{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:33:10Z","timestamp":1773513190835,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T00:00:00Z","timestamp":1638748800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,6]]},"DOI":"10.1145\/3485832.3485919","type":"proceedings-article","created":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T13:42:32Z","timestamp":1638798152000},"page":"235-247","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["TEEKAP: Self-Expiring Data Capsule using Trusted Execution Environment"],"prefix":"10.1145","author":[{"given":"Mingyuan","family":"Gao","sequence":"first","affiliation":[{"name":"School of Computing, National University of Singapore, Singapore"}]},{"given":"Hung","family":"Dang","sequence":"additional","affiliation":[{"name":"IRICS, Vietnam"}]},{"given":"Ee-Chien","family":"Chang","sequence":"additional","affiliation":[{"name":"School of Computing, National University of Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2021,12,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy(HASP \u201913)","author":"Anati Ittai","year":"2013","unstructured":"Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative Technology for CPU Based Attestation and Sealing. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy(HASP \u201913)."},{"key":"e_1_3_2_1_2_1","unstructured":"Jason Bay Joel Kek Alvin Tan Chai\u00a0Sheng Hau Yongquan Lai Janice Tan and Quy\u00a0Tang Anh. 2020. BlueTrace White Paper. https:\/\/bluetrace.io\/static\/bluetrace_whitepaper-938063656596c104632def383eb33b3c.pdf. Last accessed: 2021-09-15."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064213"},{"key":"e_1_3_2_1_4_1","volume-title":"Concurrency Control and Recovery in Database Systems (1 ed.)","author":"Bernstein A","unstructured":"Philip\u00a0A Bernstein, Vassos Hadzilacos, and Nathan Goodman. 1987. Concurrency Control and Recovery in Database Systems (1 ed.). Addison-Wesley."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2366316.2366333"},{"key":"e_1_3_2_1_6_1","unstructured":"Mic Bowman Andrea Miele Michael Steiner and Bruno Vavala. 2018. Private Data Objects: an Overview. arXiv:1807.05686. Retrieved from https:\/\/arxiv.org\/abs\/1807.05686."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.45"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 27th USENIX Conference on Security Symposium(SEC \u201918)","author":"Bulck Jo\u00a0Van","year":"2018","unstructured":"Jo\u00a0Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas\u00a0F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In Proceedings of the 27th USENIX Conference on Security Symposium(SEC \u201918)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/296806.296824"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11602897_25"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00023"},{"key":"e_1_3_2_1_12_1","unstructured":"Intel Corporation. 2021. Attestation Services for Intel SGX. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/topics\/software-guard-extensions\/attestation-services.html. Last accessed: 2021-09-15."},{"key":"e_1_3_2_1_13_1","unstructured":"Intel Corporation. 2021. Intel Attestation Service for SGX: API Documentation. https:\/\/api.trustedservices.intel.com\/documents\/sgx-attestation-api-spec.pdf. Last accessed: 2021-09-15."},{"key":"e_1_3_2_1_14_1","unstructured":"Intel Corporation. 2021. Intel SGX DCAP Orientation Guide. https:\/\/software.intel.com\/content\/dam\/develop\/public\/us\/en\/documents\/intel-sgx-dcap-ecdsa-orientation.pdf. Last accessed: 2021-09-15."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 25th USENIX Conference on Security Symposium(SEC \u201916)","author":"Costan Victor","year":"2016","unstructured":"Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In Proceedings of the 25th USENIX Conference on Security Symposium(SEC \u201916)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0026"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319889"},{"key":"e_1_3_2_1_18_1","first-page":"3","article-title":"The Algorithmic Foundations of Differential Privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork and Aaron Roth. 2014. The Algorithmic Foundations of Differential Privacy. Found. Trends Theor. Comput. Sci. 9, 3\u20134 (Aug. 2014), 211\u2013407.","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"e_1_3_2_1_19_1","unstructured":"Facebook Inc. 2021. Facebook Stories. https:\/\/www.facebook.com\/help\/862926927385914\/?helpref=hc_fnav. Last accessed: 2021-09-15."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134106"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 1999 IEEE Symposium on Security and Privacy(S&P \u201999)","author":"Fraser Timothy","year":"1999","unstructured":"Timothy Fraser, Lee Badger, and Mark Feldman. 1999. Hardening COTS Software with Generic Software Wrappers. In Proceedings of the 1999 IEEE Symposium on Security and Privacy(S&P \u201999)."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 18th Conference on USENIX Security Symposium(SEC \u201909)","author":"Geambasu Roxana","year":"2009","unstructured":"Roxana Geambasu, Tadayoshi Kohno, Amit\u00a0A. Levy, and Henry\u00a0M. Levy. 2009. Vanish: Increasing Data Privacy with Self-Destructing Data. In Proceedings of the 18th Conference on USENIX Security Symposium(SEC \u201909)."},{"key":"e_1_3_2_1_24_1","unstructured":"Foster\u00a0D Hinshaw Craig\u00a0S Harris and Sunil\u00a0K Sarin. 2006. Distributed Concurrency Control using Serialization Ordering. US Patent 7146366. Retrieved from https:\/\/www.freepatentsonline.com\/7146366.html."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.3191268"},{"key":"e_1_3_2_1_26_1","volume-title":"Introduction to Modern Cryptography(2 ed.)","author":"Katz Jonathan","unstructured":"Jonathan Katz and Yehuda Lindell. 2014. Introduction to Modern Cryptography(2 ed.). Chapman and Hall\/CRC."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.109"},{"key":"e_1_3_2_1_29_1","unstructured":"WhatApp LLC. 2021. WhatsApp Disappearing Messages. https:\/\/faq.whatsapp.com\/general\/chats\/about-disappearing-messages. Last accessed: 2021-09-15."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/357084.357090"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363203"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 26th Conference on USENIX Security Symposium(SEC \u201917)","author":"Matetic Sinisa","year":"2017","unstructured":"Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David\u00a0M. Sommer, Arthur Gervais, Ari Juels, and Srdjan Capkun. 2017. ROTE: Rollback Protection for Trusted Execution. In Proceedings of the 26th Conference on USENIX Security Symposium(SEC \u201917)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_34_1","unstructured":"Jianting Ning Hung Dang Ruomu Hou and Ee-Chien Chang. 2018. Keeping Time-Release Secrets through Smart Contracts. Cryptology ePrint Archive Report 2018\/1166. Retrieved from https:\/\/ia.cr\/2018\/1166."},{"key":"e_1_3_2_1_35_1","unstructured":"Singapore\u00a0Ministry of Communications and Information. 2019. Public Report of the Committee of the Inquiry into the Cyber Attack on SingHealth. https:\/\/www.mci.gov.sg\/pressroom\/news-and-stories\/pressroom\/2019\/1\/public-report-of-the-coi. Last accessed: 2021-09-15."},{"key":"e_1_3_2_1_36_1","unstructured":"The International\u00a0Consortium of Investigative\u00a0Journalists. 2021. The Panama Papers: Exposing the Rogue Offshore Finance Industry. https:\/\/www.icij.org\/investigations\/panama-papers. Last accessed: 2021-09-15."},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 2018 USENIX Annual Technical Conference(ATC \u201918)","author":"Oleksenko Oleksii","year":"2018","unstructured":"Oleksii Oleksenko, Bohdan Trach, Robert Krahn, Mark Silberstein, and Christof Fetzer. 2018. Varys: Protecting SGX Enclaves from Practical Side-Channel Attacks. In Proceedings of the 2018 USENIX Annual Technical Conference(ATC \u201918)."},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the 2014 USENIX Annual Technical Conference(ATC \u201914)","author":"Ongaro Diego","year":"2014","unstructured":"Diego Ongaro and John\u00a0K Ousterhout. 2014. In Search of an Understandable Consensus Algorithm. In Proceedings of the 2014 USENIX Annual Technical Conference(ATC \u201914)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/582318.582339"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1264860"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134098"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.28"},{"key":"e_1_3_2_1_45_1","unstructured":"European Union. 2016. General Data Protection Regulation Article 17: Right to erasure (\u2018right to be forgotten\u2019). https:\/\/gdpr.eu\/article-17-right-to-be-forgotten. Last accessed: 2021-09-15."},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the First Symposium on Logic in Computer Science(LICS \u201986)","author":"Y.","unstructured":"Moshe\u00a0Y. Vardi and Pierre Wolper. 1986. An Automata-Theoretic Approach to Automatic Program Verification. In Proceedings of the First Symposium on Logic in Computer Science(LICS \u201986)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243800"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0295-x"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"}],"event":{"name":"ACSAC '21: Annual Computer Security Applications Conference","location":"Virtual Event USA","acronym":"ACSAC '21"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485832.3485919","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3485832.3485919","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:16:40Z","timestamp":1755890200000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485832.3485919"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,6]]},"references-count":49,"alternative-id":["10.1145\/3485832.3485919","10.1145\/3485832"],"URL":"https:\/\/doi.org\/10.1145\/3485832.3485919","relation":{},"subject":[],"published":{"date-parts":[[2021,12,6]]},"assertion":[{"value":"2021-12-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}