Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • Commentary
  • Published:

Computer security in academia—a potential roadblock to distributed annotation of the human genome

This is a preview of subscription content, access via your institution

Access options

Buy this article

Prices may be subject to local taxes which are calculated during checkout

Figure 1: The number of computer security incidents over the past 15 years.

Erin Boyle

References

  1. Butler, D. Nature 425, 3 (2003).

    Article  CAS  Google Scholar 

  2. Richmond, R. Workplace Security. Wall Street Journal, R4 (29 September 2003).

    Google Scholar 

  3. Richardson, R. Eighth Annual CSI/FBI Computer Crime and Security Survey (Computer Security Institute, San Francisco, CA, USA, 2003).

    Google Scholar 

  4. Committee on Institutional Cooperation. Incident Cost & Analysis Modeling Projects (ICAMP) I (CIC; Champaign, IL, USA, 1998). http://www.cic.uiuc.edu/groups/ITSecurity WorkingGroup/archive/Report/ICAMP.shtml

  5. Committee on Institutional Cooperation. Incident Cost & Analysis Modeling Projects (ICAMP) II (CIC; Champaign, IL, USA, 2000). http://www.cic.uiuc.edu/groups/ITSecurity WorkingGroup/archive/Report/ICAMP.shtml

  6. http://www.pubmed.gov/

  7. http://www.uniprot.org/

  8. Clamp, M. et al. Nucleic Acids Res. 31, 38–42 (2003).

    Article  CAS  Google Scholar 

  9. The FlyBase Consortium. Nucleic Acids Res. 31, 172–175 (2003).

  10. Echols, N., Milburn, D. & Gerstein, M. Nucleic Acids Res. 31 478–482 (2003).

    Article  CAS  Google Scholar 

  11. Murzin, A.G., Brenner, S.E., Hubbard, T. & Chothia, C. J. Mol. Biol. 247, 536 (1995).

    CAS  Google Scholar 

  12. Dowell, R. et al. BMC Bioinformatics 2, 7 (2001). http://cabig.nci.nih.gov/caBIG/

    Article  CAS  Google Scholar 

  13. Hubbard, T. & Birney, E. Nature 403, 825 (2000).

    Article  CAS  Google Scholar 

  14. Stein, L. Nature 417, 119 (2002).

    Article  CAS  Google Scholar 

  15. Gerstein, M. Science 288, 1590 (2000).

    Article  CAS  Google Scholar 

  16. http://www.communitytechnology.org/nsf_ci_report

  17. http://shibboleth.internet2.edu/

  18. http://www.globus.org/

  19. Foster, I. & Kesselman, C. Int. J. Supercomputer Appl. 11, 115–128 (1997).

    Google Scholar 

  20. http://www.griphyn.org/

  21. http://www.eng.nsf.gov/nees

  22. http://www.teragrid.org/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mark Gerstein.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Greenbaum, D., Douglas, S., Smith, A. et al. Computer security in academia—a potential roadblock to distributed annotation of the human genome. Nat Biotechnol 22, 771–772 (2004). https://doi.org/10.1038/nbt0604-771

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1038/nbt0604-771

Search

Quick links

Nature Briefing

Sign up for the Nature Briefing newsletter — what matters in science, free to your inbox daily.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing