{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T05:36:56Z","timestamp":1775281016577,"version":"3.50.1"},"reference-count":65,"publisher":"Association for Computing Machinery (ACM)","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2022,7]]},"abstract":"<jats:p>Pooling and sharing data increases and distributes its value. But since data cannot be revoked once shared, scenarios that require controlled release of data for regulatory, privacy, and legal reasons default to not sharing. Because selectively controlling what data to release is difficult, the few data-sharing consortia that exist are often built around data-sharing agreements resulting from long and tedious one-off negotiations.<\/jats:p>\n          <jats:p>\n            We introduce Data Station, a data escrow designed to enable the formation of data-sharing consortia. Data\n            <jats:italic>owners<\/jats:italic>\n            share data with the escrow knowing it will not be released without their consent. Data\n            <jats:italic>users<\/jats:italic>\n            delegate their computation to the escrow. The data escrow relies on delegated computation to execute queries without releasing the data first. Data Station leverages hardware enclaves to generate\n            <jats:italic>trust<\/jats:italic>\n            among participants, and exploits the centralization of data and computation to generate an audit log.\n          <\/jats:p>\n          <jats:p>We evaluate Data Station on machine learning and data-sharing applications while running on an untrusted intermediary. In addition to important qualitative advantages, we show that Data Station: i) outperforms federated learning baselines in accuracy and runtime for the machine learning application; ii) is orders of magnitude faster than alternative secure data-sharing frameworks; and iii) introduces small overhead on the critical path.<\/jats:p>","DOI":"10.14778\/3551793.3551861","type":"journal-article","created":{"date-parts":[[2022,9,29]],"date-time":"2022-09-29T22:25:03Z","timestamp":1664490303000},"page":"3172-3185","source":"Crossref","is-referenced-by-count":13,"title":["Data station"],"prefix":"10.14778","volume":"15","author":[{"given":"Siyuan","family":"Xia","sequence":"first","affiliation":[{"name":"The University of Chicago"}]},{"given":"Zhiru","family":"Zhu","sequence":"additional","affiliation":[{"name":"The University of Chicago"}]},{"given":"Chris","family":"Zhu","sequence":"additional","affiliation":[{"name":"The University of Chicago"}]},{"given":"Jinjin","family":"Zhao","sequence":"additional","affiliation":[{"name":"The University of Chicago"}]},{"given":"Kyle","family":"Chard","sequence":"additional","affiliation":[{"name":"The University of Chicago"}]},{"given":"Aaron J.","family":"Elmore","sequence":"additional","affiliation":[{"name":"The University of Chicago"}]},{"given":"Ian","family":"Foster","sequence":"additional","affiliation":[{"name":"The University of Chicago"}]},{"given":"Michael","family":"Franklin","sequence":"additional","affiliation":[{"name":"The University of Chicago"}]},{"given":"Sanjay","family":"Krishnan","sequence":"additional","affiliation":[{"name":"The University of Chicago"}]},{"given":"Raul Castro","family":"Fernandez","sequence":"additional","affiliation":[{"name":"The University of Chicago"}]}],"member":"320","published-online":{"date-parts":[[2022,9,29]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"https:\/\/fate.fedai.org\/ Online","author":"FATE.","year":"2022","unstructured":"[n.d.]. FATE. https:\/\/fate.fedai.org\/ Online ; accessed 29 May 2022 . [n.d.]. FATE. https:\/\/fate.fedai.org\/ Online; accessed 29 May 2022."},{"key":"e_1_2_1_2_1","volume-title":"Python-fuse interface to libfuse. https:\/\/github.com\/libfuse\/python-fuse. Online","year":"2022","unstructured":"[n.d.]. Python-fuse interface to libfuse. https:\/\/github.com\/libfuse\/python-fuse. Online ; accessed 29 May 2022 . [n.d.]. Python-fuse interface to libfuse. https:\/\/github.com\/libfuse\/python-fuse. Online; accessed 29 May 2022."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"e_1_2_1_4_1","unstructured":"Yael Amsterdamer and Osnat Drien. 2020. Towards Fine-Grained Data Access Control Through Active Peer Probing.. In EDBT. 403--406.  Yael Amsterdamer and Osnat Drien. 2020. Towards Fine-Grained Data Access Control Through Active Peer Probing.. In EDBT. 403--406."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3386141"},{"key":"e_1_2_1_6_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov , Bohdan Trach , Franz Gregor , Thomas Knauth , Andre Martin , Christian Priebe , Joshua Lind , Divya Muthukumaran , Dan O'keeffe , Mark L Stillwell , 2016 . SCONE: Secure Linux containers with Intel SGX . In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16) . 689--703. Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'keeffe, Mark L Stillwell, et al. 2016. SCONE: Secure Linux containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). 689--703."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14778\/3291264.3291274"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407854"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"key":"e_1_2_1_10_1","volume-title":"Pedro PB de Gusm\u00e3o, and Nicholas D Lane","author":"Beutel Daniel J","year":"2020","unstructured":"Daniel J Beutel , Taner Topal , Akhil Mathur , Xinchi Qiu , Titouan Parcollet , Pedro PB de Gusm\u00e3o, and Nicholas D Lane . 2020 . Flower : A friendly federated learning research framework. arXiv preprint arXiv.2007.14390 (2020). Daniel J Beutel, Taner Topal, Akhil Mathur, Xinchi Qiu, Titouan Parcollet, Pedro PB de Gusm\u00e3o, and Nicholas D Lane. 2020. Flower: A friendly federated learning research framework. arXiv preprint arXiv.2007.14390 (2020)."},{"key":"e_1_2_1_11_1","series-title":"2","volume-title":"12th Generation Intel\u00ae Core\u2122 Processors --- Datasheet","author":"CCG CCE Tech Pubs - Intel Corp. 2022.","year":"2022","unstructured":"CCG CCE Tech Pubs - Intel Corp. 2022. 12th Generation Intel\u00ae Core\u2122 Processors --- Datasheet , Volume 1 of 2 . https:\/\/www.intel.com\/content\/www\/us\/en\/products\/docs\/processors\/core\/core-technical-resources.html. Online ; accessed 28 February 2022 . CCG CCE Tech Pubs - Intel Corp. 2022. 12th Generation Intel\u00ae Core\u2122 Processors --- Datasheet, Volume 1 of 2. https:\/\/www.intel.com\/content\/www\/us\/en\/products\/docs\/processors\/core\/core-technical-resources.html. Online; accessed 28 February 2022."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1008694.1008698"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387552"},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Tim Dierks and Eric Rescorla. 2008. The transport layer security (TLS) protocol version 1.2. (2008).  Tim Dierks and Eric Rescorla. 2008. The transport layer security (TLS) protocol version 1.2. (2008).","DOI":"10.17487\/rfc5246"},{"key":"e_1_2_1_15_1","unstructured":"Peter F Edemekong Pavan Annamaraju and Micelle J Haydel. 2018. Health insurance portability and accountability act. (2018).  Peter F Edemekong Pavan Annamaraju and Micelle J Haydel. 2018. Health insurance portability and accountability act. (2018)."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.14778\/3342263.3342636"},{"key":"e_1_2_1_17_1","volume-title":"IEEE 34th International Conference on Data Engineering. IEEE, 1001--1012","author":"Fernandez Raul Castro","year":"2018","unstructured":"Raul Castro Fernandez , Ziawasch Abedjan , Famien Koko , Gina Yuan , Samuel Madden , and Michael Stonebraker . 2018 . Aurum: A data discovery system . In IEEE 34th International Conference on Data Engineering. IEEE, 1001--1012 . Raul Castro Fernandez, Ziawasch Abedjan, Famien Koko, Gina Yuan, Samuel Madden, and Michael Stonebraker. 2018. Aurum: A data discovery system. In IEEE 34th International Conference on Data Engineering. IEEE, 1001--1012."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1177\/0002716217742610"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00054"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2018.00024"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3231594"},{"key":"e_1_2_1_24_1","unstructured":"Intel Corporation. 2017. Enclave Memory Measurement Tool for Intel\u00ae Software Guard Extensions (Intel\u00ae SGX) Enclaves. https:\/\/www.intel.com\/content\/dam\/develop\/external\/us\/en\/documents\/enclave-measurement-tool-intel-sgx-737361.pdf. Online; accessed 24 February 2022.  Intel Corporation. 2017. Enclave Memory Measurement Tool for Intel\u00ae Software Guard Extensions (Intel\u00ae SGX) Enclaves. https:\/\/www.intel.com\/content\/dam\/develop\/external\/us\/en\/documents\/enclave-measurement-tool-intel-sgx-737361.pdf. Online; accessed 24 February 2022."},{"key":"e_1_2_1_25_1","volume-title":"Intel\u00ae 64 and IA-32 Architectures Software Developer's Manual","author":"Intel Corporation","year":"2022","unstructured":"Intel Corporation . 2021. Intel\u00ae 64 and IA-32 Architectures Software Developer's Manual , Volume 3D: System Programming Guide, Part 4 . https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/intel-sdm.html. Online ; accessed 23 February 2022 . Intel Corporation. 2021. Intel\u00ae 64 and IA-32 Architectures Software Developer's Manual, Volume 3D: System Programming Guide, Part 4. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/intel-sdm.html. Online; accessed 23 February 2022."},{"key":"e_1_2_1_26_1","volume-title":"ICPSR Data Enclaves. https:\/\/www.icpsr.umich.edu\/web\/pages\/ICPSR\/access\/restricted\/enclave.html. Online","author":"Inter-university Consortium for Political and Social Research. 2022.","year":"2022","unstructured":"Inter-university Consortium for Political and Social Research. 2022. ICPSR Data Enclaves. https:\/\/www.icpsr.umich.edu\/web\/pages\/ICPSR\/access\/restricted\/enclave.html. Online ; accessed 18 February 2022 . Inter-university Consortium for Political and Social Research. 2022. ICPSR Data Enclaves. https:\/\/www.icpsr.umich.edu\/web\/pages\/ICPSR\/access\/restricted\/enclave.html. Online; accessed 18 February 2022."},{"key":"e_1_2_1_27_1","volume-title":"Kallista Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, et al.","author":"Kairouz Peter","year":"2021","unstructured":"Peter Kairouz , H Brendan McMahan , Brendan Avent , Aur\u00e9lien Bellet , Mehdi Bennis , Arjun Nitin Bhagoji , Kallista Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, et al. 2021 . Advances and open problems in federated learning. Foundations and Trends\u00ae in Machine Learning 14, 1--2 (2021), 1--210. Peter Kairouz, H Brendan McMahan, Brendan Avent, Aur\u00e9lien Bellet, Mehdi Bennis, Arjun Nitin Bhagoji, Kallista Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, et al. 2021. Advances and open problems in federated learning. Foundations and Trends\u00ae in Machine Learning 14, 1--2 (2021), 1--210."},{"key":"e_1_2_1_28_1","volume-title":"2nd International SANE Conference","volume":"43","author":"Kamp Poul-Henning","year":"2000","unstructured":"Poul-Henning Kamp and Robert NM Watson . 2000 . Jails: Confining the omnipotent root . In 2nd International SANE Conference , Vol. 43 . 116. Poul-Henning Kamp and Robert NM Watson. 2000. Jails: Confining the omnipotent root. In 2nd International SANE Conference, Vol. 43. 116."},{"key":"e_1_2_1_29_1","volume-title":"AMD memory encryption. White paper","author":"Kaplan David","year":"2016","unstructured":"David Kaplan , Jeremy Powell , and Tom Woller . 2016. AMD memory encryption. White paper ( 2016 ). David Kaplan, Jeremy Powell, and Tom Woller. 2016. AMD memory encryption. White paper (2016)."},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the 2020 USENIX Annual Technical Conference (USENIX ATC '20). USENIX Association.","author":"Keahey Kate","year":"2020","unstructured":"Kate Keahey , Jason Anderson , Zhuo Zhen , Pierre Riteau , Paul Ruth , Dan Stanzione , Mert Cevik , Jacob Colleran , Haryadi S. Gunawi , Cody Hammock , Joe Mambretti , Alexander Barnes , Francois Halbach , Alex Rocha , and Joe Stubbs . 2020 . Lessons Learned from the Chameleon Testbed . In Proceedings of the 2020 USENIX Annual Technical Conference (USENIX ATC '20). USENIX Association. Kate Keahey, Jason Anderson, Zhuo Zhen, Pierre Riteau, Paul Ruth, Dan Stanzione, Mert Cevik, Jacob Colleran, Haryadi S. Gunawi, Cody Hammock, Joe Mambretti, Alexander Barnes, Francois Halbach, Alex Rocha, and Joe Stubbs. 2020. Lessons Learned from the Chameleon Testbed. In Proceedings of the 2020 USENIX Annual Technical Conference (USENIX ATC '20). USENIX Association."},{"key":"e_1_2_1_31_1","volume-title":"stress-ng. https:\/\/github.com\/ColinIanKing\/stress-ng Online","author":"King Colin Ian","year":"2022","unstructured":"Colin Ian King . [n.d.]. stress-ng. https:\/\/github.com\/ColinIanKing\/stress-ng Online ; accessed 29 May 2022 . Colin Ian King. [n.d.]. stress-ng. https:\/\/github.com\/ColinIanKing\/stress-ng Online; accessed 29 May 2022."},{"key":"e_1_2_1_32_1","unstructured":"Alex Krizhevsky Geoffrey Hinton etal 2009. Learning multiple layers of features from tiny images. (2009).  Alex Krizhevsky Geoffrey Hinton et al. 2009. Learning multiple layers of features from tiny images. (2009)."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1556401.1556403"},{"key":"e_1_2_1_34_1","volume-title":"April 6","author":"Learning Federated","year":"2017","unstructured":"Federated Learning . 2017. Collaborative machine learning without centralized training data. Publication date: Thursday , April 6 ( 2017 ). Federated Learning. 2017. Collaborative machine learning without centralized training data. Publication date: Thursday, April 6 (2017)."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485253"},{"key":"e_1_2_1_37_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Li Mengyuan","year":"2021","unstructured":"Mengyuan Li , Yinqian Zhang , Huibo Wang , Kang Li , and Yueqiang Cheng . 2021 . {CIPHERLEAKS}: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel . In 30th USENIX Security Symposium (USENIX Security 21) . 717--732. Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, and Yueqiang Cheng. 2021. {CIPHERLEAKS}: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel. In 30th USENIX Security Symposium (USENIX Security 21). 717--732."},{"key":"e_1_2_1_38_1","volume-title":"Secrecy: Secure collaborative analytics on secret-shared data. arXiv preprint arXiv.2102.01048","author":"Liagouris John","year":"2021","unstructured":"John Liagouris , Vasiliki Kalavri , Muhammad Faisal , and Mayank Varia . 2021 . Secrecy: Secure collaborative analytics on secret-shared data. arXiv preprint arXiv.2102.01048 (2021). John Liagouris, Vasiliki Kalavri, Muhammad Faisal, and Mayank Varia. 2021. Secrecy: Secure collaborative analytics on secret-shared data. arXiv preprint arXiv.2102.01048 (2021)."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3314030"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1602.05629"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/128765.128770"},{"key":"e_1_2_1_42_1","volume-title":"https:\/\/www.nightingalescience.org\/. Online","author":"Science Nightingale Open","year":"2022","unstructured":"Nightingale Open Science . 2022. https:\/\/www.nightingalescience.org\/. Online ; accessed 25 February 2022 . Nightingale Open Science. 2022. https:\/\/www.nightingalescience.org\/. Online; accessed 25 February 2022."},{"key":"e_1_2_1_43_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum . 2004 . Privacy as contextual integrity . Wash. L. Rev. 79 (2004), 119 . Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79 (2004), 119.","journal-title":"Wash. L. Rev."},{"key":"e_1_2_1_44_1","volume-title":"NORC Data Enclave. https:\/\/www.norc.org\/Research\/Capabilities\/Pages\/data-enclave.aspx. Online","author":"NORC.","year":"2022","unstructured":"NORC. 2022. NORC Data Enclave. https:\/\/www.norc.org\/Research\/Capabilities\/Pages\/data-enclave.aspx. Online ; accessed 18 February 2022 . NORC. 2022. NORC Data Enclave. https:\/\/www.norc.org\/Research\/Capabilities\/Pages\/data-enclave.aspx. Online; accessed 18 February 2022."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3478290"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3320212"},{"key":"e_1_2_1_47_1","volume-title":"Shih han Wang, Prashant Shah, and Spyridon Bakas.","author":"Reina G Anthony","year":"2021","unstructured":"G Anthony Reina , Alexey Gruzdev , Patrick Foley , Olga Perepelkina , Mansi Sharma , Igor Davidyuk , Ilya Trushkin , Maksim Radionov , Aleksandr Mokrov , Dmitry Agapov , Jason Martin , Brandon Edwards , Micah J. Sheller , Sarthak Pati , Prakash Narayana Moorthy , Shih han Wang, Prashant Shah, and Spyridon Bakas. 2021 . OpenFL: An open-source framework for Federated Learning . arXiv:2105.06413 [cs.LG] G Anthony Reina, Alexey Gruzdev, Patrick Foley, Olga Perepelkina, Mansi Sharma, Igor Davidyuk, Ilya Trushkin, Maksim Radionov, Aleksandr Mokrov, Dmitry Agapov, Jason Martin, Brandon Edwards, Micah J. Sheller, Sarthak Pati, Prakash Narayana Moorthy, Shih han Wang, Prashant Shah, and Spyridon Bakas. 2021. OpenFL: An open-source framework for Federated Learning. arXiv:2105.06413 [cs.LG]"},{"key":"e_1_2_1_48_1","volume-title":"CCF: A framework for building confidential verifiable replicated services. Technical report, Microsoft Research and Microsoft Azure","author":"Russinovich Mark","year":"2019","unstructured":"Mark Russinovich , Edward Ashton , Christine Avanessians , Miguel Castro , Amaury Chamayou , Sylvan Clebsch , Manuel Costa , C\u00e9dric Fournet , Matthew Kerner , Sid Krishna , 2019 . CCF: A framework for building confidential verifiable replicated services. Technical report, Microsoft Research and Microsoft Azure (2019). Mark Russinovich, Edward Ashton, Christine Avanessians, Miguel Castro, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, C\u00e9dric Fournet, Matthew Kerner, Sid Krishna, et al. 2019. CCF: A framework for building confidential verifiable replicated services. Technical report, Microsoft Research and Microsoft Azure (2019)."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_2_1_50_1","volume-title":"White Paper","author":"AMD","year":"2020","unstructured":"AMD SEV-SNP. 2020 . Strengthening VM isolation with integrity protection and more . White Paper , January (2020). AMD SEV-SNP. 2020. Strengthening VM isolation with integrity protection and more. White Paper, January (2020)."},{"key":"e_1_2_1_51_1","volume-title":"PAC: Practical Accountability for CCF. arXiv preprint arXiv.2105.13116","author":"Shamis Alex","year":"2021","unstructured":"Alex Shamis , Peter Pietzuch , Miguel Castro , Edward Ashton , Amaury Chamayou , Sylvan Clebsch , Antoine Delignat-Lavaud , Cedric Fournet , Matthew Kerner , Julien Maffre , 2021 . PAC: Practical Accountability for CCF. arXiv preprint arXiv.2105.13116 (2021). Alex Shamis, Peter Pietzuch, Miguel Castro, Edward Ashton, Amaury Chamayou, Sylvan Clebsch, Antoine Delignat-Lavaud, Cedric Fournet, Matthew Kerner, Julien Maffre, et al. 2021. PAC: Practical Accountability for CCF. arXiv preprint arXiv.2105.13116 (2021)."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.14778\/3447689.3447705"},{"key":"e_1_2_1_53_1","volume-title":"AMD SEV Guide. https:\/\/documentation.suse.com\/sles\/15-SP2\/html\/SLES-amd-sev\/art-amd-sev.html. Online","author":"SUSE.","year":"2022","unstructured":"SUSE. 2022. AMD SEV Guide. https:\/\/documentation.suse.com\/sles\/15-SP2\/html\/SLES-amd-sev\/art-amd-sev.html. Online ; accessed 28 February 2022 . SUSE. 2022. AMD SEV Guide. https:\/\/documentation.suse.com\/sles\/15-SP2\/html\/SLES-amd-sev\/art-amd-sev.html. Online; accessed 28 February 2022."},{"key":"e_1_2_1_54_1","volume-title":"FUSE: Filesystem in userspace","author":"Szeredi Miklos","year":"2010","unstructured":"Miklos Szeredi . 2010 . FUSE: Filesystem in userspace . http:\/\/fuse.sourceforge.net (2010). Miklos Szeredi. 2010. FUSE: Filesystem in userspace. http:\/\/fuse.sourceforge.net (2010)."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0021101"},{"key":"e_1_2_1_56_1","volume-title":"Adult Income Dataset. https:\/\/www.kaggle.com\/wenruliu\/adult-income-dataset. Online","author":"UCI.","year":"2022","unstructured":"UCI. 2022. Adult Income Dataset. https:\/\/www.kaggle.com\/wenruliu\/adult-income-dataset. Online ; accessed 1 March 2022 . UCI. 2022. Adult Income Dataset. https:\/\/www.kaggle.com\/wenruliu\/adult-income-dataset. Online; accessed 1 March 2022."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303982"},{"key":"e_1_2_1_58_1","volume-title":"13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)","author":"Wang Frank","year":"2016","unstructured":"Frank Wang , James Mickens , Nickolai Zeldovich , and Vinod Vaikuntanathan . 2016 . Sieve: Cryptographically enforced access control for user data in untrusted clouds . In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16) . 611--626. Frank Wang, James Mickens, Nickolai Zeldovich, and Vinod Vaikuntanathan. 2016. Sieve: Cryptographically enforced access control for user data in untrusted clouds. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). 611--626."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"e_1_2_1_60_1","first-page":"166","article-title":"Privacy and freedom","volume":"25","author":"Westin Alan F","year":"1968","unstructured":"Alan F Westin . 1968 . Privacy and freedom . Washington and Lee Law Review 25 , 1 (1968), 166 . Alan F Westin. 1968. Privacy and freedom. Washington and Lee Law Review 25, 1 (1968), 166.","journal-title":"Washington and Lee Law Review"},{"key":"e_1_2_1_61_1","volume-title":"https:\/\/github.com\/AlexSWong\/COVID-Net Online","author":"Wong Alex","year":"2022","unstructured":"Alex Wong . [n.d.]. COVID-Net. https:\/\/github.com\/AlexSWong\/COVID-Net Online ; accessed 21 May 2022 . Alex Wong. [n.d.]. COVID-Net. https:\/\/github.com\/AlexSWong\/COVID-Net Online; accessed 21 May 2022."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2608029.2608031"},{"key":"e_1_2_1_63_1","volume-title":"14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng , Ankur Dave , Jethro G Beekman , Raluca Ada Popa , Joseph E Gonzalez , and Ion Stoica . 2017 . Opaque: An oblivious and encrypted distributed analytics platform . In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17) . 283--298. Wenting Zheng, Ankur Dave, Jethro G Beekman, Raluca Ada Popa, Joseph E Gonzalez, and Ion Stoica. 2017. Opaque: An oblivious and encrypted distributed analytics platform. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). 283--298."},{"key":"e_1_2_1_64_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Zheng Wenting","year":"2021","unstructured":"Wenting Zheng , Ryan Deng , Weikeng Chen , Raluca Ada Popa , Aurojit Panda , and Ion Stoica . 2021 . Cerebro: A Platform for {Multi-Party} Cryptographic Collaborative Learning . In 30th USENIX Security Symposium (USENIX Security 21) . 2723--2740. Wenting Zheng, Ryan Deng, Weikeng Chen, Raluca Ada Popa, Aurojit Panda, and Ion Stoica. 2021. Cerebro: A Platform for {Multi-Party} Cryptographic Collaborative Learning. In 30th USENIX Security Symposium (USENIX Security 21). 2723--2740."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.14778\/3476311.3476351"},{"key":"e_1_2_1_66_1","volume-title":"Pysyft: A library for easy federated learning. In Federated Learning Systems","author":"Ziller Alexander","year":"2021","unstructured":"Alexander Ziller , Andrew Trask , Antonio Lopardo , Benjamin Szymkow , Bobby Wagner , Emma Bluemke , Jean-Mickael Nounahon , Jonathan Passerat-Palmbach , Kritika Prakash , Nick Rose , 2021 . Pysyft: A library for easy federated learning. In Federated Learning Systems . Springer , 111--139. Alexander Ziller, Andrew Trask, Antonio Lopardo, Benjamin Szymkow, Bobby Wagner, Emma Bluemke, Jean-Mickael Nounahon, Jonathan Passerat-Palmbach, Kritika Prakash, Nick Rose, et al. 2021. Pysyft: A library for easy federated learning. In Federated Learning Systems. Springer, 111--139."}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/3551793.3551861","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T10:53:26Z","timestamp":1672224806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/3551793.3551861"}},"subtitle":["delegated, trustworthy, and auditable computation to enable data-sharing consortia with a data escrow"],"short-title":[],"issued":{"date-parts":[[2022,7]]},"references-count":65,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["10.14778\/3551793.3551861"],"URL":"https:\/\/doi.org\/10.14778\/3551793.3551861","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2022,7]]}}}