Hi,
I am researching in theoretical computer science for the past decade, mainly on issues regarding ACMs (Access Control Models) and User Provenance (e.g. https://link.springer.com/chapter/10.1007/978-3-319-78816-6_17).
This work has led me into acc...