Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- demonstrationJune 2013
Secure benchmarking in the cloud
SACMAT '13: Proceedings of the 18th ACM symposium on Access control models and technologiesPages 197–200https://doi.org/10.1145/2462410.2462430Benchmarking is the comparison of one company's key performance indicators (KPI) to the statistics of the same KPIs of its peer group. A KPI is a statistical quantity measuring the performance of a business process. Privacy by means of controlling ...
- research-articleJune 2013
Combining social authentication and untrusted clouds for private location sharing
SACMAT '13: Proceedings of the 18th ACM symposium on Access control models and technologiesPages 15–24https://doi.org/10.1145/2462410.2462421Recently, many location-sharing services (LSSs) have emerged that share data collected using mobile devices. However, research has shown that many users are uncomfortable with LSS operators managing their location histories, and that the ease with which ...