Access control rules are currently administered by highly qualified personnel. Thus, the technical barrier that specialized access control languages represent naturally prevents th...
We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usabl...
Database researchers have striven to improve the capability of a database in terms of both performance and functionality. We assert that the usability of a database is as importan...
H. V. Jagadish, Adriane Chapman, Aaron Elkiss, Mag...
The usability of access control mechanisms in modern distributed systems has been widely criticized but little studied. In this paper, we carefully examine one such widely deploye...
Prior research has shown that supplying decision-makers with data quality (DQ) tags, metadata about the quality of data used in decision-making, can impact decision outcomes in cer...