{"id":"https://openalex.org/W4318624558","doi":"https://doi.org/10.1109/tdsc.2023.3241164","title":"Shielding Graph for eXact Analytics With SGX","display_name":"Shielding Graph for eXact Analytics With SGX","publication_year":2023,"publication_date":"2023-01-31","ids":{"openalex":"https://openalex.org/W4318624558","doi":"https://doi.org/10.1109/tdsc.2023.3241164"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2023.3241164","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3241164","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083712477","display_name":"Minxin Du","orcid":"https://orcid.org/0000-0001-6620-6923"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"HK","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Minxin Du","raw_affiliation_strings":["Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071469093","display_name":"Peipei Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peipei Jiang","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100391116","display_name":"Qian Wang","orcid":"https://orcid.org/0000-0002-8967-8525"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian Wang","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067752906","display_name":"Sherman S. M. Chow","orcid":"https://orcid.org/0000-0001-7306-453X"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"HK","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Sherman S. M. Chow","raw_affiliation_strings":["Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030015523","display_name":"Lingchen Zhao","orcid":"https://orcid.org/0000-0002-1700-3836"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingchen Zhao","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5083712477"],"corresponding_institution_ids":["https://openalex.org/I177725633"],"apc_list":null,"apc_paid":null,"fwci":1.2178,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.82421755,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"20","issue":"6","first_page":"5102","last_page":"5112"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9785000085830688,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7102214097976685},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5683334469795227},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5234322547912598},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4645969569683075},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.45246338844299316},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.438554584980011},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.248442143201828}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7102214097976685},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5683334469795227},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5234322547912598},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4645969569683075},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.45246338844299316},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.438554584980011},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.248442143201828},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2023.3241164","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3241164","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2404993877","display_name":null,"funder_award_id":"U20B2049","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6034313629","display_name":null,"funder_award_id":"U21B2018","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8611733963","display_name":null,"funder_award_id":"2042021gf0006","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W1504211573","https://openalex.org/W1507830292","https://openalex.org/W1509788133","https://openalex.org/W1539859404","https://openalex.org/W1561511342","https://openalex.org/W1854214752","https://openalex.org/W1934458198","https://openalex.org/W1988768686","https://openalex.org/W2033165262","https://openalex.org/W2036329595","https://openalex.org/W2045446569","https://openalex.org/W2063575624","https://openalex.org/W2083694582","https://openalex.org/W2084224084","https://openalex.org/W2111446139","https://openalex.org/W2111708605","https://openalex.org/W2150620897","https://openalex.org/W2152516507","https://openalex.org/W2159394589","https://openalex.org/W2487238101","https://openalex.org/W2599541228","https://openalex.org/W2613229705","https://openalex.org/W2626390666","https://openalex.org/W2649616373","https://openalex.org/W2765463836","https://openalex.org/W2765706244","https://openalex.org/W2770638201","https://openalex.org/W2781469847","https://openalex.org/W2788385473","https://openalex.org/W2791990314","https://openalex.org/W2794926610","https://openalex.org/W2901443058","https://openalex.org/W2922166054","https://openalex.org/W2946109000","https://openalex.org/W2963053811","https://openalex.org/W3008291567","https://openalex.org/W3089250253","https://openalex.org/W3094755447","https://openalex.org/W3216858120","https://openalex.org/W6639055396","https://openalex.org/W6712419705","https://openalex.org/W6718865826","https://openalex.org/W6729667700","https://openalex.org/W6767244752","https://openalex.org/W6784374016","https://openalex.org/W6784784743","https://openalex.org/W6794380750"],"related_works":["https://openalex.org/W2046435967","https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W4231775656","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W1806182398","https://openalex.org/W3093954335","https://openalex.org/W4205482204"],"abstract_inverted_index":{"Graphs":[0,17],"nicely":[1],"capture":[2],"data":[3,20,79],"from":[4],"various":[5],"domains,":[6],"allowing":[7],"the":[8,27,72],"computations":[9],"of":[10,18,75,102],"many":[11],"analytic":[12],"tasks":[13],"via":[14],"graph":[15,52,91],"queries.":[16],"real-world":[19],"are":[21],"often":[22],"large,":[23],"albeit":[24],"useful,":[25],"and":[26,84,104],"involved":[28],"computation":[29],"can":[30,105],"be":[31,106],"too":[32],"heavyweight":[33],"for":[34,51],"commodity":[35],"computers.":[36],"For":[37],"secure":[38],"outsourcing,":[39],"we":[40,77],"propose":[41],"(SGX)":[42,94],"<inline-formula><tex-math":[43,95],"notation=\"LaTeX\">$^{2}$</tex-math></inline-formula>":[44,96],",":[45],"a":[46,60],"forward-secure":[47],"structured":[48],"encryption":[49,92],"scheme":[50],"data,":[53],"which":[54],"uses":[55],"lightweight":[56],"cryptographic":[57],"techniques":[58],"with":[59,88],"trusted":[61],"execution":[62],"environment":[63],"such":[64],"as":[65],"SGX.":[66],"To":[67],"process":[68],"million-scale":[69],"graphs":[70],"by":[71],"limited":[73],"memory":[74],"SGX,":[76],"load":[78],"on-demand":[80],"using":[81],"Dijkstra's":[82],"algorithm":[83],"Fibonacci":[85],"heap.":[86],"Compared":[87],"most":[89],"prior":[90],"schemes,":[93],"supports":[97],"exact":[98],"shortest-distance":[99],"queries":[100],"instead":[101],"approximation":[103],"easily":[107],"extended":[108],"to":[109],"other":[110],"graph-based":[111],"analytics.":[112]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
