{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T10:11:27Z","timestamp":1755598287688,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3317550.3321425","type":"proceedings-article","created":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T19:01:58Z","timestamp":1557514918000},"page":"88-95","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Towards Multiverse Databases"],"prefix":"10.1145","author":[{"given":"Alana","family":"Marzoev","sequence":"first","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Lara Timb\u00f3","family":"Ara\u00fajo","sequence":"additional","affiliation":[{"name":"MIT CSAIL and Airbnb"}]},{"given":"Malte","family":"Schwarzkopf","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Samyukta","family":"Yagati","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Eddie","family":"Kohler","sequence":"additional","affiliation":[{"name":"Harvard University"}]},{"given":"Robert","family":"Morris","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"M. Frans","family":"Kaashoek","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Sam","family":"Madden","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.14778\/2336664.2336670"},{"unstructured":"Warwick Ashford. Facebook photo leak flaw raises security concerns. URL: https:\/\/www.computerweeklycom\/news\/2240242708\/Facebook-photo-leak-flaw-raises-security-concerns (visited on 01\/04\/  Warwick Ashford. Facebook photo leak flaw raises security concerns. URL: https:\/\/www.computerweeklycom\/news\/2240242708\/Facebook-photo-leak-flaw-raises-security-concerns (visited on 01\/04\/","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 18th International Conference on Formal Methods in Computer-Aided Design (FMCAD)","author":"Backes John","year":"2018","unstructured":"John Backes , Pauline Bolignano , Byron Cook , Catherine Dodge , Andrew Gacek , Kasper Luckow , Neha Rungta . Oksana Tkachuk , and Carsten Varming . \"Semantic-based Automated Reasoning for AWS Access Policies using SMT\". In: Proceedings of the 18th International Conference on Formal Methods in Computer-Aided Design (FMCAD) . Austin, Texas, USA , Oct. 2018 . John Backes, Pauline Bolignano, Byron Cook, Catherine Dodge, Andrew Gacek, Kasper Luckow, Neha Rungta. Oksana Tkachuk, and Carsten Varming. \"Semantic-based Automated Reasoning for AWS Access Policies using SMT\". In: Proceedings of the 18th International Conference on Formal Methods in Computer-Aided Design (FMCAD). Austin, Texas, USA, Oct. 2018."},{"unstructured":"Tomer Bar. Notifying our Developer Ecosystem about a Photo API Bug. URL:https:\/\/developers.facebookcom\/blog\/post\/2018\/12\/14\/notifying-our-developer-ecosystem-about-a-photo-apibug\/ (visited on 12\/14\/2018).  Tomer Bar. Notifying our Developer Ecosystem about a Photo API Bug. URL:https:\/\/developers.facebookcom\/blog\/post\/2018\/12\/14\/notifying-our-developer-ecosystem-about-a-photo-apibug\/ (visited on 12\/14\/2018).","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","volume-title":"The virtual private database in Oracle9iR2. Oracle Technical White Paper","author":"Browder Kristy","year":"2002","unstructured":"Kristy Browder and Mary Ann Davidson . The virtual private database in Oracle9iR2. Oracle Technical White Paper , Oracle Corporation . 2002 . Kristy Browder and Mary Ann Davidson. The virtual private database in Oracle9iR2. Oracle Technical White Paper, Oracle Corporation. 2002."},{"unstructured":"Pedro Canahuati and Guy Rosen. Security Update--Additional Technical Details. URL: https:\/\/newsroom.fb.com\/news\/2018\/09\/security-update\/#details (visited on 12\/14\/2018).  Pedro Canahuati and Guy Rosen. Security Update--Additional Technical Details. URL: https:\/\/newsroom.fb.com\/news\/2018\/09\/security-update\/#details (visited on 12\/14\/2018).","key":"e_1_3_2_1_6_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/2043621.2043626"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/ICDE.2007.368976"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Chlipala Adam","year":"2010","unstructured":"Adam Chlipala . \" Static Checking of Dynamically-Varying Security Policies in Database-Backed Applications\". In: Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI) . Vancouver, British Columbia, Canada , Oct. 2010 . Adam Chlipala. \"Static Checking of Dynamically-Varying Security Policies in Database-Backed Applications\". In: Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI). Vancouver, British Columbia, Canada, Oct. 2010."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/TSE.1987.232889"},{"key":"e_1_3_2_1_11_1","first-page":"213","volume-title":"Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Gjengset Jon","year":"2018","unstructured":"Jon Gjengset , Malte Schwarzkopf , Jonathan Behrens , Lara Timb\u00f3 Ara\u00fajo , Martin Ek , Eddie Kohler , M. Frans Kaashoek , and Robert Morris . \"Noria : dynamic, partially-stateful data-flow for high-performance web applications \". In: Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI) . Carlsbad, California, USA , Oct. 2018 , pages 213 -- 231 . Jon Gjengset, Malte Schwarzkopf, Jonathan Behrens, Lara Timb\u00f3 Ara\u00fajo, Martin Ek, Eddie Kohler, M. Frans Kaashoek, and Robert Morris. \"Noria: dynamic, partially-stateful data-flow for high-performance web applications\". In: Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI). Carlsbad, California, USA, Oct. 2018, pages 213--231."},{"unstructured":"Google Inc. Cloud Firestore Documentation: Writing conditions for Cloud Firestore Security Rules. URL: https:\/\/firebase.google.com\/docs\/firestore\/security\/rules-conditions (visited on 01\/15\/2019).  Google Inc. Cloud Firestore Documentation: Writing conditions for Cloud Firestore Security Rules. URL: https:\/\/firebase.google.com\/docs\/firestore\/security\/rules-conditions (visited on 01\/15\/2019).","key":"e_1_3_2_1_12_1"},{"unstructured":"Matthew Green. Piazza offers anonymous posting but does not hide each user's total number of posts. Discuss. Twitter post. URL: https:\/\/twitter.com\/matthew_d_green\/status\/925053953330634753 (visited on 03\/08\/2019).  Matthew Green. Piazza offers anonymous posting but does not hide each user's total number of posts. Discuss. Twitter post. URL: https:\/\/twitter.com\/matthew_d_green\/status\/925053953330634753 (visited on 03\/08\/2019).","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/320473.320482"},{"unstructured":"IBM Knowledge Center. Securing DB2: Creating column masks. URL: https:\/\/www.ibm.com\/support\/knowledgecenter\/en\/SSEPEK_10.0.0\/seca\/src\/tpc\/db2z_createcolumnmask.html (visited on 01\/15\/2019).  IBM Knowledge Center. Securing DB2: Creating column masks. URL: https:\/\/www.ibm.com\/support\/knowledgecenter\/en\/SSEPEK_10.0.0\/seca\/src\/tpc\/db2z_createcolumnmask.html (visited on 01\/15\/2019).","key":"e_1_3_2_1_15_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/1294261.1294293"},{"key":"e_1_3_2_1_17_1","first-page":"1463","volume-title":"Proceedings of the 26th USENIX Security Symposium (USENIX Security 17)","author":"Mehta Aastha","year":"2017","unstructured":"Aastha Mehta , Eslam Elnikety , Katura Harvey , Deepak Garg , and Peter Druschel . \"Qapla : Policy compliance for database-backed systems \". In: Proceedings of the 26th USENIX Security Symposium (USENIX Security 17) . Vancouver, British Columbia, Canada , Aug. 2017 , pages 1463 -- 1479 . Aastha Mehta, Eslam Elnikety, Katura Harvey, Deepak Garg, and Peter Druschel. \"Qapla: Policy compliance for database-backed systems\". In: Proceedings of the 26th USENIX Security Symposium (USENIX Security 17). Vancouver, British Columbia, Canada, Aug. 2017, pages 1463--1479."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/2517349.2522738"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/2882903.2915246"},{"unstructured":"Piazza Technologies Inc. Piazza. URL: https:\/\/piazza.com\/ (visited on 01\/08\/2019).  Piazza Technologies Inc. Piazza. URL: https:\/\/piazza.com\/ (visited on 01\/08\/2019).","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","first-page":"1607","article-title":"Type-Driven Repair for Information Flow Security","volume":"03445","author":"Polikarpova Nadia","year":"2016","unstructured":"Nadia Polikarpova , Jean Yang , Shachar Itzhaky , and Armando Solar-Lezama . \" Type-Driven Repair for Information Flow Security \". In: CoRR abs\/1607 . 03445 ( 2016 ). arXiv: 1607 .03445. Nadia Polikarpova, Jean Yang, Shachar Itzhaky, and Armando Solar-Lezama. \"Type-Driven Repair for Information Flow Security\". In: CoRR abs\/1607.03445 (2016). arXiv: 1607.03445.","journal-title":"CoRR abs\/1607"},{"unstructured":"Postgres Global Development Group. PostgreSQL 9.5.15 Documentation: Row Security Policies. URL: https:\/\/www.postgresql.org\/docs\/9.5\/ddl-rowsecurity.html (visited on 01\/14\/2019).  Postgres Global Development Group. PostgreSQL 9.5.15 Documentation: Row Security Policies. URL: https:\/\/www.postgresql.org\/docs\/9.5\/ddl-rowsecurity.html (visited on 01\/14\/2019).","key":"e_1_3_2_1_22_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/1007568.1007631"},{"key":"e_1_3_2_1_24_1","volume-title":"A persistent key-value store for fast storage environments","author":"Source Facebook Open","year":"2018","unstructured":"Facebook Open Source . A persistent key-value store for fast storage environments . Apr. 2018 . URL : http:\/\/rocksdb.org\/ (visited on 04\/20\/2018). Facebook Open Source. A persistent key-value store for fast storage environments. Apr. 2018. URL: http:\/\/rocksdb.org\/ (visited on 04\/20\/2018)."},{"unstructured":"Ben Stock. Search leaks hidden tags. URL: https:\/\/github.com\/kohler\/hotcrp\/issues\/135 (visited on 01\/08\/2019).  Ben Stock. Search leaks hidden tags. URL: https:\/\/github.com\/kohler\/hotcrp\/issues\/135 (visited on 01\/08\/2019).","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Wang Xi","year":"2014","unstructured":"Xi Wang , David Lazar , Nickolai Zeldovich , Adam Chlipala , and Zachary Tatlock . \"Jitk : A Trustworthy InKernel Interpreter Infrastructure \". In: Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI) . Broomfield, Colorado, USA , Oct. 2014 . Xi Wang, David Lazar, Nickolai Zeldovich, Adam Chlipala, and Zachary Tatlock. \"Jitk: A Trustworthy InKernel Interpreter Infrastructure\". In: Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI). Broomfield, Colorado, USA, Oct. 2014."},{"volume-title":"Vulnerability Database. CVE 2016-5835: Authenticated Revision History Information Disclosure. URL: https:\/\/wpvulndb.com\/vulnerabilities\/8519 (visited on 01\/04\/2019)","author":"Wordpress","unstructured":"Wordpress Vulnerability Database. CVE 2016-5835: Authenticated Revision History Information Disclosure. URL: https:\/\/wpvulndb.com\/vulnerabilities\/8519 (visited on 01\/04\/2019) . Wordpress Vulnerability Database. CVE 2016-5835: Authenticated Revision History Information Disclosure. URL: https:\/\/wpvulndb.com\/vulnerabilities\/8519 (visited on 01\/04\/2019).","key":"e_1_3_2_1_27_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/2908080.2908098"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1145\/2103656.2103669"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/1629575.1629604"}],"event":{"sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"acronym":"HotOS '19","name":"HotOS '19: Workshop on Hot Topics in Operating Systems","location":"Bertinoro Italy"},"container-title":["Proceedings of the Workshop on Hot Topics in Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317550.3321425","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317550.3321425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:27Z","timestamp":1750208547000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317550.3321425"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":30,"alternative-id":["10.1145\/3317550.3321425","10.1145\/3317550"],"URL":"https:\/\/doi.org\/10.1145\/3317550.3321425","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}