1. [n.d.]. Azure confidential computing. https://azure.microsoft.com/en-us/solutions/confidential-compute/. Accessed: 2020-09-10. [n.d.]. Azure confidential computing. https://azure.microsoft.com/en-us/solutions/confidential-compute/. Accessed: 2020-09-10.
2. Inference and Record-Injection Attacks on Searchable Encrypted Relational Databases;Abdelraheem Mohamed Ahmed;IACR Cryptol. ePrint Arch.,2017
3. OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX
4. Alibaba. [n.d.]. Alibaba ECS baremetal instance document. https://www.alibabacloud.com/help/doc-detail/108507.htm. Accessed: 2020-09-10. Alibaba. [n.d.]. Alibaba ECS baremetal instance document. https://www.alibabacloud.com/help/doc-detail/108507.htm. Accessed: 2020-09-10.
5. Joshua Allen Bolin Ding Janardhan Kulkarni Harsha Nori Olga Ohrimenko and Sergey Yekhanin. 2019. An Algorithmic Framework For Differentially Private Data Analysis on Trusted Processors. In NeurIPS. 13635--13646. Joshua Allen Bolin Ding Janardhan Kulkarni Harsha Nori Olga Ohrimenko and Sergey Yekhanin. 2019. An Algorithmic Framework For Differentially Private Data Analysis on Trusted Processors. In NeurIPS. 13635--13646.