https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do#Head
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do
http://www.nanopub.org/nschema#hasAssertion
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do#assertion
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do
http://www.nanopub.org/nschema#hasProvenance
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do#provenance
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do
http://www.nanopub.org/nschema#hasPublicationInfo
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do#pubinfo
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.nanopub.org/nschema#Nanopublication
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do#assertion
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do#GFF-A1.2
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
https://w3id.org/fair/fip/terms/FAIR-Interpretation
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do#GFF-A1.2
http://www.w3.org/2000/01/rdf-schema#comment
This principle clearly demonstrates that following the FAIR guiding principles is not equal to making all data 'open'. Some digital resources, such as data that have access restrictions based on ethical, legal or contractual constraints, require additional conditions/steps to be accessed. This often pertains to assuring that the access requester is indeed that requester (authentication), that the requester's profile and credentials match the access conditions of the resource (authorization), and that the intended use matches permitted use cases (e.g. for a particular purpose only) (see also R1.1, where there are requirements to provide explicit documentation about who may use the data, and for what purposes). At the level of technical implementation, an additional authentication and authorization procedure must be specified, if it is not already defined by the protocol (see A1.1). A requester can be a human or a machine agent. In the latter case it is probably a proxy for a human or an organization to which the authentication and authorization protocol should be applied, in which case, the machine should be expected to present the appropriate credentials. The principle requires that a FAIR resource must provide such a protocol, but the protocol itself is not further specified. In practice, an Internet of FAIR Data and Services cannot function without implementing Authentication and Authorization Infrastructure, which includes AAI for machines and should thus be Ontology-based and machine actionable.
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do#GFF-A1.2
http://www.w3.org/2000/01/rdf-schema#label
GFF-A1.2 | GFF A1.2 Interpretation
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do#GFF-A1.2
https://schema.org/about
https://w3id.org/fair/principles/terms/A1.2
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do#GFF-A1.2
https://schema.org/url
https://www.gofair.foundation/a1-2
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do#GFF-A1.2
https://w3id.org/fair/fip/latest/declared-by
https://ror.org/056j50v04
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do#provenance
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do#assertion
http://www.w3.org/ns/prov#wasAttributedTo
https://www.gofair.foundation/a1-2
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do#pubinfo
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do#sig
http://purl.org/nanopub/x/hasAlgorithm
RSA
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do#sig
http://purl.org/nanopub/x/hasPublicKey
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCFntPrMZqvg2kVhCNArNnEn37ddXGwZ/0r4C8CS4lDry7C7YkYgng9yb0UMZQUHiTVkR/5A4m/xjE+Vy+AnwcWUeB75SfGZjE5ylI6VeHjTHi9+2hh2PHYIWnkhU4WHl3COEnxSSa/VouvPzZ2BIWLH6fTrq7NNL3RF5hGegGG0QIDAQAB
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do#sig
http://purl.org/nanopub/x/hasSignature
ett92L3ziJYZqw3ZzBa/2MBdX8aTDMqmTCSomDqQLdvoKNlrBfRFwy5kSGsxJiSsjspqAfj8VcfLsO/0oDa/nZogqRJFB6MKuRZKNzXkMDGrQ6XTkt5ZHAwsBc9SKqfbq9qk1QPf6W8nhWWFvYvjHOtSfN3VPNSMjRTj2zh7Au0=
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do#sig
http://purl.org/nanopub/x/hasSignatureTarget
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do
http://purl.org/dc/terms/created
2023-10-04T16:57:33.084Z
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do
http://purl.org/dc/terms/creator
https://orcid.org/0000-0003-2195-3997
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do
http://purl.org/dc/terms/license
https://creativecommons.org/licenses/by/4.0/
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do
http://purl.org/nanopub/x/introduces
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do#GFF-A1.2
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do
http://www.w3.org/2000/01/rdf-schema#label
FAIR Interpretation: GFF-A1.2 | GFF A1.2 Interpretation
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do
https://w3id.org/np/o/ntemplate/wasCreatedFromProvenanceTemplate
http://purl.org/np/RANUBzTXWga5sX6dA3MhSVb4M8bdc74zvsfN_z6I5Ka1I
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do
https://w3id.org/np/o/ntemplate/wasCreatedFromPubinfoTemplate
http://purl.org/np/RAA2MfqdBCzmz9yVWjKLXNbyfBNcwsMmOqcNUxkk1maIM
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do
https://w3id.org/np/o/ntemplate/wasCreatedFromPubinfoTemplate
http://purl.org/np/RAh1gm83JiG5M6kDxXhaYT1l49nCzyrckMvTzcPn-iv90
https://w3id.org/np/RA91dpGeN9YBirpJWNzvyE5839M__3Kt-tVtfBHo2N0do
https://w3id.org/np/o/ntemplate/wasCreatedFromTemplate
https://w3id.org/np/RA2uML5mNU_0CedtkdphdLwXaqNGhfyKX3R5JZO061hXM