{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:12:55Z","timestamp":1750219975488,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,15]],"date-time":"2023-04-15T00:00:00Z","timestamp":1681516800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"MCIN\/AEI","award":["CEX2021- 001148-S"],"award-info":[{"award-number":["CEX2021- 001148-S"]}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["101016577"],"award-info":[{"award-number":["101016577"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002809","name":"Generalitat de Catalunya","doi-asserted-by":"publisher","award":["2021-SGR-00412"],"award-info":[{"award-number":["2021-SGR-00412"]}],"id":[{"id":"10.13039\/501100002809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Spanish Government","award":["PID2019- 107255GB"],"award-info":[{"award-number":["PID2019- 107255GB"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,15]]},"DOI":"10.1145\/3578245.3584727","type":"proceedings-article","created":{"date-parts":[[2023,4,3]],"date-time":"2023-04-03T22:14:44Z","timestamp":1680560084000},"page":"269-276","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Securing the Execution of ML Workflows across the Compute Continua"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9845-8890","authenticated-orcid":false,"given":"Francesc-Josep","family":"Lordan Gomis","sequence":"first","affiliation":[{"name":"Barcelona Supercomputing Center, Barcelona, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7135-6288","authenticated-orcid":false,"given":"Andr\u00e9","family":"Martin","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Dresden, Dresden, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5081-7244","authenticated-orcid":false,"given":"Daniele","family":"Lezzi","sequence":"additional","affiliation":[{"name":"Barcelona Supercomputing Center, Barcelona, Spain"}]}],"member":"320","published-online":{"date-parts":[[2023,4,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2014. Amazon Lambda. https:\/\/aws.amazon.com\/lambda\/"},{"key":"e_1_3_2_1_2_1","unstructured":"2014. Apache airflow. https:\/\/airflow.apache.org\/"},{"key":"e_1_3_2_1_3_1","unstructured":"2014. Intel Software Guard Extensions Developer Guide. https:\/\/software.intel.com\/en-us\/sgx-sdk\/documentation"},{"key":"e_1_3_2_1_4_1","unstructured":"2016. Apache Beam. https:\/\/beam.apache.org\/"},{"key":"e_1_3_2_1_5_1","unstructured":"2017. Amazon Greengrass. https:\/\/aws.amazon.com\/greengrass\/"},{"key":"e_1_3_2_1_6_1","volume-title":"SCONE: Secure Linux Containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'Keeffe, Mark L. Stillwell, David Goltzsche, Dave Eyers, R\u00fcdiger Kapitza, Peter Pietzuch, and Christof Fetzer. 2016. SCONE: Secure Linux Containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX Association, Savannah, GA, 689--703. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/arnautov"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307681.3325400"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3469263.3469858"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","unstructured":"Raphael Bost Raluca Popa Stephen Tu and Shafi Goldwasser. 2015. Machine Learning Classification over Encrypted Data. https:\/\/doi.org\/10.14722\/ndss.2015.23241","DOI":"10.14722\/ndss.2015.23241"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369583.3392683"},{"key":"e_1_3_2_1_12_1","volume-title":"Dask: Library for dynamic task scheduling. https:\/\/dask.org","author":"Team Dask Development","year":"2016","unstructured":"Dask Development Team. 2016. Dask: Library for dynamic task scheduling. https:\/\/dask.org"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956810"},{"key":"e_1_3_2_1_14_1","volume-title":"Information Security and Cryptology -- ICISC","author":"Graepel Thore","year":"2012","unstructured":"Thore Graepel, Kristin Lauter, and Michael Naehrig. 2013. ML Confidential: Machine Learning on Encrypted Data. In Information Security and Cryptology -- ICISC 2012, Taekyoung Kwon, Mun-Kyu Lee, and Daesung Kwon (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1--21."},{"key":"e_1_3_2_1_15_1","volume-title":"ACM SIGMOD Workshop on Networking Meets Databases","author":"Kreps Jay","year":"2011","unstructured":"Jay Kreps, Neha Narkhede, and Jun Rao. 2011. Kafka: a Distributed Messaging System for Log Processing. ACM SIGMOD Workshop on Networking Meets Databases (2011)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--85665--6_17"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-013--9272--5"},{"key":"e_1_3_2_1_18_1","volume-title":"PrivApprox: Privacy-Preserving Stream Analytics. In 2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Quoc Do Le","year":"2017","unstructured":"Do Le Quoc, Martin Beck, Pramod Bhatotia, Ruichuan Chen, Christof Fetzer, and Thorsten Strufe. 2017. PrivApprox: Privacy-Preserving Stream Analytics. In 2017 USENIX Annual Technical Conference (USENIX ATC 17). USENIX Association, Santa Clara, CA, 659--672. https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/quoc"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.07.007"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 2017 USENIX Conference on Usenix Annual Technical Conference (Santa Clara, CA, USA) (USENIX ATC '17). USENIX Association, USA, 645--658","author":"Tsai Chia-Che","year":"2017","unstructured":"Chia-Che Tsai, Donald E. Porter, and Mona Vij. 2017. Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In Proceedings of the 2017 USENIX Conference on Usenix Annual Technical Conference (Santa Clara, CA, USA) (USENIX ATC '17). USENIX Association, USA, 645--658."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00256-009-0861-0"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Matei Zaharia Tathagata Das Haoyuan Li Scott Shenker and Ion Stoica. 2012. Discretized streams: an efficient and fault-tolerant model for stream processing on large clusters. (2012).","DOI":"10.21236\/ADA575859"},{"volume-title":"Proceedings of the 15th International Conference on eScience. 96--105","author":"Cid-Fuentes Javier \u00c1lvarez","key":"e_1_3_2_1_23_1","unstructured":"Javier \u00c1lvarez Cid-Fuentes, Salvi Sol\u00e0, Pol \u00c1lvarez, Alfred Castro-Ginard, and Rosa M. Badia. 2019. dislib: Large Scale High Performance Machine Learning in Python. In Proceedings of the 15th International Conference on eScience. 96--105."}],"event":{"name":"ICPE '23: ACM\/SPEC International Conference on Performance Engineering","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Coimbra Portugal","acronym":"ICPE '23"},"container-title":["Companion of the 2023 ACM\/SPEC International Conference on Performance Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3578245.3584727","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3578245.3584727","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:20Z","timestamp":1750182560000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3578245.3584727"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,15]]},"references-count":23,"alternative-id":["10.1145\/3578245.3584727","10.1145\/3578245"],"URL":"https:\/\/doi.org\/10.1145\/3578245.3584727","relation":{},"subject":[],"published":{"date-parts":[[2023,4,15]]},"assertion":[{"value":"2023-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}