{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:16Z","timestamp":1750220536739,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":84,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T00:00:00Z","timestamp":1623196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1846447;2016240"],"award-info":[{"award-number":["1846447;2016240"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSERC Discovery"},{"name":"DARPA and SPAWAR","award":["N66001-15-C-4067"],"award-info":[{"award-number":["N66001-15-C-4067"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2016393;2029853"],"award-info":[{"award-number":["2016393;2029853"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,9]]},"DOI":"10.1145\/3448016.3457544","type":"proceedings-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T17:22:37Z","timestamp":1624036957000},"page":"2839-2845","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Practical Security and Privacy for Database Systems"],"prefix":"10.1145","author":[{"given":"Xi","family":"He","sequence":"first","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]},{"given":"Jennie","family":"Rogers","sequence":"additional","affiliation":[{"name":"Northwestern University, Evanston, IL, USA"}]},{"given":"Johes","family":"Bater","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Ashwin","family":"Machanavajjhala","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Chenghong","family":"Wang","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Xiao","family":"Wang","sequence":"additional","affiliation":[{"name":"Northwestern University, Evanston, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0042"},{"key":"e_1_3_2_1_2_1","volume-title":"CIDR","author":"Aggarwal G.","year":"2005","unstructured":"G. Aggarwal , M. Bawa , P. Ganesan , H. Garcia-Molina , K. Kenthapadi , R. Motwani , U. Srivastava , D. Thomas , and Y. Xu . Two can keep a secret: A distributed architecture for secure database services . CIDR , 2005 . G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-Molina, K. Kenthapadi, R. Motwani, U. Srivastava, D. Thomas, and Y. Xu. Two can keep a secret: A distributed architecture for secure database services. CIDR, 2005."},{"key":"e_1_3_2_1_3_1","volume-title":"9th Biennial Conference on Innovative Data Systems Research (CIDR)","author":"Allen L.","year":"2019","unstructured":"L. Allen , P. Antonopoulos , A. Arasu , J. Gehrke , J. Hammer , J. Hunter , R. Kaushik , D. Kossmann , J. Lee , R. Ramamurthy , : shared verifiable databases and tables in the cloud . In 9th Biennial Conference on Innovative Data Systems Research (CIDR) , 2019 . L. Allen, P. Antonopoulos, A. Arasu, J. Gehrke, J. Hammer, J. Hunter, R. Kaushik, D. Kossmann, J. Lee, R. Ramamurthy, et al. Veritas: shared verifiable databases and tables in the cloud. In 9th Biennial Conference on Innovative Data Systems Research (CIDR), 2019."},{"key":"e_1_3_2_1_4_1","unstructured":"Apple. Apple Secure Enclave. https:\/\/support.apple.com\/guide\/security\/secure-enclave-overview-sec59b0b31ff\/web.  Apple. Apple Secure Enclave. https:\/\/support.apple.com\/guide\/security\/secure-enclave-overview-sec59b0b31ff\/web."},{"key":"e_1_3_2_1_5_1","volume-title":"CIDR. Citeseer","author":"Arasu A.","year":"2013","unstructured":"A. Arasu , S. Blanas , K. Eguro , R. Kaushik , D. Kossmann , R. Ramamurthy , and R. Venkatesan . Orthogonal Security with Cipherbase . In CIDR. Citeseer , 2013 . A. Arasu, S. Blanas, K. Eguro, R. Kaushik, D. Kossmann, R. Ramamurthy, and R. Venkatesan. Orthogonal Security with Cipherbase. In CIDR. Citeseer, 2013."},{"key":"e_1_3_2_1_6_1","volume-title":"29th International Conference on Data Engineering (ICDE)","author":"Arasu A.","year":"2013","unstructured":"A. Arasu , K. Eguro , R. Kaushik , and R. Ramamurthy . Querying encrypted data (tutorial) . In 29th International Conference on Data Engineering (ICDE) , April 2013 . Tutorial presentation. A. Arasu, K. Eguro, R. Kaushik, and R. Ramamurthy. Querying encrypted data (tutorial). In 29th International Conference on Data Engineering (ICDE), April 2013. Tutorial presentation."},{"key":"e_1_3_2_1_7_1","volume-title":"ICDT","author":"Arasu A.","year":"2014","unstructured":"A. Arasu and R. Kaushik . Oblivious query processing . ICDT , 2014 . A. Arasu and R. Kaushik. Oblivious query processing. ICDT, 2014."},{"key":"e_1_3_2_1_8_1","first-page":"10","author":"Bater J.","year":"2017","unstructured":"J. Bater , G. Elliott , C. Eggen , S. Goel , A. Kho , and J. Rogers . SMCQL: Secure Querying for Federated Databases. Proceedings of the VLDB Endowment , 10 , 2017 . J. Bater, G. Elliott, C. Eggen, S. Goel, A. Kho, and J. Rogers. SMCQL: Secure Querying for Federated Databases. Proceedings of the VLDB Endowment, 10, 2017.","journal-title":"SMCQL: Secure Querying for Federated Databases. Proceedings of the VLDB Endowment"},{"issue":"3","key":"e_1_3_2_1_9_1","first-page":"307","article-title":"Shrinkwrap","volume":"12","author":"Bater J.","year":"2019","unstructured":"J. Bater , X. He , W. Ehrich , A. Machanavajjhala , and J. Rogers . Shrinkwrap : Differentially-Private Query Processing in Private Data Federations. Proceedings of the VLDB Endowment , 12 ( 3 ): 307 -- 320 , 2019 . J. Bater, X. He, W. Ehrich, A. Machanavajjhala, and J. Rogers. Shrinkwrap: Differentially-Private Query Processing in Private Data Federations. Proceedings of the VLDB Endowment, 12(3):307--320, 2019.","journal-title":"Differentially-Private Query Processing in Private Data Federations. Proceedings of the VLDB Endowment"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407854"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14778\/2735703.2735708"},{"key":"e_1_3_2_1_12_1","volume-title":"Students and Taxes: A Privacy-Preserving Social Study Using Secure Computation. In Privacy Enhancing Technologies Symposium (PETS)","author":"Bogdanov D.","year":"2016","unstructured":"D. Bogdanov , L. Kamm , B. Kubo , R. Rebane , V. Sokk , and R. Talviste . Students and Taxes: A Privacy-Preserving Social Study Using Secure Computation. In Privacy Enhancing Technologies Symposium (PETS) , 2016 . D. Bogdanov, L. Kamm, B. Kubo, R. Rebane, V. Sokk, and R. Talviste. Students and Taxes: A Privacy-Preserving Social Study Using Secure Computation. In Privacy Enhancing Technologies Symposium (PETS), 2016."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_20"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"E.\n      Boyle N.\n      Gilboa and \n      Y.\n      Ishai\n  . \n  Function secret sharing\n  . In E. Oswald and M. Fischlin editors EUROCRYPT \n  2015 Part II volume \n  9057\n   of \n  LNCS pages \n  337\n  --\n  367 Sofia Bulgaria Apr. 26--30 2015. \n  Springer Heidelberg Germany.  E. Boyle N. Gilboa and Y. Ishai. Function secret sharing. In E. Oswald and M. Fischlin editors EUROCRYPT 2015 Part II volume 9057 of LNCS pages 337--367 Sofia Bulgaria Apr. 26--30 2015. Springer Heidelberg Germany.","DOI":"10.1007\/978-3-662-46803-6_12"},{"key":"e_1_3_2_1_15_1","volume-title":"A tutorial","author":"Canetti R.","year":"2016","unstructured":"R. Canetti . Universally composable security : A tutorial , 2016 . Talk at Boston University , A Modular Approach to Cloud Security. R. Canetti. Universally composable security: A tutorial, 2016. Talk at Boston University, A Modular Approach to Cloud Security."},{"key":"e_1_3_2_1_16_1","volume-title":"WIFS'14","author":"Chaudhuri K.","year":"2014","unstructured":"K. Chaudhuri and A. Sarwate . Differential privacy for signal processing and machine learning . WIFS'14 , 2014 . K. Chaudhuri and A. Sarwate. Differential privacy for signal processing and machine learning. WIFS'14, 2014."},{"key":"e_1_3_2_1_17_1","volume-title":"Citeseer","author":"Chor B.","year":"1997","unstructured":"B. Chor , N. Gilboa , and M. Naor . Private information retrieval by keywords . Citeseer , 1997 . B. Chor, N. Gilboa, and M. Naor. Private information retrieval by keywords. Citeseer, 1997."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/795662.796270"},{"key":"e_1_3_2_1_19_1","volume-title":"Differentially private mechanisms","author":"Cormode G.","year":"2013","unstructured":"G. Cormode . Building blocks of privacy : Differentially private mechanisms , 2013 . Invited tutorial talk at Privacy Preserving Data Publication and Analysis (PrivDB) workshop. G. Cormode. Building blocks of privacy: Differentially private mechanisms, 2013. Invited tutorial talk at Privacy Preserving Data Publication and Analysis (PrivDB) workshop."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45721-1_3"},{"key":"e_1_3_2_1_21_1","volume-title":"Intel sgx explained. IACR Cryptol. ePrint Arch","author":"Costan V.","year":"2016","unstructured":"V. Costan and S. Devadas . Intel sgx explained. IACR Cryptol. ePrint Arch ., 2016 (86):1--118, 2016. V. Costan and S. Devadas. Intel sgx explained. IACR Cryptol. ePrint Arch., 2016(86):1--118, 2016."},{"key":"e_1_3_2_1_22_1","volume-title":"CCS","author":"Crockett E.","year":"2018","unstructured":"E. Crockett , C. Peikert , and C. Sharp . Alchemy: A language and compiler for homomorphic encryption made easy . In CCS , 2018 . E. Crockett, C. Peikert, and C. Sharp. Alchemy: A language and compiler for homomorphic encryption made easy. In CCS, 2018."},{"key":"e_1_3_2_1_23_1","first-page":"727","volume-title":"13th $$USENIX$$ Symposium on Operating Systems Design and Implementation ($$OSDI$$ 18)","author":"Crooks N.","year":"2018","unstructured":"N. Crooks , M. Burke , E. Cecchetti , S. Harel , R. Agarwal , and L. Alvisi . Obladi: Oblivious serializable transactions in the cloud . In 13th $$USENIX$$ Symposium on Operating Systems Design and Implementation ($$OSDI$$ 18) , pages 727 -- 743 , 2018 . N. Crooks, M. Burke, E. Cecchetti, S. Harel, R. Agarwal, and L. Alvisi. Obladi: Oblivious serializable transactions in the cloud. In 13th $$USENIX$$ Symposium on Operating Systems Design and Implementation ($$OSDI$$ 18), pages 727--743, 2018."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-019-01405-7"},{"key":"e_1_3_2_1_25_1","volume-title":"Dynamo: amazon's highly available key-value store. ACM SIGOPS operating systems review, 41(6):205--220","author":"DeCandia G.","year":"2007","unstructured":"G. DeCandia , D. Hastorun , M. Jampani , G. Kakulapati , A. Lakshman , A. Pilchin , S. Sivasubramanian , P. Vosshall , and W. Vogels . Dynamo: amazon's highly available key-value store. ACM SIGOPS operating systems review, 41(6):205--220 , 2007 . G. DeCandia, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman, A. Pilchin, S. Sivasubramanian, P. Vosshall, and W. Vogels. Dynamo: amazon's highly available key-value store. ACM SIGOPS operating systems review, 41(6):205--220, 2007."},{"key":"e_1_3_2_1_26_1","first-page":"1","volume-title":"Languages and Programming","author":"Dwork C.","year":"2006","unstructured":"C. Dwork . Differential privacy. International Colloquium on Automata , Languages and Programming , pages 1 -- 12 , 2006 . C. Dwork. Differential privacy. International Colloquium on Automata, Languages and Programming, pages 1--12, 2006."},{"key":"e_1_3_2_1_27_1","first-page":"1","volume-title":"Proceedings of the 33rd International Conference on Automata, Languages and Programming -","author":"Dwork C.","year":"2006","unstructured":"C. Dwork . Differential privacy. In Proceedings of the 33rd International Conference on Automata, Languages and Programming - Volume Part II , ICALP'06, pages 1 -- 12 , Berlin, Heidelberg , 2006 . Springer-Verlag. C. Dwork. Differential privacy. In Proceedings of the 33rd International Conference on Automata, Languages and Programming - Volume Part II, ICALP'06, pages 1--12, Berlin, Heidelberg, 2006. Springer-Verlag."},{"key":"e_1_3_2_1_28_1","volume-title":"The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science, 9(3--4):211--407","author":"Dwork C.","year":"2014","unstructured":"C. Dwork and A. Roth . The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science, 9(3--4):211--407 , 2014 . C. Dwork and A. Roth. The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science, 9(3--4):211--407, 2014."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3320237"},{"key":"e_1_3_2_1_30_1","volume-title":"Oblidb: Oblivious query processing using hardware enclaves. arXiv preprint arXiv:1710.00458","author":"Eskandarian S.","year":"2017","unstructured":"S. Eskandarian and M. Zaharia . Oblidb: Oblivious query processing using hardware enclaves. arXiv preprint arXiv:1710.00458 , 2017 . S. Eskandarian and M. Zaharia. Oblidb: Oblivious query processing using hardware enclaves. arXiv preprint arXiv:1710.00458, 2017."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2976612"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/116825.116852"},{"key":"e_1_3_2_1_33_1","first-page":"291","volume-title":"17th ACM STOC","author":"Goldwasser S.","year":"1985","unstructured":"S. Goldwasser , S. Micali , and C. Rackoff . The knowledge complexity of interactive proof-systems (extended abstract) . In 17th ACM STOC , pages 291 -- 304 , Providence, RI , USA, May 6--8, 1985 . ACM Press . S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof-systems (extended abstract). In 17th ACM STOC, pages 291--304, Providence, RI, USA, May 6--8, 1985. ACM Press."},{"key":"e_1_3_2_1_34_1","volume-title":"Stealthdb: a scalable encrypted database with full sql query support. arXiv preprint arXiv:1711.02279","author":"Gribov A.","year":"2017","unstructured":"A. Gribov , D. Vinayagamurthy , and S. Gorbunov . Stealthdb: a scalable encrypted database with full sql query support. arXiv preprint arXiv:1711.02279 , 2017 . A. Gribov, D. Vinayagamurthy, and S. Gorbunov. Stealthdb: a scalable encrypted database with full sql query support. arXiv preprint arXiv:1711.02279, 2017."},{"volume-title":"Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks, page 0","author":"Grubbs P.","key":"e_1_3_2_1_35_1","unstructured":"P. Grubbs , M.-S. Lacharit\u00e9 , B. Minaud , and K. G. Paterson . Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks . In Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks, page 0 . IEEE. P. Grubbs, M.-S. Lacharit\u00e9, B. Minaud, and K. G. Paterson. Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks. In Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks, page 0. IEEE."},{"key":"e_1_3_2_1_36_1","first-page":"655","volume-title":"Leakage-abuse attacks against order-revealing encryption","author":"Grubbs P.","year":"2017","unstructured":"P. Grubbs , K. Sekniqi , V. Bindschaedler , M. Naveed , and T. Ristenpart . Leakage-abuse attacks against order-revealing encryption . pages 655 -- 672 , 2017 . P. Grubbs, K. Sekniqi, V. Bindschaedler, M. Naveed, and T. Ristenpart. Leakage-abuse attacks against order-revealing encryption. pages 655--672, 2017."},{"key":"e_1_3_2_1_37_1","volume-title":"Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation. 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography - WAHC'16","author":"Gupta D.","year":"2016","unstructured":"D. Gupta , B. Mood , J. Feigenbaum , K. Butler , and P. Traynor . Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation. 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography - WAHC'16 , ( February ), 2016 . D. Gupta, B. Mood, J. Feigenbaum, K. Butler, and P. Traynor. Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation. 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography - WAHC'16, (February), 2016."},{"key":"e_1_3_2_1_38_1","volume-title":"20th USENIX Security Symposium","author":"Haeberlen A.","year":"2011","unstructured":"A. Haeberlen , B. C. Pierce , and A. Narayan . Differential privacy under fire . In 20th USENIX Security Symposium , San Francisco, CA, USA, August 8--12 , 2011 , Proceedings. USENIX Association, 2011. A. Haeberlen, B. C. Pierce, and A. Narayan. Differential privacy under fire. In 20th USENIX Security Symposium, San Francisco, CA, USA, August 8--12, 2011, Proceedings. USENIX Association, 2011."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989453"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134030"},{"key":"e_1_3_2_1_41_1","first-page":"2611","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS '17","author":"Henry R.","year":"2017","unstructured":"R. Henry . Tutorial : Private information retrieval . In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS '17 , page 2611 -- 2612 , New York, NY, USA , 2017 . Association for Computing Machinery. R. Henry. Tutorial: Private information retrieval. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS '17, page 2611--2612, New York, NY, USA, 2017. Association for Computing Machinery."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3187009.3177733"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978386"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00029"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.14778\/3342263.3342274"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/795663.796363"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066164"},{"key":"e_1_3_2_1_49_1","volume-title":"A tutorial on the simulation proof technique","author":"Lindell Y.","year":"2018","unstructured":"Y. Lindell . How to simulate it : A tutorial on the simulation proof technique , 2018 . Tutorials on the Foundations of Cryptography . Y. Lindell. How to simulate it: A tutorial on the simulation proof technique, 2018. Tutorials on the Foundations of Cryptography."},{"key":"e_1_3_2_1_50_1","first-page":"359","volume-title":"Oakland","author":"Liu C.","year":"2015","unstructured":"C. Liu , X. S. Wang , K. Nayak , Y. Huang , and E. Shi . ObliVM : A Programming Framework for Secure Computation . Oakland , pages 359 -- 376 , 2015 . C. Liu, X. S. Wang, K. Nayak, Y. Huang, and E. Shi. ObliVM : A Programming Framework for Secure Computation. Oakland, pages 359--376, 2015."},{"key":"e_1_3_2_1_51_1","volume-title":"KDD 2010 Tutorial","author":"Liu K.","year":"2010","unstructured":"K. Liu , G. Miklau , J. Pei , and E. Terzi . Privacy-aware data mining in information networks . KDD 2010 Tutorial , 2010 . K. Liu, G. Miklau, J. Pei, and E. Terzi. Privacy-aware data mining in information networks. KDD 2010 Tutorial, 2010."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3054779"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3314030"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_8"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423358"},{"key":"e_1_3_2_1_58_1","first-page":"14","volume-title":"Proceedings of the 10th USENIX Symposium \u0142dots","author":"Narayan A.","year":"2012","unstructured":"A. Narayan and A. Haeberlen . DJoin: differentially private join queries over distributed databases . Proceedings of the 10th USENIX Symposium \u0142dots , page 14 , 2012 . A. Narayan and A. Haeberlen. DJoin: differentially private join queries over distributed databases. Proceedings of the 10th USENIX Symposium \u0142dots, page 14, 2012."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813651"},{"key":"e_1_3_2_1_60_1","first-page":"644","volume-title":"CCS","author":"Naveed M.","year":"2015","unstructured":"M. Naveed , C. V. Wright , S. Kamara , and C. V. Wright . Inference Attacks on Property-Preserving Encrypted Databases . In CCS , pages 644 -- 655 . ACM, 2015 . M. Naveed, C. V. Wright, S. Kamara, and C. V. Wright. Inference Attacks on Property-Preserving Encrypted Databases. In CCS, pages 644--655. ACM, 2015."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_5"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00025"},{"key":"e_1_3_2_1_64_1","first-page":"49","volume-title":"Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies","author":"Rajan A.","unstructured":"A. Rajan , L. Qin , D. W. Archer , D. Boneh , T. Lepoint , and M. Varia . Callisto: A cryptographic approach to detecting serial perpetrators of sexual misconduct . In Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies , page 49 . ACM, 2018. A. Rajan, L. Qin, D. W. Archer, D. Boneh, T. Lepoint, and M. Varia. Callisto: A cryptographic approach to detecting serial perpetrators of sexual misconduct. In Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, page 49. ACM, 2018."},{"key":"e_1_3_2_1_65_1","unstructured":"M. Rosulek. A brief history of practical garbled circuit optimizations 2015. Talk at Simons Secure Computation Workshop.  M. Rosulek. A brief history of practical garbled circuit optimizations 2015. Talk at Simons Secure Computation Workshop."},{"key":"e_1_3_2_1_66_1","first-page":"20","volume-title":"Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, NSDI'10","author":"Roy I.","year":"2010","unstructured":"I. Roy , S. T. V. Setty , A. Kilzer , V. Shmatikov , and E. Witchel . Airavat: Security and privacy for mapreduce . In Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, NSDI'10 , page 20 , USA, 2010 . USENIX Association. I. Roy, S. T. V. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: Security and privacy for mapreduce. In Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, NSDI'10, page 20, USA, 2010. USENIX Association."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3380596"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3380596"},{"key":"e_1_3_2_1_69_1","first-page":"57","volume-title":"Trusted execution environment: what it is, and what it is not. In 2015 IEEE Trustcom\/BigDataSE\/ISPA","author":"Sabt M.","year":"2015","unstructured":"M. Sabt , M. Achemlal , and A. Bouabdallah . Trusted execution environment: what it is, and what it is not. In 2015 IEEE Trustcom\/BigDataSE\/ISPA , volume 1 , pages 57 -- 64 . IEEE , 2015 . M. Sabt, M. Achemlal, and A. Bouabdallah. Trusted execution environment: what it is, and what it is not. In 2015 IEEE Trustcom\/BigDataSE\/ISPA, volume 1, pages 57--64. IEEE, 2015."},{"key":"e_1_3_2_1_70_1","first-page":"2017","article-title":"ZeroTrace: Oblivious memory primitives from Intel SGX. IACR Cryptology ?","volume":"549","author":"Sasy S.","year":"2017","unstructured":"S. Sasy , S. Gorbunov , and C. Fletcher . ZeroTrace: Oblivious memory primitives from Intel SGX. IACR Cryptology ? Archive Report , 549 : 2017 , 2017 . S. Sasy, S. Gorbunov, and C. Fletcher. ZeroTrace: Oblivious memory primitives from Intel SGX. IACR Cryptology ?Archive Report, 549:2017, 2017.","journal-title":"Archive Report"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00173"},{"key":"e_1_3_2_1_72_1","volume-title":"Kloakdb: A platform for analyzing sensitive data with k-anonymous query processing. CoRR, abs\/1904.00411","author":"Suresh M.","year":"2019","unstructured":"M. Suresh , Z. She , W. Wallace , A. Lahlou , and J. Rogers . Kloakdb: A platform for analyzing sensitive data with k-anonymous query processing. CoRR, abs\/1904.00411 , 2019 . M. Suresh, Z. She, W. Wallace, A. Lahlou, and J. Rogers. Kloakdb: A platform for analyzing sensitive data with k-anonymous query processing. CoRR, abs\/1904.00411, 2019."},{"key":"e_1_3_2_1_73_1","first-page":"1041","volume-title":"26th $$USENIX$$ Security Symposium ($$USENIX$$ Security 17)","author":"Bulck J. Van","year":"2017","unstructured":"J. Van Bulck , N. Weichbrodt , R. Kapitza , F. Piessens , and R. Strackx . Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution . In 26th $$USENIX$$ Security Symposium ($$USENIX$$ Security 17) , pages 1041 -- 1056 , 2017 . J. Van Bulck, N. Weichbrodt, R. Kapitza, F. Piessens, and R. Strackx. Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution. In 26th $$USENIX$$ Security Symposium ($$USENIX$$ Security 17), pages 1041--1056, 2017."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303982"},{"key":"e_1_3_2_1_75_1","first-page":"299","volume-title":"NSDI","author":"Wang F.","year":"2017","unstructured":"F. Wang , C. Yun , S. Goldwasser , V. Vaikuntanathan , and M. Zaharia . Splinter: Practical Private Queries on Public Data . In NSDI , pages 299 -- 313 , 2017 . F. Wang, C. Yun, S. Goldwasser, V. Vaikuntanathan, and M. Zaharia. Splinter: Practical Private Queries on Public Data. In NSDI, pages 299--313, 2017."},{"key":"e_1_3_2_1_76_1","first-page":"2421","volume-title":"CCS","author":"Wang W.","year":"2017","unstructured":"W. Wang , G. Chen , X. Pan , Y. Zhang , X. Wang , V. Bindschaedler , H. Tang , and C. A. Gunter . Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX . CCS , pages 2421 -- 2434 , 2017 . W. Wang, G. Chen, X. Pan, Y. Zhang, X. Wang, V. Bindschaedler, H. Tang, and C. A. Gunter. Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. CCS, pages 2421--2434, 2017."},{"key":"e_1_3_2_1_77_1","volume-title":"CCS","author":"Wang X.","year":"2017","unstructured":"X. Wang , S. Ranellucci , and J. Katz . Authenticated garbling and efficient maliciously secure two-party computation . In CCS , 2017 . X. Wang, S. Ranellucci, and J. Katz. Authenticated garbling and efficient maliciously secure two-party computation. In CCS, 2017."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00175"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588572"},{"key":"e_1_3_2_1_80_1","unstructured":"B. P. Y. Lindell. Secure computation and efficiency 2011. Invited talk at Bar-Ilan Winter School.  B. P. Y. Lindell. Secure computation and efficiency 2011. Invited talk at Bar-Ilan Winter School."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213910"},{"key":"e_1_3_2_1_82_1","first-page":"162","volume-title":"27th FOCS","author":"Yao A. C.-C.","year":"1986","unstructured":"A. C.-C. Yao . How to generate and exchange secrets (extended abstract) . In 27th FOCS , pages 162 -- 167 , Toronto, Ontario, Canada, Oct . 27--29, 1986 . IEEE Computer Society Press . A. C.-C. Yao. How to generate and exchange secrets (extended abstract). In 27th FOCS, pages 162--167, Toronto, Ontario, Canada, Oct. 27--29, 1986. IEEE Computer Society Press."},{"key":"e_1_3_2_1_83_1","first-page":"115","volume-title":"Proceedings of the 2018 International Conference on Management of Data, SIGMOD Conference 2018","author":"Zhang D.","year":"2018","unstructured":"D. Zhang , R. McKenna , I. Kotsogiannis , M. Hay , A. Machanavajjhala , and G. Miklau . EKTELO: A framework for defining differentially-private computations. In G. Das, C. M. Jermaine, and P. A. Bernstein, editors , Proceedings of the 2018 International Conference on Management of Data, SIGMOD Conference 2018 , Houston, TX, USA, June 10--15 , 2018 , pages 115 -- 130 . ACM, 2018. D. Zhang, R. McKenna, I. Kotsogiannis, M. Hay, A. Machanavajjhala, and G. Miklau. EKTELO: A framework for defining differentially-private computations. In G. Das, C. M. Jermaine, and P. A. Bernstein, editors, Proceedings of the 2018 International Conference on Management of Data, SIGMOD Conference 2018, Houston, TX, USA, June 10--15, 2018, pages 115--130. ACM, 2018."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813711"},{"key":"e_1_3_2_1_86_1","first-page":"283","volume-title":"14th $$USENIX$$ Symposium on Networked Systems Design and Implementation ($$NSDI$$ 17)","author":"Zheng W.","year":"2017","unstructured":"W. Zheng , A. Dave , J. G. Beekman , R. A. Popa , J. E. Gonzalez , and I. Stoica . Opaque: An oblivious and encrypted distributed analytics platform . In 14th $$USENIX$$ Symposium on Networked Systems Design and Implementation ($$NSDI$$ 17) , pages 283 -- 298 , 2017 . W. Zheng, A. Dave, J. G. Beekman, R. A. Popa, J. E. Gonzalez, and I. Stoica. Opaque: An oblivious and encrypted distributed analytics platform. In 14th $$USENIX$$ Symposium on Networked Systems Design and Implementation ($$NSDI$$ 17), pages 283--298, 2017."}],"event":{"name":"SIGMOD\/PODS '21: International Conference on Management of Data","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"],"location":"Virtual Event China","acronym":"SIGMOD\/PODS '21"},"container-title":["Proceedings of the 2021 International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448016.3457544","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448016.3457544","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448016.3457544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:25:04Z","timestamp":1750195504000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448016.3457544"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,9]]},"references-count":84,"alternative-id":["10.1145\/3448016.3457544","10.1145\/3448016"],"URL":"https:\/\/doi.org\/10.1145\/3448016.3457544","relation":{},"subject":[],"published":{"date-parts":[[2021,6,9]]},"assertion":[{"value":"2021-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}