{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:17Z","timestamp":1750220357183,"version":"3.41.0"},"reference-count":10,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Lawrence Berkeley National Laboratory Contractor Supported Research"},{"name":"U.S. Department of Energy, Office of Science, Office of Advanced Scientific Computing Research","award":["DE-AC02-05CH11231"],"award-info":[{"award-number":["DE-AC02-05CH11231"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2021,5]]},"abstract":"<jats:p>Addressing the trust issues underlying the current limits on data sharing.<\/jats:p>","DOI":"10.1145\/3457191","type":"journal-article","created":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T14:14:22Z","timestamp":1619446462000},"page":"18-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Trustworthy scientific computing"],"prefix":"10.1145","volume":"64","author":[{"given":"Sean","family":"Peisert","sequence":"first","affiliation":[{"name":"University of California, Davis"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the 35th IEEE International Parallel & Distributed Processing Symposium.","author":"Akram A.","year":"2021","unstructured":"Akram , A. et al. Performance analysis of scientific computing workloads on trusted execution environments . In Proceedings of the 35th IEEE International Parallel & Distributed Processing Symposium. ( 2021 ). Akram, A. et al. Performance analysis of scientific computing workloads on trusted execution environments. In Proceedings of the 35th IEEE International Parallel & Distributed Processing Symposium. (2021)."},{"key":"e_1_2_1_2_1","first-page":"1368905","article-title":"Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities","author":"Choi J.I.","year":"2019","unstructured":"Choi , J.I. and Butler , K . Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities . Security and Communication Networks 1368905 ( 2019 ). Choi, J.I. and Butler, K. Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities. Security and Communication Networks 1368905 (2019).","journal-title":"Security and Communication Networks"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3335150"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2019.8847586"},{"key":"e_1_2_1_6_1","unstructured":"Narayanan A. and Felten E.W. No Silver Bullet: De-identification Still Doesn't Work. (2014); https:\/\/bit.ly\/3loBvMd  Narayanan A. and Felten E.W. No Silver Bullet: De-identification Still Doesn't Work. (2014); https:\/\/bit.ly\/3loBvMd"},{"key":"e_1_2_1_7_1","volume-title":"Wired (July 14","author":"Newman L.H.","year":"2020","unstructured":"Newman , L.H. Google moves to secure the Cloud from itself . Wired (July 14 , 2020 ); https:\/\/bit.ly\/2NnLLru Newman, L.H. Google moves to secure the Cloud from itself. Wired (July 14, 2020); https:\/\/bit.ly\/2NnLLru"},{"key":"e_1_2_1_8_1","unstructured":"Peisert S. An examination and survey of data confidentiality issues and solutions in academic research computing. Trusted CI Report (2020); https:\/\/bit.ly\/30Oajx9  Peisert S. An examination and survey of data confidentiality issues and solutions in academic research computing. Trusted CI Report (2020); https:\/\/bit.ly\/30Oajx9"},{"key":"e_1_2_1_9_1","unstructured":"Potti S. and Manor E. Expanding Google Cloud's Confidential Computing portfolio. (2020); https:\/\/bit.ly\/38Nozuo  Potti S. and Manor E. Expanding Google Cloud's Confidential Computing portfolio. (2020); https:\/\/bit.ly\/38Nozuo"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2020.9099920"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3457191","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3457191","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:19Z","timestamp":1750191439000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3457191"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":10,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10.1145\/3457191"],"URL":"https:\/\/doi.org\/10.1145\/3457191","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}