Updating realistic access

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Updating realistic access

Nearly six years ago Ira Mellman, then Editor-in-Chief of the JCB, published an editorial entitled "Providing realistic access" (1). It described the Journal's efforts to reconcile its subscription-based business model with the goal of providing public access to scholarly journal content. Since then, developments in the public-access movement are bringing us closer to the ideal of universal pub...

متن کامل

Providing realistic access

s and PDFs, which is full-text searchable and seamlessly linked to PubMed, is a free resource for the scientific community, and indeed to the world at large. It represents generations of the finest work in cell biology, and an unparalleled history of how our field grew from a curiosity to the most central body of knowledge in all of biology and biomedical science. It also demonstrates how the f...

متن کامل

Simulation of abdominal aortic aneurysm growth with updating hemodynamic loads using a realistic geometry.

Advances in modeling vascular tissue growth and remodeling (G&R) as well as medical imaging usher in a great potential for integrative computational mechanics to revolutionize the clinical treatment of cardiovascular diseases. A computational model of abdominal aortic aneurysm (AAA) enlargement has been previously developed based on realistic geometric models. In this work, we couple the comput...

متن کامل

A lattice-based approach for updating access control policies in real-time

Real-time update of access control policies, that is, updating policies while they are in effect and enforcing the changes immediately and automatically, is necessary for many dynamic environments. Examples of such environments include disaster relief and war zone. In such situations, system resources may need re-configuration or operational modes may change, necessitating a change of policies....

متن کامل

An Integrated Access Control for Securely Querying and Updating XML Data

Many existing access controls use node filtering or querying rewriting techniques. These techniques require rather time-consuming processes such as parsing, labeling, pruning and/or rewriting queries into safe ones each time a user requests a query or takes an action. In this paper, we propose a fine-grained access control model, named SecureX, which supports read and write privileges. With our...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Cell Biology

سال: 2010

ISSN: 1540-8140,0021-9525

DOI: 10.1083/jcb.201003068