Securing Disk-Resident Data through Application Level Encryption
Dynamic Removal of Redundant Computations