{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T18:44:03Z","timestamp":1746297843717,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":88,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,30]],"date-time":"2018-10-30T00:00:00Z","timestamp":1540857600000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1111529, CNS-1228198, CICI-1547324, IIS-1633331, CNS-1564112, and CNS-1629951"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"publisher","award":["1R01HG006844"],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134095","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"1211-1228","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":44,"title":["SGX-BigMatrix"],"prefix":"10.1145","author":[{"given":"Fahad","family":"Shaon","sequence":"first","affiliation":[{"name":"University of Texas at Dallas, Richardson, TX, USA"}]},{"given":"Murat","family":"Kantarcioglu","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Richardson, TX, USA"}]},{"given":"Zhiqiang","family":"Lin","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Richardson, TX, USA"}]},{"given":"Latifur","family":"Khan","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Richardson, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"volume-title":"Sovereign joins 22nd International Conference on Data Engineering (ICDE'06)","author":"Agrawal Rakesh","key":"e_1_3_2_2_1_1","unstructured":"Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu, and Yaping Li 2006. Sovereign joins 22nd International Conference on Data Engineering (ICDE'06). IEEE, 26--26."},{"volume-title":"Innovative technology for CPU based attestation and sealing Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy","author":"Anati Ittai","key":"e_1_3_2_2_2_1","unstructured":"Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative technology for CPU based attestation and sealing Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy, Vol. Vol. 13."},{"key":"e_1_3_2_2_3_1","unstructured":"Arvind Arasu Spyros Blanas Ken Eguro Raghav Kaushik Donald Kossmann Ravishankar Ramamurthy and Ramarathnam Venkatesan. 2013. Orthogonal Security with Cipherbase.. In CIDR. Citeseer."},{"key":"e_1_3_2_2_4_1","volume-title":"12th USENIX Symp. Operating Systems Design and Implementation.","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Daniel O'Keeffe, Mark L Stillwell, et almbox. 2016. SCONE: Secure linux containers with Intel SGX. In 12th USENIX Symp. Operating Systems Design and Implementation."},{"key":"e_1_3_2_2_5_1","first-page":"752","article-title":"TrustedDB: A trusted hardware-based database with privacy and data confidentiality. Knowledge and Data Engineering","volume":"26","author":"Bajaj Sumit","year":"2014","unstructured":"Sumit Bajaj and Radu Sion 2014. TrustedDB: A trusted hardware-based database with privacy and data confidentiality. Knowledge and Data Engineering, IEEE Transactions on, Vol. 26, 3 (2014), 752--765.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_2_6_1","volume-title":"2016 IEEE European Symposium on. IEEE, 245--260","author":"Barbosa Manuel","year":"2016","unstructured":"Manuel Barbosa, Bernardo Portela, Guillaume Scerri, and Bogdan Warinschi 2016. Foundations of hardware-based attested computation and application to SGX Security and Privacy (EuroS&P), 2016 IEEE European Symposium on. IEEE, 245--260."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1468075.1468121"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007788.3007792"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.52.0078"},{"volume-title":"SecureKeeper: Confidential ZooKeeper using Intel SGX Proceedings of the 16th Annual Middleware Conference (Middleware)","author":"Brenner Stefan","key":"e_1_3_2_2_11_1","unstructured":"Stefan Brenner, Colin Wulf, David Goltzsche, Nico Weichbrodt, Matthias Lorenz, Christof Fetzer, Peter Pietzuch, and R\u00fcdiger Kapitza 2016. SecureKeeper: Confidential ZooKeeper using Intel SGX Proceedings of the 16th Annual Middleware Conference (Middleware)."},{"key":"e_1_3_2_2_12_1","article-title":"Enhanced privacy ID from bilinear pairing for hardware authentication and attestation","volume":"2","author":"Brickell Ernie","year":"2011","unstructured":"Ernie Brickell and Jiangtao Li 2011. Enhanced privacy ID from bilinear pairing for hardware authentication and attestation. International Journal of Information Privacy, Security and Integrity 2, Vol. 1, 1 (2011), 3--33.","journal-title":"International Journal of Information Privacy, Security and Integrity"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66402-6_21"},{"key":"e_1_3_2_2_15_1","volume-title":"Beng Chin Ooi, and Chunwang Zhang","author":"Anh Dinh Tien Tuan","year":"2015","unstructured":"Tien Tuan Anh Dinh, Prateek Saxena, Ee-Chien Chang, Beng Chin Ooi, and Chunwang Zhang. 2015. M2r: Enabling stronger privacy in mapreduce computation 24th USENIX Security Symposium (USENIX Security 15). 447--462."},{"key":"e_1_3_2_2_16_1","unstructured":"Morris Dworkin. Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC. http:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800--38d.pdf. shownoteAccessed 5\/16\/2017."},{"key":"e_1_3_2_2_17_1","unstructured":"Ramez Elmasri. 2008. Fundamentals of database systems. Pearson Education India."},{"volume-title":"A Proactive Intelligent Decision Support System for Predicting the Popularity of Online News. Progress in Artificial Intelligence","author":"Fernandes Kelwin","key":"e_1_3_2_2_18_1","unstructured":"Kelwin Fernandes, Pedro Vinagre, and Paulo Cortez. 2015. A Proactive Intelligent Decision Support System for Predicting the Popularity of Online News. Progress in Artificial Intelligence. Springer, 535--546."},{"volume-title":"SGX-LAPD: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID'17)","author":"Fu Yangchun","key":"e_1_3_2_2_19_1","unstructured":"Yangchun Fu, Erick Bauman, Raul Quinonez, and Zhiqiang Lin 2017. SGX-LAPD: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID'17). Atlanta, Georgia. USA."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"Debayan Gupta Benjamin Mood Joan Feigenbaum Kevin Butler and Patrick Traynor. Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation Proceedings of the 2016 FC Workshop on Encrypted Computing and Applied Homomorphic Cryptography.","DOI":"10.1007\/978-3-662-53357-4_20"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/5.3.210"},{"volume-title":"Elementary matrix algebra","author":"Hohn Franz E","key":"e_1_3_2_2_22_1","unstructured":"Franz E Hohn. 2013. Elementary matrix algebra. Courier Corporation."},{"key":"e_1_3_2_2_23_1","unstructured":"Intel. Product Change Notification - 114074 - 00. https:\/\/qdms.intel.com\/dm\/i.aspx\/5A160770-FC47--47A0-BF8A-062540456F0A\/PCN114074-00.pdf. shownoteAccessed 5\/16\/2017."},{"key":"e_1_3_2_2_24_1","volume-title":"Attack and Mitigation. NDSS","volume":"20","author":"Islam Mohammad Saiful","year":"2012","unstructured":"Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation. NDSS, Vol. Vol. 20. 12."},{"key":"e_1_3_2_2_25_1","unstructured":"John King and Roger Magoulas 2016. 2016 Data Science Salary Survey. http:\/\/www.oreilly.com\/data\/free\/2016-data-science-salary-survey.csp. (September 2016)."},{"key":"e_1_3_2_2_26_1","volume-title":"Proceedings of the 12th ACM Symposium on Information, Computer and Communications Security. Abu Dhabi, UAE.","author":"Krandle Vishal","year":"2017","unstructured":"Vishal Krandle, Erick Bauman, Zhiqiang Lin, and Latifur Khan 2017. Securing System Logs with SGX. In Proceedings of the 12th ACM Symposium on Information, Computer and Communications Security. Abu Dhabi, UAE."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.75.7.3034"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753532"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217301"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2009.10129177"},{"key":"e_1_3_2_2_31_1","volume-title":"2015 IEEE Symposium on. IEEE, 359--376","author":"Liu Chang","year":"2015","unstructured":"Chang Liu, Xiao Shaun Wang, Kartik Nayak, Yan Huang, and Elaine Shi 2015. Oblivm: A programming framework for secure computation Security and Privacy (SP), 2015 IEEE Symposium on. IEEE, 359--376."},{"key":"e_1_3_2_2_32_1","volume-title":"Intel\u00ae Software Guard Extensions (Intel\u00ae SGX) Support for Dynamic Memory Management Inside an Enclave Proceedings of the Hardware and Architectural Support for Security and Privacy","author":"McKeen Frank","year":"2016","unstructured":"Frank McKeen, Ilya Alexandrovich, Ittai Anati, Dror Caspi, Simon Johnson, Rebekah Leslie-Hurd, and Carlos Rozas 2016. Intel\u00ae Software Guard Extensions (Intel\u00ae SGX) Support for Dynamic Memory Management Inside an Enclave Proceedings of the Hardware and Architectural Support for Security and Privacy 2016. ACM, 10."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1162\/153244302760200678"},{"volume-title":"Inference attacks on property-preserving encrypted databases Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 644--655","author":"Naveed Muhammad","key":"e_1_3_2_2_34_1","unstructured":"Muhammad Naveed, Seny Kamara, and Charles V Wright. 2015. Inference attacks on property-preserving encrypted databases Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 644--655."},{"volume-title":"Applied linear statistical models","author":"Neter John","key":"e_1_3_2_2_35_1","unstructured":"John Neter, Michael H Kutner, Christopher J Nachtsheim, and William Wasserman 1996. Applied linear statistical models. Vol. Vol. 4. Irwin Chicago."},{"key":"e_1_3_2_2_36_1","volume-title":"Oblivious Multi-Party Machine Learning on Trusted Processors 25th USENIX Security Symposium (USENIX Security 16)","author":"Ohrimenko Olga","year":"2016","unstructured":"Olga Ohrimenko, Felix Schuster, C\u00e9dric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, and Manuel Costa 2016. Oblivious Multi-Party Machine Learning on Trusted Processors 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 619--636. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/ohrimenko"},{"key":"e_1_3_2_2_37_1","unstructured":"Lawrence Page Sergey Brin Rajeev Motwani and Terry Winograd 1999. The PageRank citation ranking: Bringing order to the web. bibinfotypeTechnical Report. bibinfoinstitutionStanford InfoLab."},{"volume-title":"Raccoon: closing digital side-channels through obfuscated execution 24th USENIX Security Symposium (USENIX Security 15). 431--446","author":"Rane Ashay","key":"e_1_3_2_2_39_1","unstructured":"Ashay Rane, Calvin Lin, and Mohit Tiwari 2015. Raccoon: closing digital side-channels through obfuscated execution 24th USENIX Security Symposium (USENIX Security 15). 431--446."},{"key":"e_1_3_2_2_40_1","volume-title":"2015 IEEE Symposium on. IEEE, 38--54","author":"Schuster Felix","year":"2015","unstructured":"Felix Schuster, Manuel Costa, C\u00e9dric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, and Mark Russinovich. 2015. VC3: Trustworthy data analytics in the cloud using SGX Security and Privacy (SP), 2015 IEEE Symposium on. IEEE, 38--54."},{"volume-title":"Linear regression analysis","author":"Seber George AF","key":"e_1_3_2_2_41_1","unstructured":"George AF Seber and Alan J Lee 2012. Linear regression analysis. Vol. Vol. 936. John Wiley & Sons."},{"volume-title":"T-SGX: Eradicating controlled-channel attacks against enclave programs Proceedings of the 2017 Annual Network and Distributed System Security Symposium (NDSS)","author":"Shih Ming-Wei","key":"e_1_3_2_2_42_1","unstructured":"Ming-Wei Shih, Sangho Lee, Taesoo Kim, and Marcus Peinado. 2017. T-SGX: Eradicating controlled-channel attacks against enclave programs Proceedings of the 2017 Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","unstructured":"Emil Stefanov Marten van Dijk Elaine Shi Christopher Fletcher Ling Ren Xiangyao Yu and Srinivas Devadas 2013. Path ORAM: An Extremely Simple Oblivious RAM Protocol CCS. 299--310. https:\/\/doi.org\/10.1145\/2508859.2516660","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488336"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_2_46_1","volume-title":"Opaque: A Data Analytics Platform with Strong Security 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng, Ankur Dave, Jethro Beekman, Raluca Ada Popa, Joseph Gonzalez, and Ion Stoica. 2017. Opaque: A Data Analytics Platform with Strong Security 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). USENIX Association, Boston, MA. https:\/\/www.usenix.org\/conference\/nsdi17\/technical-sessions\/presentation\/zheng"},{"volume-title":"Sovereign joins 22nd International Conference on Data Engineering (ICDE'06)","author":"Agrawal Rakesh","key":"e_1_3_2_2_47_1","unstructured":"Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu, and Yaping Li 2006. Sovereign joins 22nd International Conference on Data Engineering (ICDE'06). IEEE, 26--26."},{"volume-title":"Innovative technology for CPU based attestation and sealing Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy","author":"Anati Ittai","key":"e_1_3_2_2_48_1","unstructured":"Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative technology for CPU based attestation and sealing Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy, Vol. Vol. 13."},{"key":"e_1_3_2_2_49_1","unstructured":"Arvind Arasu Spyros Blanas Ken Eguro Raghav Kaushik Donald Kossmann Ravishankar Ramamurthy and Ramarathnam Venkatesan. 2013. Orthogonal Security with Cipherbase.. In CIDR. Citeseer."},{"key":"e_1_3_2_2_50_1","volume-title":"12th USENIX Symp. Operating Systems Design and Implementation.","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Daniel O'Keeffe, Mark L Stillwell, et almbox. 2016. SCONE: Secure linux containers with Intel SGX. In 12th USENIX Symp. Operating Systems Design and Implementation."},{"key":"e_1_3_2_2_51_1","first-page":"752","article-title":"TrustedDB: A trusted hardware-based database with privacy and data confidentiality. Knowledge and Data Engineering","volume":"26","author":"Bajaj Sumit","year":"2014","unstructured":"Sumit Bajaj and Radu Sion 2014. TrustedDB: A trusted hardware-based database with privacy and data confidentiality. Knowledge and Data Engineering, IEEE Transactions on, Vol. 26, 3 (2014), 752--765.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_2_52_1","volume-title":"2016 IEEE European Symposium on. IEEE, 245--260","author":"Barbosa Manuel","year":"2016","unstructured":"Manuel Barbosa, Bernardo Portela, Guillaume Scerri, and Bogdan Warinschi 2016. Foundations of hardware-based attested computation and application to SGX Security and Privacy (EuroS&P), 2016 IEEE European Symposium on. IEEE, 245--260."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1468075.1468121"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007788.3007792"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.52.0078"},{"volume-title":"SecureKeeper: Confidential ZooKeeper using Intel SGX Proceedings of the 16th Annual Middleware Conference (Middleware)","author":"Brenner Stefan","key":"e_1_3_2_2_57_1","unstructured":"Stefan Brenner, Colin Wulf, David Goltzsche, Nico Weichbrodt, Matthias Lorenz, Christof Fetzer, Peter Pietzuch, and R\u00fcdiger Kapitza 2016. SecureKeeper: Confidential ZooKeeper using Intel SGX Proceedings of the 16th Annual Middleware Conference (Middleware)."},{"key":"e_1_3_2_2_58_1","article-title":"Enhanced privacy ID from bilinear pairing for hardware authentication and attestation","volume":"2","author":"Brickell Ernie","year":"2011","unstructured":"Ernie Brickell and Jiangtao Li 2011. Enhanced privacy ID from bilinear pairing for hardware authentication and attestation. International Journal of Information Privacy, Security and Integrity 2, Vol. 1, 1 (2011), 3--33.","journal-title":"International Journal of Information Privacy, Security and Integrity"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66402-6_21"},{"key":"e_1_3_2_2_61_1","volume-title":"Beng Chin Ooi, and Chunwang Zhang","author":"Anh Dinh Tien Tuan","year":"2015","unstructured":"Tien Tuan Anh Dinh, Prateek Saxena, Ee-Chien Chang, Beng Chin Ooi, and Chunwang Zhang. 2015. M2r: Enabling stronger privacy in mapreduce computation 24th USENIX Security Symposium (USENIX Security 15). 447--462."},{"key":"e_1_3_2_2_62_1","unstructured":"Morris Dworkin. Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC. http:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800--38d.pdf. shownoteAccessed 5\/16\/2017."},{"key":"e_1_3_2_2_63_1","unstructured":"Ramez Elmasri. 2008. Fundamentals of database systems. Pearson Education India."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23485-4_53"},{"volume-title":"SGX-LAPD: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID'17)","author":"Fu Yangchun","key":"e_1_3_2_2_65_1","unstructured":"Yangchun Fu, Erick Bauman, Raul Quinonez, and Zhiqiang Lin 2017. SGX-LAPD: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID'17). Atlanta, Georgia. USA."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"crossref","unstructured":"Debayan Gupta Benjamin Mood Joan Feigenbaum Kevin Butler and Patrick Traynor. Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation Proceedings of the 2016 FC Workshop on Encrypted Computing and Applied Homomorphic Cryptography.","DOI":"10.1007\/978-3-662-53357-4_20"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/5.3.210"},{"volume-title":"Elementary matrix algebra","author":"Hohn Franz E","key":"e_1_3_2_2_68_1","unstructured":"Franz E Hohn. 2013. Elementary matrix algebra. Courier Corporation."},{"key":"e_1_3_2_2_69_1","unstructured":"Intel. Product Change Notification - 114074 - 00. https:\/\/qdms.intel.com\/dm\/i.aspx\/5A160770-FC47--47A0-BF8A-062540456F0A\/PCN114074-00.pdf. shownoteAccessed 5\/16\/2017."},{"key":"e_1_3_2_2_70_1","volume-title":"Attack and Mitigation. NDSS","volume":"20","author":"Islam Mohammad Saiful","year":"2012","unstructured":"Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation. NDSS, Vol. Vol. 20. 12."},{"key":"e_1_3_2_2_71_1","unstructured":"John King and Roger Magoulas 2016. 2016 Data Science Salary Survey. http:\/\/www.oreilly.com\/data\/free\/2016-data-science-salary-survey.csp. (September 2016)."},{"key":"e_1_3_2_2_72_1","volume-title":"Proceedings of the 12th ACM Symposium on Information, Computer and Communications Security. Abu Dhabi, UAE.","author":"Krandle Vishal","year":"2017","unstructured":"Vishal Krandle, Erick Bauman, Zhiqiang Lin, and Latifur Khan 2017. Securing System Logs with SGX. In Proceedings of the 12th ACM Symposium on Information, Computer and Communications Security. Abu Dhabi, UAE."},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.75.7.3034"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753532"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217301"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2009.10129177"},{"key":"e_1_3_2_2_77_1","volume-title":"2015 IEEE Symposium on. IEEE, 359--376","author":"Liu Chang","year":"2015","unstructured":"Chang Liu, Xiao Shaun Wang, Kartik Nayak, Yan Huang, and Elaine Shi 2015. Oblivm: A programming framework for secure computation Security and Privacy (SP), 2015 IEEE Symposium on. IEEE, 359--376."},{"key":"e_1_3_2_2_78_1","volume-title":"Intel\u00ae Software Guard Extensions (Intel\u00ae SGX) Support for Dynamic Memory Management Inside an Enclave Proceedings of the Hardware and Architectural Support for Security and Privacy","author":"McKeen Frank","year":"2016","unstructured":"Frank McKeen, Ilya Alexandrovich, Ittai Anati, Dror Caspi, Simon Johnson, Rebekah Leslie-Hurd, and Carlos Rozas 2016. Intel\u00ae Software Guard Extensions (Intel\u00ae SGX) Support for Dynamic Memory Management Inside an Enclave Proceedings of the Hardware and Architectural Support for Security and Privacy 2016. ACM, 10."},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1162\/153244302760200678"},{"volume-title":"Inference attacks on property-preserving encrypted databases Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 644--655","author":"Naveed Muhammad","key":"e_1_3_2_2_80_1","unstructured":"Muhammad Naveed, Seny Kamara, and Charles V Wright. 2015. Inference attacks on property-preserving encrypted databases Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 644--655."},{"volume-title":"Applied linear statistical models","author":"Neter John","key":"e_1_3_2_2_81_1","unstructured":"John Neter, Michael H Kutner, Christopher J Nachtsheim, and William Wasserman 1996. Applied linear statistical models. Vol. Vol. 4. Irwin Chicago."},{"key":"e_1_3_2_2_82_1","volume-title":"Oblivious Multi-Party Machine Learning on Trusted Processors 25th USENIX Security Symposium (USENIX Security 16)","author":"Ohrimenko Olga","year":"2016","unstructured":"Olga Ohrimenko, Felix Schuster, C\u00e9dric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, and Manuel Costa 2016. Oblivious Multi-Party Machine Learning on Trusted Processors 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 619--636. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/ohrimenko"},{"key":"e_1_3_2_2_83_1","unstructured":"Lawrence Page Sergey Brin Rajeev Motwani and Terry Winograd 1999. The PageRank citation ranking: Bringing order to the web. bibinfotypeTechnical Report. bibinfoinstitutionStanford InfoLab."},{"volume-title":"Raccoon: closing digital side-channels through obfuscated execution 24th USENIX Security Symposium (USENIX Security 15). 431--446","author":"Rane Ashay","key":"e_1_3_2_2_85_1","unstructured":"Ashay Rane, Calvin Lin, and Mohit Tiwari 2015. Raccoon: closing digital side-channels through obfuscated execution 24th USENIX Security Symposium (USENIX Security 15). 431--446."},{"key":"e_1_3_2_2_86_1","volume-title":"2015 IEEE Symposium on. IEEE, 38--54","author":"Schuster Felix","year":"2015","unstructured":"Felix Schuster, Manuel Costa, C\u00e9dric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, and Mark Russinovich. 2015. VC3: Trustworthy data analytics in the cloud using SGX Security and Privacy (SP), 2015 IEEE Symposium on. IEEE, 38--54."},{"volume-title":"Linear regression analysis","author":"Seber George AF","key":"e_1_3_2_2_87_1","unstructured":"George AF Seber and Alan J Lee 2012. Linear regression analysis. Vol. Vol. 936. John Wiley & Sons."},{"volume-title":"T-SGX: Eradicating controlled-channel attacks against enclave programs Proceedings of the 2017 Annual Network and Distributed System Security Symposium (NDSS)","author":"Shih Ming-Wei","key":"e_1_3_2_2_88_1","unstructured":"Ming-Wei Shih, Sangho Lee, Taesoo Kim, and Marcus Peinado. 2017. T-SGX: Eradicating controlled-channel attacks against enclave programs Proceedings of the 2017 Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA."},{"key":"e_1_3_2_2_89_1","doi-asserted-by":"publisher","unstructured":"Emil Stefanov Marten van Dijk Elaine Shi Christopher Fletcher Ling Ren Xiangyao Yu and Srinivas Devadas 2013. Path ORAM: An Extremely Simple Oblivious RAM Protocol CCS. 299--310. https:\/\/doi.org\/10.1145\/2508859.2516660","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_3_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488336"},{"key":"e_1_3_2_2_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_2_92_1","volume-title":"Opaque: A Data Analytics Platform with Strong Security 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng, Ankur Dave, Jethro Beekman, Raluca Ada Popa, Joseph Gonzalez, and Ion Stoica. 2017. Opaque: A Data Analytics Platform with Strong Security 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). USENIX Association, Boston, MA. https:\/\/www.usenix.org\/conference\/nsdi17\/technical-sessions\/presentation\/zhengendthebibliography"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134095","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T04:43:44Z","timestamp":1721191424000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134095"}},"subtitle":["A Practical Encrypted Data Analytic Framework With Trusted Processors"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":88,"alternative-id":["10.1145\/3133956.3134095","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134095","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}