{"id":"https://openalex.org/W2007002790","doi":"https://doi.org/10.1145/2642937.2643006","title":"Program analysis for secure big data processing","display_name":"Program analysis for secure big data processing","publication_year":2014,"publication_date":"2014-09-15","ids":{"openalex":"https://openalex.org/W2007002790","doi":"https://doi.org/10.1145/2642937.2643006","mag":"2007002790"},"language":"en","primary_location":{"id":"doi:10.1145/2642937.2643006","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2642937.2643006","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037106943","display_name":"Julian James Stephen","orcid":"https://orcid.org/0000-0003-2613-531X"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Julian James Stephen","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030389875","display_name":"Savvas Savvides","orcid":"https://orcid.org/0000-0002-2971-0933"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Savvas Savvides","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087492070","display_name":"Russell Seidel","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Russell Seidel","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024420075","display_name":"Patrick Eugster","orcid":"https://orcid.org/0000-0003-3864-9078"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Patrick Eugster","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5037106943"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":3.1033,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.92116278,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"277","last_page":"288"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8866642713546753},{"id":"https://openalex.org/keywords/scripting-language","display_name":"Scripting language","score":0.6907432675361633},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6672571301460266},{"id":"https://openalex.org/keywords/programmer","display_name":"Programmer","score":0.6254088282585144},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.509460985660553},{"id":"https://openalex.org/keywords/spark","display_name":"SPARK (programming language)","score":0.48395708203315735},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.48393017053604126},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4467235803604126},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.440522164106369},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.41591161489486694},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.39265429973602295},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2075900435447693},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2018955945968628}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8866642713546753},{"id":"https://openalex.org/C61423126","wikidata":"https://www.wikidata.org/wiki/Q187432","display_name":"Scripting language","level":2,"score":0.6907432675361633},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6672571301460266},{"id":"https://openalex.org/C2778514511","wikidata":"https://www.wikidata.org/wiki/Q1374194","display_name":"Programmer","level":2,"score":0.6254088282585144},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.509460985660553},{"id":"https://openalex.org/C2781215313","wikidata":"https://www.wikidata.org/wiki/Q3493345","display_name":"SPARK (programming language)","level":2,"score":0.48395708203315735},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.48393017053604126},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4467235803604126},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.440522164106369},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.41591161489486694},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.39265429973602295},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2075900435447693},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2018955945968628}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2642937.2643006","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2642937.2643006","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4824101800","display_name":null,"funder_award_id":"N11AP20014","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G690767906","display_name":null,"funder_award_id":"204533","funder_id":"https://openalex.org/F4320309667","funder_display_name":"Purdue Research Foundation"}],"funders":[{"id":"https://openalex.org/F4320308204","display_name":"Northrop Grumman","ror":"https://ror.org/05kewds18"},{"id":"https://openalex.org/F4320309327","display_name":"Google","ror":"https://ror.org/00njsd438"},{"id":"https://openalex.org/F4320309667","display_name":"Purdue Research Foundation","ror":"https://ror.org/007n03h88"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W44899178","https://openalex.org/W56544557","https://openalex.org/W104692656","https://openalex.org/W147005573","https://openalex.org/W192814132","https://openalex.org/W202370781","https://openalex.org/W1527701244","https://openalex.org/W1556212265","https://openalex.org/W1682131187","https://openalex.org/W1895952394","https://openalex.org/W1978924650","https://openalex.org/W1994866276","https://openalex.org/W2010523825","https://openalex.org/W2048525559","https://openalex.org/W2098935637","https://openalex.org/W2100830825","https://openalex.org/W2101551271","https://openalex.org/W2108834246","https://openalex.org/W2110868467","https://openalex.org/W2113513812","https://openalex.org/W2119738171","https://openalex.org/W2132172731","https://openalex.org/W2134429122","https://openalex.org/W2157010176","https://openalex.org/W2159915142","https://openalex.org/W2171295941","https://openalex.org/W2173213060","https://openalex.org/W2189465200","https://openalex.org/W2200322888","https://openalex.org/W2250570571","https://openalex.org/W2294395356","https://openalex.org/W2914012796","https://openalex.org/W3033482452","https://openalex.org/W3194259896","https://openalex.org/W6607754154","https://openalex.org/W6608286669"],"related_works":["https://openalex.org/W4224216661","https://openalex.org/W2379153735","https://openalex.org/W3210347767","https://openalex.org/W98994209","https://openalex.org/W67940504","https://openalex.org/W2066014542","https://openalex.org/W2024170198","https://openalex.org/W2152144666","https://openalex.org/W2912248945","https://openalex.org/W2955319257"],"abstract_inverted_index":{"The":[0,81],"ubiquitous":[1],"nature":[2],"of":[3,13,23,51,55,87,115,142,154,169,189,200],"computers":[4],"is":[5,42],"driving":[6],"a":[7,166],"massive":[8,53],"increase":[9],"in":[10,100,160,198],"the":[11,26,49,140,173,177,186,201],"amount":[12],"data":[14,36,41,56,118,128,206],"generated":[15],"by":[16,172],"humans":[17],"and":[18,37,63,71,112,131,183],"machines.":[19],"Two":[20],"natural":[21],"consequences":[22],"this":[24,181],"are":[25,121],"increased":[27],"efforts":[28],"to":[29,105,204],"(a)":[30],"derive":[31],"meaningful":[32],"information":[33],"from":[34],"accumulated":[35],"(b)":[38],"ensure":[39],"that":[40,137],"not":[43],"used":[44,179],"for":[45,78,96,134,180,196],"unintended":[46],"purposes.":[47],"In":[48],"direction":[50],"analyzing":[52],"amounts":[54],"(a.),":[57],"tools":[58],"like":[59,68],"MapReduce,":[60],"Spark,":[61],"Dryad":[62],"higher":[64],"level":[65],"scripting":[66],"languages":[67],"Pig":[69,135],"Latin":[70],"DryadLINQ":[72],"have":[73],"significantly":[74],"improved":[75],"corresponding":[76,143],"tasks":[77],"software":[79],"developers.":[80],"second,":[82],"but":[83],"equally":[84],"important":[85],"aspect":[86],"ensuring":[88],"confidentiality":[89],"(b.),":[90],"has":[91],"seen":[92],"little":[93],"support":[94],"emerge":[95],"programmers:":[97],"while":[98],"advances":[99],"cryptographic":[101],"techniques":[102],"allow":[103],"us":[104],"process":[106],"directly":[107],"on":[108,145,165],"encrypted":[109,146],"data,":[110],"programmer-friendly":[111],"efficient":[113],"ways":[114],"programming":[116],"such":[117],"analysis":[119],"jobs":[120],"still":[122],"missing.":[123],"This":[124],"paper":[125],"presents":[126],"novel":[127],"flow":[129],"analyses":[130],"program":[132],"transformations":[133],"Latin,":[136],"automatically":[138],"enable":[139],"execution":[141],"scripts":[144],"data.":[147],"We":[148,175],"avoid":[149],"fully":[150],"homomorphic":[151],"encryption":[152],"because":[153],"its":[155],"prohibitively":[156],"high":[157],"cost;":[158],"instead,":[159],"some":[161],"cases,":[162],"we":[163],"rely":[164],"minimal":[167],"set":[168],"operations":[170],"performed":[171],"client.":[174],"present":[176],"algorithms":[178],"translation,":[182],"empirically":[184],"demonstrate":[185],"practical":[187],"performance":[188],"our":[190],"approach":[191],"as":[192,194],"well":[193],"improvements":[195],"programmers":[197],"terms":[199],"effort":[202],"required":[203],"preserve":[205],"confidentiality.":[207]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
