{"id":"https://openalex.org/W2000387233","doi":"https://doi.org/10.1145/2557547.2557589","title":"Minimizing lifetime of sensitive data in concurrent programs","display_name":"Minimizing lifetime of sensitive data in concurrent programs","publication_year":2014,"publication_date":"2014-02-25","ids":{"openalex":"https://openalex.org/W2000387233","doi":"https://doi.org/10.1145/2557547.2557589","mag":"2000387233"},"language":"en","primary_location":{"id":"doi:10.1145/2557547.2557589","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557547.2557589","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM conference on Data and application security and privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103366081","display_name":"Kalpana Gondi","orcid":null},"institutions":[{"id":"https://openalex.org/I39422238","display_name":"University of Illinois Chicago","ror":"https://ror.org/02mpq6x41","country_code":"US","type":"education","lineage":["https://openalex.org/I39422238"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kalpana Gondi","raw_affiliation_strings":["University of Illinois at Chicago, Chicago, IL, USA"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Chicago, Chicago, IL, USA","institution_ids":["https://openalex.org/I39422238"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035821371","display_name":"A. Prasad Sistla","orcid":"https://orcid.org/0009-0005-8331-7912"},"institutions":[{"id":"https://openalex.org/I39422238","display_name":"University of Illinois Chicago","ror":"https://ror.org/02mpq6x41","country_code":"US","type":"education","lineage":["https://openalex.org/I39422238"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"A. Prasad Sistla","raw_affiliation_strings":["University of Illinois at Chicago, Chicago, IL, USA"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Chicago, Chicago, IL, USA","institution_ids":["https://openalex.org/I39422238"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058117020","display_name":"V. N. Venkatakrishnan","orcid":"https://orcid.org/0000-0002-1690-9185"},"institutions":[{"id":"https://openalex.org/I39422238","display_name":"University of Illinois Chicago","ror":"https://ror.org/02mpq6x41","country_code":"US","type":"education","lineage":["https://openalex.org/I39422238"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"V. N. Venkatakrishnan","raw_affiliation_strings":["University of Illinois at Chicago, Chicago, IL, USA"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Chicago, Chicago, IL, USA","institution_ids":["https://openalex.org/I39422238"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5103366081"],"corresponding_institution_ids":["https://openalex.org/I39422238"],"apc_list":null,"apc_paid":null,"fwci":0.409,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.72971284,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"171","last_page":"174"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interleaving","display_name":"Interleaving","score":0.8502164483070374},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8414667248725891},{"id":"https://openalex.org/keywords/extension","display_name":"Extension (predicate logic)","score":0.6411916017532349},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.623958170413971},{"id":"https://openalex.org/keywords/concurrent-data-structure","display_name":"Concurrent data structure","score":0.41126859188079834},{"id":"https://openalex.org/keywords/concurrency","display_name":"Concurrency","score":0.36703717708587646},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.29914575815200806},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2745196223258972},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22568127512931824},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1986086666584015}],"concepts":[{"id":"https://openalex.org/C28034677","wikidata":"https://www.wikidata.org/wiki/Q17092530","display_name":"Interleaving","level":2,"score":0.8502164483070374},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8414667248725891},{"id":"https://openalex.org/C2778029271","wikidata":"https://www.wikidata.org/wiki/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.6411916017532349},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.623958170413971},{"id":"https://openalex.org/C203222032","wikidata":"https://www.wikidata.org/wiki/Q5159104","display_name":"Concurrent data structure","level":3,"score":0.41126859188079834},{"id":"https://openalex.org/C193702766","wikidata":"https://www.wikidata.org/wiki/Q1414548","display_name":"Concurrency","level":2,"score":0.36703717708587646},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.29914575815200806},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2745196223258972},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22568127512931824},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1986086666584015}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2557547.2557589","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557547.2557589","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM conference on Data and application security and privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1578960746","https://openalex.org/W1583464938","https://openalex.org/W1736607886","https://openalex.org/W1751824204","https://openalex.org/W2025475662","https://openalex.org/W2039549168","https://openalex.org/W2055060936","https://openalex.org/W2056637671","https://openalex.org/W2142995156","https://openalex.org/W2155962559","https://openalex.org/W4299301436"],"related_works":["https://openalex.org/W2133697637","https://openalex.org/W4253571630","https://openalex.org/W2837991191","https://openalex.org/W1873898332","https://openalex.org/W2588901507","https://openalex.org/W3000408542","https://openalex.org/W2067242620","https://openalex.org/W4386191042","https://openalex.org/W4205582206","https://openalex.org/W1565546946"],"abstract_inverted_index":{"The":[0],"prolonged":[1],"lifetime":[2,47],"of":[3,44,48,65,75],"sensitive":[4,23,49],"data":[5,24,50],"(such":[6],"as":[7,30,32],"passwords)":[8],"in":[9,25,39],"applications":[10],"gives":[11],"rise":[12],"to":[13,21,54,69],"several":[14],"security":[15],"risks.":[16],"A":[17],"promising":[18],"approach":[19,43,68],"is":[20,35],"erase":[22],"an":[26,63],"\"eager":[27],"fashion\",":[28],"i.e.,":[29],"soon":[31],"its":[33],"use":[34],"no":[36],"longer":[37],"required":[38],"the":[40,46,66,73],"application.":[41],"This":[42],"minimizing":[45],"has":[51],"been":[52],"applied":[53],"sequential":[55],"programs.":[56],"In":[57],"this":[58,67],"short":[59],"paper,":[60],"we":[61],"present":[62],"extension":[64],"concurrent":[70],"programs":[71],"where":[72],"interleaving":[74],"threads":[76],"makes":[77],"such":[78],"eager":[79],"erasures":[80],"a":[81],"challenging":[82],"research":[83],"problem.":[84]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
