{"id":"https://openalex.org/W2756086525","doi":"https://doi.org/10.1145/3132190.3132206","title":"Querying Invisible Objects","display_name":"Querying Invisible Objects","publication_year":2017,"publication_date":"2017-09-15","ids":{"openalex":"https://openalex.org/W2756086525","doi":"https://doi.org/10.1145/3132190.3132206","mag":"2756086525"},"language":"en","primary_location":{"id":"doi:10.1145/3132190.3132206","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3132190.3132206","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Managed Languages and Runtimes","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100411657","display_name":"Yin Liu","orcid":"https://orcid.org/0000-0002-0637-4471"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yin Liu","raw_affiliation_strings":["Software Innovations Lab, Virginia Tech"],"affiliations":[{"raw_affiliation_string":"Software Innovations Lab, Virginia Tech","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101860736","display_name":"Zheng Song","orcid":"https://orcid.org/0000-0003-2698-1559"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zheng Song","raw_affiliation_strings":["Software Innovations Lab, Virginia Tech"],"affiliations":[{"raw_affiliation_string":"Software Innovations Lab, Virginia Tech","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013168771","display_name":"Eli Tilevich","orcid":"https://orcid.org/0000-0003-2415-6926"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eli Tilevich","raw_affiliation_strings":["Software Innovations Lab, Virginia Tech"],"affiliations":[{"raw_affiliation_string":"Software Innovations Lab, Virginia Tech","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100411657"],"corresponding_institution_ids":["https://openalex.org/I859038795"],"apc_list":null,"apc_paid":null,"fwci":0.3698,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.57945215,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9083464741706848},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5504291653633118},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.4957467019557953},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.22857242822647095}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9083464741706848},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5504291653633118},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.4957467019557953},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.22857242822647095},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3132190.3132206","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3132190.3132206","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Managed Languages and Runtimes","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.49000000953674316,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G8238209437","display_name":null,"funder_award_id":"1649583,1717065","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W157207381","https://openalex.org/W1483547755","https://openalex.org/W1484817741","https://openalex.org/W1489067988","https://openalex.org/W1520270249","https://openalex.org/W1699297509","https://openalex.org/W1731558674","https://openalex.org/W1873763122","https://openalex.org/W1972546126","https://openalex.org/W1973568945","https://openalex.org/W1974385017","https://openalex.org/W2033811191","https://openalex.org/W2041404167","https://openalex.org/W2083527212","https://openalex.org/W2109426455","https://openalex.org/W2137534692","https://openalex.org/W2140655729","https://openalex.org/W2350778671","https://openalex.org/W2517744317","https://openalex.org/W2565203757","https://openalex.org/W2620731571","https://openalex.org/W2978725006","https://openalex.org/W3007615622"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829","https://openalex.org/W2530322880"],"abstract_inverted_index":{"When":[0],"transferring":[1],"sensitive":[2,25,65,83,87,125],"data":[3,12,26,88,106,132,144],"to":[4,22,27,42,71,92],"a":[5,54,111],"non-trusted":[6],"party,":[7],"end-users":[8],"require":[9],"that":[10,63,155],"the":[11,24,79,82,86,97,124,131,161,170],"be":[13,141],"kept":[14],"private.":[15],"Mobile":[16],"and":[17,32,74,104,119,177],"IoT":[18,176],"application":[19],"developers":[20,70],"want":[21],"leverage":[23],"provide":[28,102],"better":[29],"user":[30,66],"experience":[31],"intelligent":[33,75],"services.":[34],"Unfortunately,":[35],"existing":[36],"programming":[37,56],"abstractions":[38,101],"make":[39],"it":[40],"impossible":[41],"reconcile":[43],"these":[44],"two":[45],"seemingly":[46],"conflicting":[47],"objectives.":[48],"In":[49],"this":[50],"paper,":[51],"we":[52,153],"present":[53],"novel":[55,158],"mechanism":[57,159],"for":[58],"distributed":[59,113],"managed":[60],"execution":[61],"environments":[62],"hides":[64],"data,":[67],"while":[68],"enabling":[69],"build":[72],"powerful":[73],"applications,":[76],"driven":[77],"by":[78,96,110],"properties":[80,127,139],"of":[81,169,175],"data.":[84],"Specifically,":[85],"is":[89],"never":[90],"revealed":[91],"clients,":[93],"being":[94],"protected":[95],"runtime":[98,114],"system.":[99,115],"Our":[100],"declarative":[103],"configurable":[105],"query":[107,123,145],"interfaces,":[108],"enforced":[109],"lightweight":[112],"Developers":[116],"define":[117],"when":[118],"how":[120,129,135],"clients":[121],"can":[122,140,166],"data's":[126],"(i.e.,":[128],"long":[130],"remains":[133],"accessible,":[134],"many":[136],"times":[137],"its":[138],"queried,":[142],"which":[143],"methods":[146],"apply,":[147],"etc.).":[148],"Based":[149],"on":[150],"our":[151,157],"evaluation,":[152],"argue":[154],"integrating":[156],"with":[160],"Java":[162],"Virtual":[163],"Machine":[164],"(JVM)":[165],"address":[167],"some":[168],"most":[171],"pertinent":[172],"privacy":[173],"problems":[174],"mobile":[178],"applications.":[179]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
