{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:30:20Z","timestamp":1767339020133,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T00:00:00Z","timestamp":1578614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,10]]},"DOI":"10.1145\/3377644.3377662","type":"proceedings-article","created":{"date-parts":[[2020,2,26]],"date-time":"2020-02-26T08:16:17Z","timestamp":1582704977000},"page":"19-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Security and Encryption at Modern Databases"],"prefix":"10.1145","author":[{"given":"Martin","family":"Ocenas","sequence":"first","affiliation":[{"name":"Brno University of Technology, Czech Republic"}]},{"given":"Ivan","family":"Homoliak","sequence":"additional","affiliation":[{"name":"Brno University of Technology, Czech Republic"}]},{"given":"Petr","family":"Hanacek","sequence":"additional","affiliation":[{"name":"Brno University of Technology, Czech Republic"}]},{"given":"Kamil","family":"Malinka","sequence":"additional","affiliation":[{"name":"Brno University of Technology, Czech Republic"}]}],"member":"320","published-online":{"date-parts":[[2020,2,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3303771"},{"key":"e_1_3_2_1_2_1","volume-title":"Sabotage, Fraud)","author":"Cappelli D. M.","year":"2012","unstructured":"D. M. Cappelli , A. P. Moore , and R. F. Trzeciak , The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft , Sabotage, Fraud) . Addison-Wesley , 2012 . D. M. Cappelli, A. P. Moore, and R. F. Trzeciak, The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft, Sabotage, Fraud). Addison-Wesley, 2012."},{"key":"e_1_3_2_1_3_1","first-page":"236","volume-title":"Analysis of unintentional insider threats deriving from social engineering exploits,\" in 2014 IEEE Security and Privacy Workshops","author":"Greitzer F. L.","year":"2014","unstructured":"F. L. Greitzer , J. R. Strozer , S. Cohen , A. P. Moore , D. Mundie , and J. Cowley , \" Analysis of unintentional insider threats deriving from social engineering exploits,\" in 2014 IEEE Security and Privacy Workshops , pp. 236 -- 250 , IEEE , 2014 . F. L. Greitzer, J. R. Strozer, S. Cohen, A. P. Moore, D. Mundie, and J. Cowley, \"Analysis of unintentional insider threats deriving from social engineering exploits,\" in 2014 IEEE Security and Privacy Workshops, pp. 236--250, IEEE, 2014."},{"key":"e_1_3_2_1_4_1","unstructured":"\"Veracrypt - free open source disk encryption with strong security for the paranoid.\" https:\/\/www.veracrypt.fr\/en\/Home.html.  \"Veracrypt - free open source disk encryption with strong security for the paranoid.\" https:\/\/www.veracrypt.fr\/en\/Home.html."},{"key":"e_1_3_2_1_5_1","unstructured":"\"Bitlocker.\" https:\/\/docs.microsoft.com\/en-us\/windows\/security\/information-protection\/bitlocker\/bitlocker-overview.  \"Bitlocker.\" https:\/\/docs.microsoft.com\/en-us\/windows\/security\/information-protection\/bitlocker\/bitlocker-overview."},{"key":"e_1_3_2_1_6_1","unstructured":"\"Using oracle wallet manager.\" https:\/\/docs.oracle.com\/cd\/B28359-01\/network.111\/b28530\/asowalet.htm. Accessed: 2018-05-25.  \"Using oracle wallet manager.\" https:\/\/docs.oracle.com\/cd\/B28359-01\/network.111\/b28530\/asowalet.htm. Accessed: 2018-05-25."},{"issue":"11","key":"e_1_3_2_1_7_1","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"Rivest R. L.","year":"1978","unstructured":"R. L. Rivest , L. Adleman , and M. L. Dertouzos , \" On data banks and privacy homomorphisms ,\" Foundations of secure computation , vol. 4 , no. 11 , pp. 169 -- 180 , 1978 . R. L. Rivest, L. Adleman, and M. L. Dertouzos, \"On data banks and privacy homomorphisms,\" Foundations of secure computation, vol. 4, no. 11, pp. 169--180, 1978.","journal-title":"Foundations of secure computation"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"C. Gentry \"Fully homomorphic encryption using ideal lattices \" in the 41st ACM Symposium on Theory of Computing (STOC) 2009.  C. Gentry \"Fully homomorphic encryption using ideal lattices \" in the 41st ACM Symposium on Theory of Computing (STOC) 2009.","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_9_1","volume-title":"ACM","author":"Boyle E.","year":"2017","unstructured":"E. Boyle , G. Couteau , N. Gilboa , Y. Ishai , and M. Orru , \" Homomorphic secret sharing: optimizations and applications,\" in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2105--2122 , ACM , 2017 . E. Boyle, G. Couteau, N. Gilboa, Y. Ishai, and M. Orru, \"Homomorphic secret sharing: optimizations and applications,\" in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2105--2122, ACM, 2017."},{"key":"e_1_3_2_1_10_1","volume-title":"ACM","author":"Chen H.","year":"2017","unstructured":"H. Chen , K. Laine , and P. Rindal , \" Fast private set intersection from homomorphic encryption,\" in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1243--1255 , ACM , 2017 . H. Chen, K. Laine, and P. Rindal, \"Fast private set intersection from homomorphic encryption,\" in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1243--1255, ACM, 2017."},{"key":"e_1_3_2_1_11_1","first-page":"172","volume-title":"2017 IEEE Symposium on","author":"Fuller B.","year":"2017","unstructured":"B. Fuller , M. Varia , A. Yerukhimovich , E. Shen , A. Hamlin , V. Gadepally , R. Shay , J. D. Mitchell , and R. K. Cunningham , \" Sok: Cryptographically protected database search,\" in Security and Privacy (SP) , 2017 IEEE Symposium on , pp. 172 -- 191 , IEEE, 2017 . B. Fuller, M. Varia, A. Yerukhimovich, E. Shen, A. Hamlin, V. Gadepally, R. Shay, J. D. Mitchell, and R. K. Cunningham, \"Sok: Cryptographically protected database search,\" in Security and Privacy (SP), 2017 IEEE Symposium on, pp. 172--191, IEEE, 2017."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2590701.2590705"},{"key":"e_1_3_2_1_13_1","first-page":"86","article-title":"Intel sgx explained","volume":"2016","author":"Costan V.","year":"2016","unstructured":"V. Costan and S. Devadas , \" Intel sgx explained .,\" IACR Cryptology ePrint Archive , vol. 2016 , p. 86 , 2016 . V. Costan and S. Devadas, \"Intel sgx explained.,\" IACR Cryptology ePrint Archive, vol. 2016, p. 86, 2016.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_14_1","first-page":"0","volume-title":"Enclavedb: A secure database using sgx,\" in EnclaveDB: A Secure Database using SGX","author":"Priebe C.","year":"2018","unstructured":"C. Priebe , K. Vaswani , and M. Costa , \" Enclavedb: A secure database using sgx,\" in EnclaveDB: A Secure Database using SGX , p. 0 , IEEE , 2018 . C. Priebe, K. Vaswani, and M. Costa, \"Enclavedb: A secure database using sgx,\" in EnclaveDB: A Secure Database using SGX, p. 0, IEEE, 2018."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5120\/7242-0218"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.03.011"}],"event":{"name":"ICCSP 2020: 2020 4th International Conference on Cryptography, Security and Privacy","sponsor":["NJU Nanjing University"],"location":"Nanjing China","acronym":"ICCSP 2020"},"container-title":["Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377644.3377662","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377644.3377662","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:53Z","timestamp":1750203893000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377644.3377662"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,10]]},"references-count":17,"alternative-id":["10.1145\/3377644.3377662","10.1145\/3377644"],"URL":"https:\/\/doi.org\/10.1145\/3377644.3377662","relation":{},"subject":[],"published":{"date-parts":[[2020,1,10]]},"assertion":[{"value":"2020-02-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}