1. Arasu A, Blanas S, Eguro K, Kaushik R, Kossmann D, Ramamurthy R, Venkatesan R (2013) Orthogonal security with cipherbase. In: Sixth Biennial Conference on Innovative Data Systems Research, CIDR 2013, Asilomar, CA, USA, January 6–9, 2013, Online Proceedings, www.cidrdb.org
2. Arnautov S, Trach B, Gregor F, Knauth T, Martin A, Priebe C, Lind J, Muthukumaran D, O’Keeffe D, Stillwell M, Goltzsche D, Eyers DM, Kapitza R, Pietzuch PR, Fetzer C (2016) Scone: Secure Linux containers with intel SGX. In: 12th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2016, Savannah, GA, USA, November 2–4, 2016, USENIX Association, pp 689–703
3. Azar Y, Broder AZ, Karlin AR, Upfal E (1994) Balanced allocations (extended abstract). In: Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 23–25 May 1994, Montréal, Québec, Canada, ACM, pp 593–602
4. Bajaj S, Sion R (2014) TrustedDB: A trusted hardware-based database with privacy and data confidentiality. IEEE Transactions on Knowledge and Data Engineering 26(3):752–765
5. Bater J, He X, Ehrich W, Machanavajjhala A, Rogers J (2018) Shrinkwrap: Efficient SQL query processing in differentially private data federations. Proceedings of the International Conference on Very Large Databases 12(3):307–320