z-logo
open-access-imgOpen Access
Effective Rules for Building and Securing of Blogs
Author(s) -
Baghdad Science Journal
Publication year - 2009
Publication title -
mağallaẗ baġdād li-l-ʿulūm
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.167
H-Index - 6
eISSN - 2411-7986
pISSN - 2078-8665
DOI - 10.21123/bsj.6.2.421-426
Subject(s) - subject (documents) , world wide web , authentication (law) , internet privacy , computer science , work (physics) , engineering , computer security , mechanical engineering
Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here