Query processing in blockchain systems: Current state and future challenges
When, in 2008, Satoshi Nakamoto envisioned the first distributed database management
system that relied on cryptographically secured chain of blocks to store data in an immutable …
system that relied on cryptographically secured chain of blocks to store data in an immutable …
A survey on the efficiency, reliability, and security of data query in blockchain systems
With the emergence of digital currencies, blockchain systems have been committed to the
efficient and trusted storage of data, building decentralized, tamper-proof, persistent, and …
efficient and trusted storage of data, building decentralized, tamper-proof, persistent, and …
vChain+: Optimizing verifiable blockchain boolean range queries
Blockchain has recently gained massive attention thanks to the success of cryptocurrencies
and decentralized applications. With immutability and tamper-resistance features, it can be …
and decentralized applications. With immutability and tamper-resistance features, it can be …
Adore: Differentially oblivious relational database operators
There has been a recent effort in applying differential privacy on memory access patterns to
enhance data privacy. This is called differential obliviousness. Differential obliviousness is a …
enhance data privacy. This is called differential obliviousness. Differential obliviousness is a …
Intel software guard extensions applications: A survey
NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …
sensitive data from users and companies are being increasingly delegated to such systems …
Symgx: Detecting cross-boundary pointer vulnerabilities of sgx applications via static symbolic execution
Intel Security Guard Extensions (SGX) have shown effectiveness in critical data protection.
Recent symbolic execution-based techniques reveal that SGX applications are susceptible …
Recent symbolic execution-based techniques reveal that SGX applications are susceptible …
Zero-knowledge proof meets machine learning in verifiability: A survey
With the rapid advancement of artificial intelligence technology, the usage of machine
learning models is gradually becoming part of our daily lives. High-quality models rely not …
learning models is gradually becoming part of our daily lives. High-quality models rely not …
GlassDB: An efficient verifiable ledger database system through transparency
Verifiable ledger databases protect data history against malicious tampering. Existing
systems, such as blockchains and certificate transparency, are based on transparency logs …
systems, such as blockchains and certificate transparency, are based on transparency logs …
Zksql: Verifiable and efficient query evaluation with zero-knowledge proofs
Individuals and organizations are using databases to store personal information at an
unprecedented rate. This creates a quandary for data providers. They are responsible for …
unprecedented rate. This creates a quandary for data providers. They are responsible for …
A framework for privacy preserving localized graph pattern query processing
This paper studies privacy preserving graph pattern query services in a cloud computing
paradigm. In such a paradigm, data owner stores the large data graph to a powerful cloud …
paradigm. In such a paradigm, data owner stores the large data graph to a powerful cloud …