[go: up one dir, main page]

Sandefur, 2014 - Google Patents

Young investigator perspectives. Blogging for electronic record keeping and collaborative research

Sandefur, 2014

View HTML @Full View
Document ID
12084036735328158308
Author
Sandefur C
Publication year
Publication venue
American Journal of Physiology-Gastrointestinal and Liver Physiology

External Links

Snippet

Blogging also provides an easy and relatively painless way to share your science with the public. By 34 nature, the blogs we read online are public. Blog access, however, can be restricted using blog software 35 privacy settings. The available blogging software …
Continue reading at journals.physiology.org (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes

Similar Documents

Publication Publication Date Title
Freelon Computational research in the post-API age
Corti Recent developments in archiving social research
WO2013152117A2 (en) Web-based content aggregation, organization, and publication system and methods of use
Chireshe Career guidance and counselling provisions at a South African University: Career advisors’ reflections
Baro et al. Electronic theses and dissertations initiatives: a survey of university libraries in Nigeria
Smith Special issue on using secondary data in educational research
McKinney EndNote web: web-based bibliographic management
Sandefur Young investigator perspectives. Blogging for electronic record keeping and collaborative research
Salo et al. Ain’t nobody’s business if I do (read serials)
London et al. Automatic export of PubMed® citations to EndNote®
Davis The future of web citation practices
Page Articles in PresS. Am J Physiol Gastrointest Liver Physiol (October 30, 2014). doi: 10.1152/ajpgi. 00384.2014
Johnson Internet resources for the anaesthesiologist
Reilly et al. Collaboration to build a meaningful connection between library content and the researcher
Kálmán et al. Sustainable preservation for the arts and humanities
Goldstein et al. Prototyping a collaborative data curation service for coastal science
Tattersall Road map: from Web 2.0 to altmetrics
Smith Fundamentals of Government Information: Mining, Finding, Evaluating, and Using Government Resources ., by Cassandra Hartnett, Andrea Sevetson, Eric Forte: Chicago, IL: Neal-Shuman, 2016, 424 pp., ISBN: 978-0-8389-1395-6, $85.00
Fronk Teaching about fake news: Lesson plans for different disciplines and audiences: Benjes-Small, C., Wittig, C., & Oberlies, MK (Eds.).(2021). Association of College and Research Libraries. 321 pp., $88.00, ISBN 9780838938904
Wensing et al. Planning for Urban Country. Taking First Nations Values into Future Urban Designs: by David S. Jones, Singapore, Springer Nature, 2023, 310 pp., E-book: 158.00AUD/ 99.00 US Dollars, Softcover: 208:00AUD/ 129.99 US Dollars, Hardcover: 208:00AUD/ 129.99 US Dollars, ISBN 978-981-99-7194-7, https://doi. org/10.1007/978-981-99-7192-3
Greenberg Big Data, Little Data, No Data: Scholarship in the Networked World: by Christine L. Borgman. Cambridge, MA: MIT Press, 2015. xxv, 383 p. illus. ISBN 9780262529914. $27.00
Eden Managing Digital Cultural Objects: Analysis, Discovery and Retrieval: Allen Foster and Pauline Rafferty (Eds.). 2016. London, England: Facet Publishing. ISBN: 978-1-85604-941-2
Pesch An Update on COUNTER and SUSHI
Entrup et al. Introducing GeoBib: An Annotated and Geo-referenced Online Bibliography of Early German and Polish Holocaust and Camp Literature (1933 1949)
Christensen Review of Working on the Dark Side of the Moon: Life Inside the National Security Agency by Thomas Reed Willemain: Willemain, Thomas R. Working on the Dark Side of the Moon: Life Inside the National Security Agency. Mill City Press, Maitland, FL, 2017. 119 pages, Paperback, $15.99. ISBN 9781629528724.