432 Hits in 4.8 sec

A Critical Analysis and Improvement of AACS Drive-Host Authentication [chapter]

Jiayuan Sui, Douglas R. Stinson
Lecture Notes in Computer Science  
This paper presents a critical analysis of the AACS drivehost authentication scheme. A few weaknesses are identified which could lead to various attacks on the scheme.  ...  A proof of security of the modified scheme is also presented. The modified scheme achieves better efficiency than the original scheme.  ...  Conclusion We have described three weaknesses in the AACS drive-host authentication scheme. Specifically, the scheme is susceptible to unknown key-share attack and man-in-the-middle attack.  ... 
doi:10.1007/978-3-540-70500-0_4 fatcat:gresvtqvk5aqjgdxpxq4o2ctom

A Review on Structured Scheme Representation on Data Security Application

Siti Norussaadah Mohd Salleh, Roshidi Din, Nur Haryani Zakaria, Aida Mustapha
2018 Indonesian Journal of Electrical Engineering and Computer Science  
With the rapid development in the era of Internet and networking technology, there is always a requirement to improve the security systems, which secure the transmitted data over an unsecured channel.  ...  These structured-scheme types are designed to improve and strengthen the security of data on the application.  ...  As this scheme is focused on digital images, it attempts to overcome the weakness of existing system such as the alteration that happened to the host image and also to improve the robustness of some attacks  ... 
doi:10.11591/ijeecs.v11.i2.pp733-739 fatcat:zr32ik5qcnflvlgr2lcebtdxui

On Enabling Technologies for the Internet of Important Things

Marten Lohstroh, Hokeun Kim, John C. Eidson, Chadlia Jerad, Beth Osyk, Edward A. Lee
2019 IEEE Access  
authentication, and the ability to aggregate data from a multiplicity of sources in the cloud.  ...  This paper discusses and surveys architectural approaches, communication protocols, and programming models that promise to bridge the gap, enabling the use of the Internet technologies even in safety-critical  ...  (1) We have shown that our work on hosting critical security infrastructure, such as authentication and authorization services, on edge computers can enhance reliability and resilience as well as improve  ... 
doi:10.1109/access.2019.2901509 fatcat:xsjcbtxi5feyxnkcrzmjkjkf3q

Response of human melanoma cell lines to interferon-beta gene transfer mediated by a modified adenoviral vector

Taynah I. P. David, Otto L. D. Cerqueira, Marlous G. Lana, Ruan F. V. Medrano, Aline Hunger, Bryan E. Strauss
2020 Scientific Reports  
This study provides a critical advance in the development of our melanoma gene therapy approach.  ...  The AdRGD-PG-hIFNβ vector provides extensive killing of human melanoma cells in vitro and a potent anti-tumor effect in vivo.  ...  We thank Mara Junqueira and the staff of the animal facility for their cooperation.  ... 
doi:10.1038/s41598-020-74826-y pmid:33087767 fatcat:t6mdci3odvdjpc5hs2strwovii

Functional Dissection of a Multimodular Polypeptide of the Pikromycin Polyketide Synthase into Monomodules by Using a Matched Pair of Heterologous Docking Domains

John Yan, Shuchi Gupta, David H. Sherman, Kevin A. Reynolds
2009 ChemBioChem  
Nadaraj Palaniappan and Dr. Galina Florova for technical advice on this project. Keywords: biosynthesis · natural products · polyketides  ...  Detection and quantification of methymycin and pikromycin products was performed by using HPLC analysis combined with UV and MS (m/z 470 and 526 in positive mode) and confirmed with authentic standards  ...  These interactions play a critical role in both the stabilization of the PKS homodimer and the docking interactions of the C-terminal ACP bound domain with the N-terminal DD of the subsequent KS.  ... 
doi:10.1002/cbic.200900098 pmid:19437523 pmcid:PMC4652847 fatcat:t5sklb3f2jer5llsvtpltuaxzq

Adaptive data protection in distributed systems

Anna Cinzia Squicciarini, Giuseppe Petracca, Elisa Bertino
2013 Proceedings of the third ACM conference on Data and application security and privacy - CODASPY '13  
security policies of various granularity, and synchronization protocols.  ...  Second, although multiple copies may exist, a consistent view across copies should be maintained.  ...  The AAC implements the authentication and authorization mechanisms, by exploiting the services offered by Java Authentication and Authorization Services (JAAS) [11] and Security Manager.  ... 
doi:10.1145/2435349.2435401 dblp:conf/codaspy/SquicciariniPB13 fatcat:up5bjrozoze3hgj44i7bhwjwse

Lytic infection with murine gammaherpesvirus 68 activates host and viral RNA polymerase III promoters and enhances non-coding RNA expression

Ashley N Knox, Alice Mueller, Eva M Medina, Eric T Clambey, Linda F van Dyk
2021 Journal of Virology  
To compare the transcription of host and viral pol III-dependent ncRNAs, we analyzed a series of pol III promoters for host and viral ncRNAs using a luciferase reporter optimized to measure pol III activity  ...  enhance viral gene expression and pathogenesis.IMPORTANCEGammaherpesviruses are a prime example of how viruses can alter the host transcriptional landscape to establish infection.  ...  Though these methods each have different advantages and disadvantages, they 335 all indicate that lytic infection drives a general upregulation of promoter activity across multiple host and viral 336 pol  ... 
doi:10.1128/jvi.00079-21 pmid:33910955 pmcid:PMC8223928 fatcat:374x62wxyffofa5wsqakgn3gq4

Genome-minimized Streptomyces host for the heterologous expression of secondary metabolism

M. Komatsu, T. Uchiyama, S. Omura, D. E. Cane, H. Ikeda
2010 Proceedings of the National Academy of Sciences of the United States of America  
A critical requirement for such applications is the availability of the relevant biosynthetic gene clusters controlling the production of a secondary metabolite of interest as well as appropriate genetic  ...  Comparative analysis of three taxonomically distinct Streptomyces genomes, S. avermitilis, S. coelicolor A3(2), and S. griseus, revealed a conserved core region of ∼6.28-6.50 Mb in which the majority of  ...  Takano and K. Ueda of the College of Bioresource Sciences, Nihon University for providing cosmid clones SGR4C6 and SGR1A7. We also thank K. Machida, A. Arisawa, and T.  ... 
doi:10.1073/pnas.0914833107 pmid:20133795 pmcid:PMC2823899 fatcat:kmg2eflih5chplmj7i45fyniem

The decision-making process in recommending electronic communication aids for children and young people who are non-speaking: the I-ASC mixed-methods study

Janice Murray, Yvonne Lynch, Juliet Goldbart, Liz Moulam, Simon Judge, Edward Webb, Mark Jayes, Stuart Meredith, Helen Whittle, Nicola Randall, David Meads, Stephane Hess
2020 Health Services and Delivery Research  
Thematic analysis and framework approach supported the analysis of qualitative data.  ...  Public involvement Two public involvement co-researchers, an adult using a symbol communication aid and a parent of a communication aid user, were core members of the research team.  ...  They offered wise counsel, critical appraisal and genuine guidance, resulting in a far more robust outcome to the project.  ... 
doi:10.3310/hsdr08450 fatcat:vndkwif7w5au5ms5fk6zwphdnu

Engineered Streptomyces avermitilis Host for Heterologous Expression of Biosynthetic Gene Cluster for Secondary Metabolites

Mamoru Komatsu, Kyoko Komatsu, Hanae Koiwai, Yuuki Yamada, Ikuko Kozone, Miho Izumikawa, Junko Hashimoto, Motoki Takagi, Satoshi Omura, Kazuo Shin-ya, David E. Cane, Haruo Ikeda
2013 ACS Synthetic Biology  
Twenty of the entire biosynthetic gene clusters for secondary metabolites were successively cloned and introduced into a versatile model host S. avermitilis SUKA17 or 22.  ...  in a versatile host.  ...  and/or biological activity with comparison with each authentic sample.  ... 
doi:10.1021/sb3001003 pmid:23654282 pmcid:PMC3932656 fatcat:uqjjdqyfgzgdpiupdut7jpkryi

Profiling host ANP32A splicing landscapes to predict influenza A virus polymerase adaptation

Patricia Domingues, Davide Eletto, Carsten Magnus, Hannah L. Turkington, Stefan Schmutz, Osvaldo Zagordi, Matthias Lenk, Martin Beer, Silke Stertz, Benjamin G. Hale
2019 Nature Communications  
Here, we establish host ANP32A as a critical driver of selection, and identify host-specific ANP32A splicing landscapes that predict viral evolution.  ...  ANP32As with shorter inserts interact poorly with vPol, are compromised in supporting avian-like IAV replication, and drive selection of mammalian-adaptive vPol sequences with distinct kinetics.  ...  Data availability The authors declare that all data supporting the findings of this study are available within the paper and its supplementary information files.  ... 
doi:10.1038/s41467-019-11388-2 pmid:31363119 pmcid:PMC6667478 fatcat:vrlosmmcbvh7fefz5zrfovgohi

MARVEL - D1.3: Architecture definition for MARVEL framework

Dragana Bajovic, Nikola Simic
2021 Zenodo  
This deliverable is a living document that will be revised over the course of the project to account for the latest project achievements and updates of the relevant reference architectures and guidelines  ...  The results of this deliverable will serve as a guideline towards the MARVEL Minimum Viable Product (MVP).  ...  improve the security and well-being of their citizens.  ... 
doi:10.5281/zenodo.5463896 fatcat:ekassky3trcwraipozxsiokwja

Chip and PIN is Broken

Steven J. Murdoch, Saar Drimer, Ross Anderson, Mike Bond
2010 2010 IEEE Symposium on Security and Privacy  
EMV secures credit and debit card transactions by authenticating both the card and the customer presenting it through a combination of cryptographic authentication codes, digital signatures, and the entry  ...  of a PIN.  ...  We also thank the merchants and cardholders who allowed us to carry out experiments, and Markus Kuhn for photography assistance.  ... 
doi:10.1109/sp.2010.33 dblp:conf/sp/MurdochDAB10 fatcat:phtckblebre5dngxiuep6hakeu

Reflex Autonomicity in an Agent-Based Security System :: The Autonomic Access Control System

Sarah Eowyn Johnston, Roy Sterritt, Edward Hanna, Patricia O'Hagan
2007 Fourth IEEE International Workshop on Engineering of Autonomic and Autonomous Systems (EASe'07)  
This paper reports on an investigation of the use of the autonomic concepts of reflex autonomicity and apoptosis in the development of a multi-agent system.  ...  to defend, optimize and heal.  ...  Acknowledgements The wider context of the Autonomic Systems research is supported at the University of Ulster by the Computer Science Research Institute (CSRI) and the Centre for Software Process Technologies  ... 
doi:10.1109/ease.2007.22 fatcat:ya44aqiwfbc6dokrtjto2wwfea

Replication-Competent Infectious Hepatitis B Virus Vectors Carrying Substantially Sized Transgenes by Redesigned Viral Polymerase Translation

Zihua Wang, Li Wu, Xin Cheng, Shizhu Liu, Baosheng Li, Haijun Li, Fubiao Kang, Junping Wang, Huan Xia, Caiyan Ping, Michael Nassal, Dianxing Sun (+1 others)
2013 PLoS ONE  
We reasoned that duplicating the overlap region and providing artificial IRES control for translation of both Pol and an in-between inserted transgene might yield a functional tricistronic pgRNA, without  ...  Translation of the downstream Pol ORF does not involve a conventional internal ribosome entry site (IRES).  ...  close to the 39 end) that drives pgRNA transcription on the authentic, circular DNA genome.  ... 
doi:10.1371/journal.pone.0060306 pmid:23589756 pmcid:PMC3615001 fatcat:ilfhho75angknjh7z5khjlyoka
« Previous Showing results 1 — 15 out of 432 results