{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T05:37:00Z","timestamp":1775281020941,"version":"3.50.1"},"reference-count":37,"publisher":"Association for Computing Machinery (ACM)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2017,2]]},"abstract":"<jats:p>\n            People and machines are collecting data at an unprecedented rate. Despite this newfound abundance of data, progress has been slow in\n            <jats:italic>sharing<\/jats:italic>\n            it for open science, business, and other data-intensive endeavors. Many such efforts are stymied by privacy concerns and regulatory compliance issues. For example, many hospitals are interested in pooling their medical records for research, but none may disclose arbitrary patient records to researchers or other healthcare providers. In this context we propose the Private Data Network (PDN), a federated database for querying over the collective data of\n            <jats:italic>mutually distrustful<\/jats:italic>\n            parties. In a PDN, each member database does not reveal its tuples to its peers nor to the query writer. Instead, the user submits a query to an honest broker that plans and coordinates its execution over multiple private databases using secure multiparty computation (SMC). Here, each database's query execution is\n            <jats:italic>oblivious<\/jats:italic>\n            , and its program counters and memory traces are agnostic to the inputs of others.\n          <\/jats:p>\n          <jats:p>\n            We introduce a framework for executing PDN queries named\n            <jats:sc>smcql<\/jats:sc>\n            . This system translates SQL statements into SMC primitives to compute query results over the union of its source databases without revealing sensitive information about individual tuples to peer data providers or the honest broker. Only the honest broker and the querier receive the results of a PDN query. For fast, secure query evaluation, we explore a heuristics-driven optimizer that minimizes the PDN's use of secure computation and partitions its query evaluation into scalable slices.\n          <\/jats:p>","DOI":"10.14778\/3055330.3055334","type":"journal-article","created":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T14:27:29Z","timestamp":1489588049000},"page":"673-684","source":"Crossref","is-referenced-by-count":108,"title":["SMCQL"],"prefix":"10.14778","volume":"10","author":[{"given":"Johes","family":"Bater","sequence":"first","affiliation":[{"name":"Northwestern University"}]},{"given":"Gregory","family":"Elliott","sequence":"additional","affiliation":[{"name":"Northwestern University"}]},{"given":"Craig","family":"Eggen","sequence":"additional","affiliation":[{"name":"Northwestern University"}]},{"given":"Satyender","family":"Goel","sequence":"additional","affiliation":[{"name":"Northwestern University"}]},{"given":"Abel","family":"Kho","sequence":"additional","affiliation":[{"name":"Northwestern University"}]},{"given":"Jennie","family":"Rogers","sequence":"additional","affiliation":[{"name":"Northwestern University"}]}],"member":"320","published-online":{"date-parts":[[2017,2]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"CIDR","author":"Aggarwal G.","year":"2005"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335438"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1077501.1077513"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275492"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62214"},{"key":"e_1_2_1_7_1","volume-title":"NDSS","author":"Chow S. S.","year":"2009"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.84"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_23"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28416"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866358"},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","unstructured":"A. F. Hernandez R. L. Fleurence and R. L. Rothman. The ADAPTABLE Trial and PCORnet: shining light on a new research paradigm. Annals of internal medicine 163(8):635--636 2015.  A. F. Hernandez R. L. Fleurence and R. L. Rothman. The ADAPTABLE Trial and PCORnet: shining light on a new research paradigm. Annals of internal medicine 163(8):635--636 2015.","DOI":"10.7326\/M15-1460"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1198\/106186005X47714"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046786"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484364"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocv038"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2014-002827"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_6"},{"key":"e_1_2_1_21_1","first-page":"262","volume-title":"Round-efficient Oblivious Database Manipulation. ISC'11","author":"Laur S.","year":"2011"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20810-7_7"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.29"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046787"},{"key":"e_1_2_1_25_1","volume-title":"USENIX Security Symposium","volume":"4","author":"Malkhi D.","year":"2004"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497437"},{"key":"e_1_2_1_28_1","first-page":"14122","article-title":"Characterizing the Effects of Recurrent Clostridium Difficile Infection on Patients. IRB Protocol","author":"PCORI","year":"2015","journal-title":"ORA"},{"key":"e_1_2_1_29_1","volume-title":"IRB Protocol","author":"PCORI.","year":"2015"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_2_1_31_1","volume-title":"McGraw-Hill","author":"Ramakrishnan R.","year":"2000"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.48"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465106.2465117"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/647348.724331"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2723721"},{"key":"e_1_2_1_37_1","doi-asserted-by":"crossref","unstructured":"D. Volpano C. Irvine and G. Smith. A sound type system for secure flow analysis. Journal of computer security 4(2--3):167--187 1996.   D. Volpano C. Irvine and G. Smith. A sound type system for secure flow analysis. Journal of computer security 4(2--3):167--187 1996.","DOI":"10.3233\/JCS-1996-42-304"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/3055330.3055334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T10:08:21Z","timestamp":1672222101000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/3055330.3055334"}},"subtitle":["secure querying for federated databases"],"short-title":[],"issued":{"date-parts":[[2017,2]]},"references-count":37,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["10.14778\/3055330.3055334"],"URL":"https:\/\/doi.org\/10.14778\/3055330.3055334","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2017,2]]}}}