منابع مشابه
Updating realistic access
Nearly six years ago Ira Mellman, then Editor-in-Chief of the JCB, published an editorial entitled "Providing realistic access" (1). It described the Journal's efforts to reconcile its subscription-based business model with the goal of providing public access to scholarly journal content. Since then, developments in the public-access movement are bringing us closer to the ideal of universal pub...
متن کاملProviding realistic access
s and PDFs, which is full-text searchable and seamlessly linked to PubMed, is a free resource for the scientific community, and indeed to the world at large. It represents generations of the finest work in cell biology, and an unparalleled history of how our field grew from a curiosity to the most central body of knowledge in all of biology and biomedical science. It also demonstrates how the f...
متن کاملSimulation of abdominal aortic aneurysm growth with updating hemodynamic loads using a realistic geometry.
Advances in modeling vascular tissue growth and remodeling (G&R) as well as medical imaging usher in a great potential for integrative computational mechanics to revolutionize the clinical treatment of cardiovascular diseases. A computational model of abdominal aortic aneurysm (AAA) enlargement has been previously developed based on realistic geometric models. In this work, we couple the comput...
متن کاملA lattice-based approach for updating access control policies in real-time
Real-time update of access control policies, that is, updating policies while they are in effect and enforcing the changes immediately and automatically, is necessary for many dynamic environments. Examples of such environments include disaster relief and war zone. In such situations, system resources may need re-configuration or operational modes may change, necessitating a change of policies....
متن کاملAn Integrated Access Control for Securely Querying and Updating XML Data
Many existing access controls use node filtering or querying rewriting techniques. These techniques require rather time-consuming processes such as parsing, labeling, pruning and/or rewriting queries into safe ones each time a user requests a query or takes an action. In this paper, we propose a fine-grained access control model, named SecureX, which supports read and write privileges. With our...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cell Biology
سال: 2010
ISSN: 1540-8140,0021-9525
DOI: 10.1083/jcb.201003068