Figure 4From: Confidential database-as-a-service approaches: taxonomy and survey Efficiency-optimal CPIs that offer the required functionality and the security properties that are required to provide computational record protection against each attacker model (fragmentation excluded). Back to article page