{"id":"https://openalex.org/W4396215530","doi":"https://doi.org/10.1145/3649861","title":"Taypsi: Static Enforcement of Privacy Policies for Policy-Agnostic Oblivious Computation","display_name":"Taypsi: Static Enforcement of Privacy Policies for Policy-Agnostic Oblivious Computation","publication_year":2024,"publication_date":"2024-04-29","ids":{"openalex":"https://openalex.org/W4396215530","doi":"https://doi.org/10.1145/3649861"},"language":"en","primary_location":{"id":"doi:10.1145/3649861","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3649861","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3649861","source":{"id":"https://openalex.org/S4210216081","display_name":"Proceedings of the ACM on Programming Languages","issn_l":"2475-1421","issn":["2475-1421"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Programming Languages","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3649861","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013294460","display_name":"Qianchuan Ye","orcid":"https://orcid.org/0000-0002-5977-5236"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Qianchuan Ye","raw_affiliation_strings":["Purdue University, West Lafayette, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073767542","display_name":"Benjamin Delaware","orcid":"https://orcid.org/0000-0002-1016-6261"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Benjamin Delaware","raw_affiliation_strings":["Purdue University, West Lafayette, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, USA","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5013294460"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":0.3862,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.62896278,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"8","issue":"OOPSLA1","first_page":"1407","last_page":"1436"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.6743079423904419},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6300166845321655},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5849147439002991},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5610322952270508},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.48012566566467285},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.1476905643939972},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.12415686249732971},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.08403351902961731}],"concepts":[{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.6743079423904419},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6300166845321655},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5849147439002991},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5610322952270508},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.48012566566467285},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.1476905643939972},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.12415686249732971},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.08403351902961731}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3649861","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3649861","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3649861","source":{"id":"https://openalex.org/S4210216081","display_name":"Proceedings of the ACM on Programming Languages","issn_l":"2475-1421","issn":["2475-1421"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Programming Languages","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3649861","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3649861","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3649861","source":{"id":"https://openalex.org/S4210216081","display_name":"Proceedings of the ACM on Programming Languages","issn_l":"2475-1421","issn":["2475-1421"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Programming Languages","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6299999952316284,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4396215530.pdf"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W51265332","https://openalex.org/W1480909796","https://openalex.org/W1508098446","https://openalex.org/W1520270249","https://openalex.org/W1977764760","https://openalex.org/W1999721188","https://openalex.org/W2027471022","https://openalex.org/W2031533839","https://openalex.org/W2067392744","https://openalex.org/W2071929572","https://openalex.org/W2081256122","https://openalex.org/W2122049982","https://openalex.org/W2158106499","https://openalex.org/W2606882085","https://openalex.org/W2770556642","https://openalex.org/W2772681170","https://openalex.org/W2886689407","https://openalex.org/W2903850320","https://openalex.org/W2926029813","https://openalex.org/W2929650703","https://openalex.org/W2955155286","https://openalex.org/W3033405216","https://openalex.org/W3102723029","https://openalex.org/W3121396290","https://openalex.org/W3141585064","https://openalex.org/W3155648414","https://openalex.org/W3158843495","https://openalex.org/W3169419954","https://openalex.org/W3171296240","https://openalex.org/W3217202355","https://openalex.org/W4205514486","https://openalex.org/W4205786399","https://openalex.org/W4243963980","https://openalex.org/W4252567017","https://openalex.org/W4327930441","https://openalex.org/W4379512425","https://openalex.org/W6911351394"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W4395014643","https://openalex.org/W4391913857","https://openalex.org/W2350741829"],"abstract_inverted_index":{"Secure":[0],"multiparty":[1],"computation":[2],"(MPC)":[3],"techniques":[4],"enable":[5],"multiple":[6],"parties":[7],"to":[8,29,46,59,76,90,101],"compute":[9],"joint":[10],"functions":[11,38],"over":[12],"their":[13],"private":[14],"data":[15,19,151],"without":[16],"sharing":[17],"that":[18,40,94,113,135],"with":[20],"other":[21],"parties,":[22],"typically":[23],"by":[24,105],"employing":[25],"powerful":[26],"cryptographic":[27],"protocols":[28],"protect":[30],"individual's":[31],"data.":[32,97],"One":[33],"challenge":[34],"when":[35],"writing":[36],"such":[37],"is":[39],"most":[41],"MPC":[42,70,92,127,147],"languages":[43,71],"force":[44],"users":[45],"intermix":[47],"programmatic":[48],"and":[49,152],"privacy":[50,66,78,117,154],"concerns":[51],"in":[52,124],"a":[53,63,125,144],"single":[54],"application,":[55],"making":[56],"it":[57,88],"difficult":[58,89],"change":[60],"or":[61],"audit":[62],"program's":[64],"underlying":[65],"policy.":[67],"Prior":[68],"policy-agnostic":[69],"relied":[72],"on":[73,143],"dynamic":[74],"enforcement":[75],"decouple":[77],"requirements":[79],"from":[80],"program":[81],"logic.":[82],"Unfortunately,":[83],"the":[84,136],"resulting":[85,137],"overhead":[86,104],"makes":[87],"scale":[91],"applications":[93,148],"manipulate":[95],"structured":[96,150],"This":[98],"work":[99],"proposes":[100],"eliminate":[102],"this":[103,122],"instead":[106],"transforming":[107],"programs":[108],"into":[109],"semantically":[110],"equivalent":[111],"versions":[112],"statically":[114],"enforce":[115],"user-provided":[116],"policies.":[118,155],"We":[119],"have":[120],"implemented":[121],"approach":[123],"new":[126],"language,":[128],"called":[129],"Taypsi;":[130],"our":[131],"experimental":[132],"evaluation":[133],"demonstrates":[134],"system":[138],"features":[139],"considerable":[140],"performance":[141],"improvements":[142],"variety":[145],"of":[146],"involving":[149],"complex":[153]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2024-04-30T00:00:00"}
