44 resultados para proto-Basque
Resumo:
Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.
Resumo:
My research investigates why nouns are learned disproportionately more frequently than other kinds of words during early language acquisition (Gentner, 1982; Gleitman, et al., 2004). This question must be considered in the context of cognitive development in general. Infants have two major streams of environmental information to make meaningful: perceptual and linguistic. Perceptual information flows in from the senses and is processed into symbolic representations by the primitive language of thought (Fodor, 1975). These symbolic representations are then linked to linguistic input to enable language comprehension and ultimately production. Yet, how exactly does perceptual information become conceptualized? Although this question is difficult, there has been progress. One way that children might have an easier job is if they have structures that simplify the data. Thus, if particular sorts of perceptual information could be separated from the mass of input, then it would be easier for children to refer to those specific things when learning words (Spelke, 1990; Pylyshyn, 2003). It would be easier still, if linguistic input was segmented in predictable ways (Gentner, 1982; Gleitman, et al., 2004) Unfortunately the frequency of patterns in lexical or grammatical input cannot explain the cross-cultural and cross-linguistic tendency to favor nouns over verbs and predicates. There are three examples of this failure: 1) a wide variety of nouns are uttered less frequently than a smaller number of verbs and yet are learnt far more easily (Gentner, 1982); 2) word order and morphological transparency offer no insight when you contrast the sentence structures and word inflections of different languages (Slobin, 1973) and 3) particular language teaching behaviors (e.g. pointing at objects and repeating names for them) have little impact on children's tendency to prefer concrete nouns in their first fifty words (Newport, et al., 1977). Although the linguistic solution appears problematic, there has been increasing evidence that the early visual system does indeed segment perceptual information in specific ways before the conscious mind begins to intervene (Pylyshyn, 2003). I argue that nouns are easier to learn because their referents directly connect with innate features of the perceptual faculty. This hypothesis stems from work done on visual indexes by Zenon Pylyshyn (2001, 2003). Pylyshyn argues that the early visual system (the architecture of the "vision module") segments perceptual data into pre-conceptual proto-objects called FINSTs. FINSTs typically correspond to physical things such as Spelke objects (Spelke, 1990). Hence, before conceptualization, visual objects are picked out by the perceptual system demonstratively, like a finger pointing indicating ‘this’ or ‘that’. I suggest that this primitive system of demonstration elaborates on Gareth Evan's (1982) theory of nonconceptual content. Nouns are learnt first because their referents attract demonstrative visual indexes. This theory also explains why infants less often name stationary objects such as plate or table, but do name things that attract the focal attention of the early visual system, i.e., small objects that move, such as ‘dog’ or ‘ball’. This view leaves open the question how blind children learn words for visible objects and why children learn category nouns (e.g. 'dog'), rather than proper nouns (e.g. 'Fido') or higher taxonomic distinctions (e.g. 'animal').
Resumo:
Ghrelin was first identified in 1999 by Kojima and colleagues (Kojima et al. 1999) as the natural ligand of an orphan G-protein coupled receptor, the Growth Hormone (GH) secretagogue receptor (GHS-R), which had been identified several years earlier through the actions of a growing number of synthetic growth hormone releasing peptides (GHRPs) and non-peptidyl GH secretagogues (Howard et al. 1996). Early studies, therefore, focussed on the actions of ghrelin as an important regulator of GH secretion. As a result Kojima et al (1999) designated this GH-releasing peptide, ghrelin (ghre is the Proto-Indo-European root of the word 'grow'). We now recognise that the functions of ghrelin extend well beyond its GH releasing actions and that it is a multi-functional peptide with both endocrine and autocrine/paracrine modes of action.
Resumo:
This paper examines some of the implications for China of the creative industries agenda as drawn by some recent commentators. The creative industries have been seen by many commentators as essential if China is to move from an imitative low-value economy to an innovative high value one. Some suggest that this trajectory is impossible without a full transition to liberal capitalism and democracy - not just removing censorship but instituting 'enlightenment values'. Others suggest that the development of the creative industries themselves will promote social and political change. The paper suggests that the creative industries takes certain elements of a prior cultural industries concept and links it to a new kind of economic development agenda. Though this agenda presents problems for the Chinese government it does not in itself imply the kind of radical democratic political change with which these commentators associate it. In the form in which the creative industries are presented – as part of an informational economy rather than as a cultural politics – it can be accommodated by a Chinese regime doing ‘business as usual’.
Resumo:
Although germline mutations in CDKN2A are present in approximately 25% of large multicase melanoma families, germline mutations are much rarer in the smaller melanoma families that make up most individuals reporting a family history of this disease. In addition, only three families worldwide have been reported with germline mutations in a gene other than CDKN2A (i.e., CDK4). Accordingly, current genomewide scans underway at the National Human Genome Research Institute hope to reveal linkage to one or more chromosomal regions, and ultimately lead to the identification of novel genes involved in melanoma predisposition. Both CDKN2A and PTEN have been identified as genes involved in sporadic melanoma development; however, mutations are more common in cell lines than uncultured tumors. A combination of cytogenetic, molecular, and functional studies suggests that additional genes involved in melanoma development are located to chromosomal regions 1p, 6q, 7p, 11q, and possibly also 9p and 10q. With the near completion of the human genome sequencing effort, combined with the advent of high throughput mutation analyses and new techniques including cDNA and tissue microarrays, the identification and characterization of additional genes involved in melanoma pathogenesis seem likely in the near future.
Resumo:
Using a genome-scanning approach to search for oncogenes, a recent report identifies somatic mutations in the signaling gene BRAF that are particularly prevalent in melanoma.
Resumo:
The Cancer Genome Project intends to search every human gene for cancer-related mutations. Its first success is the discovery of such mutations in the BRAF gene.
Resumo:
We have used microarray gene expression profiling and machine learning to predict the presence of BRAF mutations in a panel of 61 melanoma cell lines. The BRAF gene was found to be mutated in 42 samples (69%) and intragenic mutations of the NRAS gene were detected in seven samples (11%). No cell line carried mutations of both genes. Using support vector machines, we have built a classifier that differentiates between melanoma cell lines based on BRAF mutation status. As few as 83 genes are able to discriminate between BRAF mutant and BRAF wild-type samples with clear separation observed using hierarchical clustering. Multidimensional scaling was used to visualize the relationship between a BRAF mutation signature and that of a generalized mitogen-activated protein kinase (MAPK) activation (either BRAF or NRAS mutation) in the context of the discriminating gene list. We observed that samples carrying NRAS mutations lie somewhere between those with or without BRAF mutations. These observations suggest that there are gene-specific mutation signals in addition to a common MAPK activation that result from the pleiotropic effects of either BRAF or NRAS on other signaling pathways, leading to measurably different transcriptional changes.
Resumo:
Once melanoma metastasizes, no effective treatment modalities prolong survival in most patients. This notorious refractoriness to therapy challenges investigators to identify agents that overcome melanoma resistance to apoptosis. Whereas many survival pathways contribute to the death-defying phenotype in melanoma, a defect in apoptotic machinery previously highlighted inactivation of Apaf-1, an apoptosome component engaged after mitochondrial damage. During studies involving Notch signaling in melanoma, we observed a gamma-secretase tripeptide inhibitor (GSI; z-Leu-Leu-Nle-CHO), selected from a group of compounds originally used in Alzheimer's disease, induced apoptosis in nine of nine melanoma lines. GSI only induced G2-M growth arrest (but not killing) in five of five normal melanocyte cultures tested. Effective killing of melanoma cells by GSI involved new protein synthesis and a mitochondrial-based pathway mediated by up-regulation of BH3-only members (Bim and NOXA). p53 activation was not necessary for up-regulation of NOXA in melanoma cells. Blocking GSI-induced NOXA using an antisense (but not control) oligonucleotide significantly reduced the apoptotic response. GSI also killed melanoma cell lines with low Apaf-1 levels. We conclude that GSI is highly effective in killing melanoma cells while sparing normal melanocytes. Direct enhancement of BH3-only proteins executes an apoptotic program overcoming resistance of this lethal tumor. Identification of a p53-independent apoptotic pathway in melanoma cells, including cells with low Apaf-1, bypasses an impediment to current cytotoxic therapy and provides new targets for future therapeutic trials involving chemoresistant tumors.
Resumo:
Notch receptor-mediated intracellular events represent an ancient cell signaling system, and alterations in Notch expression are associated with various malignancies in which Notch may function as an oncogene or less commonly as a tumor suppressor. Notch signaling regulates cell fate decisions in the epidermis, including influencing stem cell dynamics and growth/differentiation control of cells in skin. Because of increasing evidence that the Notch signaling network is deregulated in human malignancies, Notch receptors have become attractive targets for selective killing of malignant cells. Compared with proliferating normal human melanocytes, melanoma cell lines are characterized by markedly enhanced levels of activated Notch-1 receptor. By using a small molecule gamma-secretase inhibitor (GSI) consisting of a tripeptide aldehyde, N-benzyloxycarbonyl-Leu-Leu-Nle-CHO, which can block processing and activation of all four different Notch receptors, we identified a specific apoptotic vulnerability in melanoma cells. GSI triggers apoptosis in melanoma cells, but only G2/M growth arrest in melanocytes without subsequent cell death. Moreover, GSI treatment induced a pro-apoptotic BH3-only protein, NOXA, in melanoma cells but not in normal melanocytes. The use of GSI to induce NOXA induction overcomes the apoptotic resistance of melanoma cells, which commonly express numerous cell survival proteins such as Mcl-1, Bcl-2, and survivin. Taken together, these results highlight the concept of synthetic lethality in which exposure to GSI, in combination with melanoma cells overexpressing activated Notch receptors, has lethal consequences, producing selective killing of melanoma cells, while sparing normal melanocytes. By identifying signaling pathways that contribute to the transformation of melanoma cells (e.g. Notch signaling), and anti-cancer agents that achieve tumor selectivity (e.g., GSI-induced NOXA), this experimental approach provides a useful framework for future therapeutic strategies in cutaneous oncology.
Resumo:
p53 is the central member of a critical tumor suppressor pathway in virtually all tumor types, where it is silenced mainly by missense mutations. In melanoma, p53 predominantly remains wild type, thus its role has been neglected. To study the effect of p53 on melanocyte function and melanomagenesis, we crossed the 'high-p53'Mdm4+/- mouse to the well-established TP-ras0/+ murine melanoma progression model. After treatment with the carcinogen dimethylbenzanthracene (DMBA), TP-ras0/+ mice on the Mdm4+/- background developed fewer tumors with a delay in the age of onset of melanomas compared to TP-ras0/+ mice. Furthermore, we observed a dramatic decrease in tumor growth, lack of metastasis with increased survival of TP-ras0/+: Mdm4+/- mice. Thus, p53 effectively prevented the conversion of small benign tumors to malignant and metastatic melanoma. p53 activation in cultured primary melanocyte and melanoma cell lines using Nutlin-3, a specific Mdm2 antagonist, supported these findings. Moreover, global gene expression and network analysis of Nutlin-3-treated primary human melanocytes indicated that cell cycle regulation through the p21WAF1/CIP1 signaling network may be the key anti-melanomagenic activity of p53.
Resumo:
The use of Trusted Platform Module (TPM) is be- coming increasingly popular in many security sys- tems. To access objects protected by TPM (such as cryptographic keys), several cryptographic proto- cols, such as the Object Specific Authorization Pro- tocol (OSAP), can be used. Given the sensitivity and the importance of those objects protected by TPM, the security of this protocol is vital. Formal meth- ods allow a precise and complete analysis of crypto- graphic protocols such that their security properties can be asserted with high assurance. Unfortunately, formal verification of these protocols are limited, de- spite the abundance of formal tools that one can use. In this paper, we demonstrate the use of Coloured Petri Nets (CPN) - a type of formal technique, to formally model the OSAP. Using this model, we then verify the authentication property of this protocol us- ing the state space analysis technique. The results of analysis demonstrates that as reported by Chen and Ryan the authentication property of OSAP can be violated.
Resumo:
Chondritic porous aggregates (CPA's) belong to an important subset of small particles (usually between 5 and 50 micrometers) collected from the stratosphere by high flying aircraft. These aggregates are approximately chondritic in elemental abundance and are composed of many thousands of smaller, submicrometer particles. CPA particles have been the subject of intensive study during the past few years [1-3] and there is strong evidence that they are a new class of extraterrestrial material not represented in the meteorite collection [3,4]. However, CPA's may be related to carbonaceous chondrites and in fact, both may be part of a continuum of primitive extraterrestrial materials [5]. The importance of CPA's stems from suggestions that they are very primitive solar system material possibly derived from early formed proto planets, chondritic parent bodies, or comets [3, 6]. To better understand the origin and evolution of these particles, we have attempted to summarize all of the mineralogical data on identified CPA's published since about 1976.
Resumo:
A pressing cost issue facing construction is the procurement of off-site pre-manufactured assemblies. In order to encourage Australian adoption of off-site manufacture (OSM), a new approach to underlying processes is required. The advent of object oriented digital models for construction design assumes intelligent use of data. However, the construction production system relies on traditional methods and data sources and is expected to benefit from the application of well-established business process management techniques. The integration of the old and new data sources allows for the development of business process models which, by capturing typical construction processes involving OSM, provides insights into such processes. This integrative approach is the foundation of research into the use of OSM to increase construction productivity in Australia. The purpose of this study is to develop business process models capturing the procurement, resources and information flow of construction projects. For each stage of the construction value chain, a number of sub-processes are identified. Business Process Modelling Notation (BPMN), a mainstream business process modelling standard, is used to create base-line generic construction process models. These models identify OSM decision-making points that could provide cost reductions in procurement workflow and management systems. This paper reports on phase one of an on-going research aiming to develop a proto-type workflow application that can provide semi-automated support to construction processes involving OSM and assist in decision-making in the adoption of OSM thus contributing to a sustainable built environment.
Resumo:
We blend research from human-computer interface (HCI) design with computational based crypto- graphic provable security. We explore the notion of practice-oriented provable security (POPS), moving the focus to a higher level of abstraction (POPS+) for use in providing provable security for security ceremonies involving humans. In doing so we high- light some challenges and paradigm shifts required to achieve meaningful provable security for a protocol which includes a human. We move the focus of security ceremonies from being protocols in their context of use, to the protocols being cryptographic building blocks in a higher level protocol (the security cere- mony), which POPS can be applied to. In order to illustrate the need for our approach, we analyse both a protocol proven secure in theory, and a similar proto- col implemented by a �nancial institution, from both HCI and cryptographic perspectives.