ABSTRACT

It should be noted that many of the experimental systems that we discussed in this book are due to the developments made under this project. In this section, not only do we discuss our research contributions at UTD, some of which have

been discussed in earlier chapters, but we also discuss the contributions made by our university partners. e organization of this chapter is as follows. e research contributions including the development of secure query processors, hybrid data storage schemes, privacy for the cloud, and using the cloud for malware analysis are discussed in Section 34.2. Our future plans are discussed in Section 34.3.