Building a Secure System using TrustZone® Technology, ARM Limited, issue.2, 2009. ,
https://docs.docker.com/compose/. [11] Docker Swarm ,
Intel Core? i7-6700. http://ark.intel.com/products Intel-Core-i7-6700-Processor-8M-Cache-up-to-4 00-GHz ,
The dataflow model, Proc. VLDB Endow, pp.1792-1803, 2015. ,
DOI : 10.14778/2824032.2824076
Introduction to Functional Programming, 1988. ,
The impact of meta-tracing on VM design and implementation, Science of Computer Programming, vol.98, pp.408-421, 2015. ,
SecureKeeper, Proceedings of the 17th International Middleware Conference on, Middleware '16, pp.1-14, 2016. ,
DOI : 10.1145/2541940.2541949
Intel SGX explained, 2016. ,
Message-Oriented Middleware, pp.1-28, 2005. ,
DOI : 10.1002/0470862084.ch1
Calibrating Noise to Sensitivity in Private Data Analysis, Theory of Cryptography Conference, pp.265-284, 2006. ,
DOI : 10.1007/11681878_14
The secure sockets layer (SSL) protocol version 3, 2011. ,
DOI : 10.17487/rfc6101
A Memory Encryption Engine Suitable for General Purpose Processors, IACR Cryptology ePrint Archive, vol.2016, p.204, 2016. ,
DOI : 10.1109/msp.2016.124
Lua???An Extensible Extension Language, Software: Practice and Experience, vol.26, issue.6, pp.635-652, 1996. ,
DOI : 10.1002/(SICI)1097-024X(199606)26:6<635::AID-SPE26>3.0.CO;2-P
URL : ftp://ftp.tecgraf.puc-rio.br/pub/lhf/doc/lua.ps.gz
Kafka: A distributed messaging system for log processing, Proceedings of the NetDB, pp.1-7, 2011. ,
Twitter Heron, Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, SIGMOD '15, pp.239-250, 2015. ,
DOI : 10.1145/2588555.2595641
The Java Virtual Machine Specification: Java SE 8 Edition, 2014. ,
2016. Intel&Reg ; Software Guard Extensions (Intel&Reg; SGX) Support for Dynamic Memory Management Inside an Enclave, Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, p.2954331, 2016. ,
GUPT, Proceedings of the 2012 international conference on Management of Data, SIGMOD '12, pp.349-360, 2012. ,
DOI : 10.1145/2213836.2213876
Secure Content-Based Routing Using Intel Software Guard Extensions, Proceedings of the 17th International Middleware Conference on, Middleware '16, 2010. ,
DOI : 10.1109/SFCS.1986.25
Airavat: Security and Privacy for MapReduce, Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation (NSDI'10), 2010. ,
Common Format and MIME Type for Comma-Separated Values (CSV) Files. RFC 4180. DOI:https ,
DOI : 10.17487/rfc4180
Data-at-rest security for spark, 2016 IEEE International Conference on Big Data (Big Data), 2016. ,
DOI : 10.1109/BigData.2016.7840754
STYX, Proceedings of the Seventh ACM Symposium on Cloud Computing, SoCC '16, pp.348-360, 2016. ,
DOI : 10.14778/2535573.2488336
On using the observer design pattern. XP-002323533, 1997. ,
MrCrypt, ACM SIGPLAN Notices, vol.48, issue.10, pp.271-286, 2013. ,
DOI : 10.1145/2544173.2509554
The Essence of Dataflow Programming, pp.135-167, 2006. ,
A Framework for Privacy-Aware Computing on Hybrid Clouds with Mixed-Sensitivity Data, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems, pp.1344-1349, 2015. ,
DOI : 10.1109/HPCC-CSS-ICESS.2015.110
Discretized Streams: Faulttolerant Streaming Computation at Scale, Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles (SOSP '13, pp.423-438, 2013. ,
DOI : 10.1145/2517349.2522737
Sedic, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.515-526, 2011. ,
DOI : 10.1145/2046707.2046767