_19_1","unstructured":"Stefan Rass and Daniel Slamanig. 2013. Cryptography for Security and Privacy in Cloud Computing. Artech House Inc. Norwood MA USA.   Stefan Rass and Daniel Slamanig. 2013. Cryptography for Security and Privacy in Cloud Computing. Artech House Inc. Norwood MA USA."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993518"},{"key":"e_1_3_2_1_21_1","unstructured":"Michael L. Scott. 2015. Programming Language Pragmatics (2Nd Edition). Morgan Kaufmann.   Michael L. Scott. 2015. Programming Language Pragmatics (2Nd Edition). Morgan Kaufmann."},{"volume-title":"Off the Beaten Track Workshop: Underrepresented Problems for Program. Lang. Researchers.","year":"2012","author":"Shah Meelap","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509554"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516666"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488336"},{"volume-title":"Proceedings of the 1999 Conference of the Centre for Advanced Studies on Collaborative Research (CASCON '99)","author":"Raja","key":"e_1_3_2_1_26_1"}],"event":{"name":"HoTSoS '18: Symposium and Bootcamp","sponsor":["National Security Agency National Security Agency","SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Raleigh North Carolina","acronym":"HoTSoS '18"},"container-title":["Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3190619.3190638","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3190619.3190638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T06:05:14Z","timestamp":1673676314000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3190619.3190638"}},"subtitle":["secure mapreduce computation using homomorphic encryption and program partitioning"],"short-title":[],"issued":{"date-parts":[[2018,4,10]]},"references-count":26,"alternative-id":["10.1145\/3190619.3190638","10.1145\/3190619"],"URL":"https:\/\/doi.org\/10.1145\/3190619.3190638","relation":{},"subject":[],"published":{"date-parts":[[2018,4,10]]},"assertion":[{"value":"2018-04-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}