1. [1] Arvind Arasu, Spyros Blanas, Ken Eguro, Manas Joglekar, Raghav Kaushik, Donald Kossmann, Ravi Ramamurthy, Prasang Upadhyaya, and Ramarathnam Venkatesan. Secure database-as-a-service with cipherbase. In SIGMOD Conf., page 1033–1036, 2013.
2. [2] Pierre-Louis Aublin, Mohammad Mahhouk, and Rüdiger Kapitza. Towards TEEs with large secure memory and integrity protection against HW attacks. https://systex22.github.io/papers/systex22-final15.pdf. Accessed: 2023-7-12.
3. [3] Sumeet Bajaj and Radu Sion. Trusteddb: A trusted hardware-based database with privacy and data confidentiality. TKDE, 26(3):752–765, 2014.
4. [4] Andrew Baumann, Marcus Peinado, and Galen Hunt. Shielding applications from an untrusted cloud with haven. TOCS, 33(3):1–26, 2015.
5. [5] Hal Berenson, Philip A. Bernstein, Jim Gray, Jim Melton, Elizabeth J. O'Neil, and Patrick E. O'Neil. A critique of ANSI SQL isolation levels. In SIGMOD Conference, pages 1–10. ACM Press, 1995.