Both public and private sector actors face legal, social, technical, and economic barriers to data sharing in the United States, inhibiting much-needed innovation and discoveries. Overly restrictive data privacy laws…
Learn MoreTraditional public-key encryption (PKE) requires different data to have different keys that – along with the encrypted version of the data – can be distributed to users who satisfy access…
Learn MoreData-driven innovation has the potential to be a massive force for progress. Data sharing enables organizations to increase the utility and value of the data they control and gain access…
Learn MorePolicy makers should inform, consult and involve citizens as part of their efforts to data-driven technologies such as artificial intelligence (AI). Although many users rely on AI systems, they do…
Learn MoreThis paper develops a new method for valuing land, a key asset on a nation’s balance sheet. The method first employs an unsupervised machine learning method, which means clustering, to…
Learn MoreTraditional brick-and-mortar health care organizations and digital health companies are actively partnering to provide novel, digitally enabled care models to patients. Despite the potential of these new care models, it…
Learn MoreThe Federal Data Strategy suffers from a lack of leadership and fails to link its well-defined principles and practices to government-wide and agency-level missions. The Biden administration must revive and…
Learn MoreIn this technical white paper, the importance of dynamic data protection in relation to Attribute-Based Access Control (ABAC) is discussed. With ABAC, companies as well as the federal government/military can…
Learn MoreGovernments at the state, county, and municipal levels have become increasingly interested in the treasure troves of local data amassed by the sharing economy. A growing number of localities are…
Learn MoreOne of the world’s largest technology companies announces an ambitious new vision, requiring the very rapid deployment of hundreds of megawatts of new data center capacity. For the company’s data…
Learn MoreDe-identification is a general term for any process of removing the association between a set of identifying data and the data subject. This document describes the use of deidentification with…
Learn MoreUnlike the digital divide, many ignore the data divide or argue that the way to close it is to collect vastly less data. But without substantial efforts to increase data…
Learn MoreThe deep web is part of the world wide web whose contents are not indexed by standard search engines. The deep web is not to be confused with the dark…
Learn MoreSince the earliest days of government, the fundamentals of public records and the need their security have remained constant. Yet the methods and strategies to achieve this security have evolved…
Learn MoreBreaking through barriers to entry is key to making any data management initiative a success. This is doubly true when seeking to adopt semantic standards to implement a knowledge graph…
Learn More