,
, Building a Secure System using TrustZone® Technology, 2009.
, The JavaScript Object Notation (JSON) Data Interchange Format. RFC 7159, 2014.
,
,
,
, Data Expo'09 ASA Statistics Computing and Graphics, 2017.
,
, , 2017.
, , 2017.
,
,
, Reactive Streams for Kafka
,
, , 2017.
,
The Dataflow Model: A Practical Approach to Balancing Correctness, Latency, and Cost in Massivescale, Unbounded, Out-of-order Data Processing, Proc. VLDB Endow, vol.8, issue.12, pp.1792-1803, 2015. ,
Introduction to Functional Programming, 1988. ,
The impact of meta-tracing on vm design and implementation, Science of Computer Programming, vol.98, pp.408-421, 2015. ,
SecureKeeper: Confidential ZooKeeper Using Intel® SGX, Proceedings of the 17th International Middleware Conference, Middleware '16, vol.14, pp.1-14, 2016. ,
DOI : 10.1007/978-3-319-59665-5_13
Intel® SGX explained, Cryptology ePrint Archive, 2016. ,
Message-Oriented Middleware, pp.1-28, 2005. ,
DOI : 10.1002/0470862084.ch1
Calibrating noise to sensitivity in private data analysis, Theory of Cryptography Conference, pp.265-284, 2006. ,
The secure sockets layer (SSL) protocol version 3.0, 2011. ,
A Memory Encryption Engine Suitable for General Purpose Processors. IACR Cryptology ePrint Archive, p.204, 2016. ,
Lua-An Extensible Extension Language. Software: Practice and Experience, vol.26, pp.635-652, 1996. ,
DOI : 10.1002/(sici)1097-024x(199606)26:6<635::aid-spe26>3.0.co;2-p
A distributed messaging system for log processing, Proceedings of the NetDB, pp.1-7, 2011. ,
Twitter Heron: Stream Processing at Scale, Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, SIGMOD '15, pp.239-250, 2015. ,
Splay: Distributed systems evaluation made simple (or how to turn ideas into live systems in a breeze), Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, NSDI'09, pp.185-198, 2009. ,
The Java Virtual Machine Specification: Java SE 8 Edition, 2014. ,
Intel® software guard extensions (intel® sgx) support for dynamic memory management inside an enclave, Proceedings of the Hardware and Architectural Support for Security and Privacy, vol.2016, pp.1-10, 2016. ,
Defcon: High-performance event processing with information security, Proceedings of the 2010 USENIX Conference on USENIX Annual Technical Conference, USENIXATC'10, pp.1-1, 2010. ,
GUPT: Privacy Preserving Data Analysis Made Easy, Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, SIGMOD '12, pp.349-360, 2012. ,
SCONE: Secure Linux Containers with Intel SGX, 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2016. USENIX, 2016. ,
Secure content-based routing using intel® software guard extensions, Proceedings of the 17th International Middleware Conference, Middleware '16, vol.10, pp.1-10, 2016. ,
DOI : 10.1145/2988336.2988346
URL : http://arxiv.org/pdf/1701.04612
Airavat: Security and Privacy for MapReduce, Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, NSDI'10, pp.20-20, 2010. ,
Common Format and MIME Type for Comma-Separated Values (CSV) Files. RFC 4180, 2005. ,
Data-atrest security for Spark, 2016 IEEE International Conference on Big Data (Big Data), pp.1464-1473, 2016. ,
STYX: Stream Processing with Trustworthy Cloud-based Execution, Proceedings of the Seventh ACM Symposium on Cloud Computing, SoCC '16, pp.348-360, 2016. ,
On using the observer design pattern, XP, vol.9, p.2323533, 1997. ,
Mrcrypt: Static analysis for secure cloud computations, ACM Sigplan Notices, vol.48, issue.10, pp.271-286, 2013. ,
The Essence of Dataflow Programming, pp.135-167, 2006. ,
A framework for privacy-aware computing on hybrid clouds with mixed-sensitivity data, IEEE International Symposium on Big Data Security on CloudIEEE International Symposium on Big Data Security on Cloud, pp.1344-1349, 2015. ,
Discretized streams: Fault-tolerant streaming computation at scale, Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles, SOSP '13, pp.423-438, 2013. ,
Sedic: privacyaware data intensive computing on hybrid clouds, Proceedings of the 18th ACM conference on Computer and communications security, pp.515-526, 2011. ,