5 resultados para role based access control
em Duke University
Resumo:
Previously developed models for predicting absolute risk of invasive epithelial ovarian cancer have included a limited number of risk factors and have had low discriminatory power (area under the receiver operating characteristic curve (AUC) < 0.60). Because of this, we developed and internally validated a relative risk prediction model that incorporates 17 established epidemiologic risk factors and 17 genome-wide significant single nucleotide polymorphisms (SNPs) using data from 11 case-control studies in the United States (5,793 cases; 9,512 controls) from the Ovarian Cancer Association Consortium (data accrued from 1992 to 2010). We developed a hierarchical logistic regression model for predicting case-control status that included imputation of missing data. We randomly divided the data into an 80% training sample and used the remaining 20% for model evaluation. The AUC for the full model was 0.664. A reduced model without SNPs performed similarly (AUC = 0.649). Both models performed better than a baseline model that included age and study site only (AUC = 0.563). The best predictive power was obtained in the full model among women younger than 50 years of age (AUC = 0.714); however, the addition of SNPs increased the AUC the most for women older than 50 years of age (AUC = 0.638 vs. 0.616). Adapting this improved model to estimate absolute risk and evaluating it in prospective data sets is warranted.
Resumo:
Secure Access For Everyone (SAFE), is an integrated system for managing trust
using a logic-based declarative language. Logical trust systems authorize each
request by constructing a proof from a context---a set of authenticated logic
statements representing credentials and policies issued by various principals
in a networked system. A key barrier to practical use of logical trust systems
is the problem of managing proof contexts: identifying, validating, and
assembling the credentials and policies that are relevant to each trust
decision.
SAFE addresses this challenge by (i) proposing a distributed authenticated data
repository for storing the credentials and policies; (ii) introducing a
programmable credential discovery and assembly layer that generates the
appropriate tailored context for a given request. The authenticated data
repository is built upon a scalable key-value store with its contents named by
secure identifiers and certified by the issuing principal. The SAFE language
provides scripting primitives to generate and organize logic sets representing
credentials and policies, materialize the logic sets as certificates, and link
them to reflect delegation patterns in the application. The authorizer fetches
the logic sets on demand, then validates and caches them locally for further
use. Upon each request, the authorizer constructs the tailored proof context
and provides it to the SAFE inference for certified validation.
Delegation-driven credential linking with certified data distribution provides
flexible and dynamic policy control enabling security and trust infrastructure
to be agile, while addressing the perennial problems related to today's
certificate infrastructure: automated credential discovery, scalable
revocation, and issuing credentials without relying on centralized authority.
We envision SAFE as a new foundation for building secure network systems. We
used SAFE to build secure services based on case studies drawn from practice:
(i) a secure name service resolver similar to DNS that resolves a name across
multi-domain federated systems; (ii) a secure proxy shim to delegate access
control decisions in a key-value store; (iii) an authorization module for a
networked infrastructure-as-a-service system with a federated trust structure
(NSF GENI initiative); and (iv) a secure cooperative data analytics service
that adheres to individual secrecy constraints while disclosing the data. We
present empirical evaluation based on these case studies and demonstrate that
SAFE supports a wide range of applications with low overhead.
Resumo:
Natural killer (NK) cells play an essential role in innate immune control of poxviral infections in vivo. However, the mechanism(s) underlying NK cell activation and function in response to poxviruses remains poorly understood. In a mouse model of infection with vaccinia virus (VV), the most studied member of the poxvirus family, we identified that the Toll-like receptor (TLR) 2-myeloid differentiating factor 88 (MyD88) pathway was critical for the activation of NK cells and the control of VV infection in vivo. We further showed that TLR2 signaling on NK cells, but not on accessory cells such as dendritic cells (DCs), was necessary for NK cell activation and that this intrinsic TLR2-MyD88 signaling pathway was required for NK cell activation and played a critical role in the control of VV infection in vivo. In addition, we showed that the activating receptor NKG2D was also important for efficient NK activation and function, as well as recognition of VV-infected targets. We further demonstrated that VV could directly activate NK cells via TLR2 in the presence of cytokines in vitro and TLR2-MyD88-dependent activation of NK cells by VV was mediated through the phosphatidylinositol 3-kinase (PI3K)-extracellular signal-regulated kinase (ERK) pathway. Taken together, these results represent the first evidence that intrinsic TLR signaling is critical for NK cell activation and function in the control of a viral infection in vivo, indicate that multiple pathways are required for efficient NK cell activation and function in response to VV infection, and may provide important insights into the design of effective strategies to combat poxviral infections.
Association between DNA damage response and repair genes and risk of invasive serous ovarian cancer.
Resumo:
BACKGROUND: We analyzed the association between 53 genes related to DNA repair and p53-mediated damage response and serous ovarian cancer risk using case-control data from the North Carolina Ovarian Cancer Study (NCOCS), a population-based, case-control study. METHODS/PRINCIPAL FINDINGS: The analysis was restricted to 364 invasive serous ovarian cancer cases and 761 controls of white, non-Hispanic race. Statistical analysis was two staged: a screen using marginal Bayes factors (BFs) for 484 SNPs and a modeling stage in which we calculated multivariate adjusted posterior probabilities of association for 77 SNPs that passed the screen. These probabilities were conditional on subject age at diagnosis/interview, batch, a DNA quality metric and genotypes of other SNPs and allowed for uncertainty in the genetic parameterizations of the SNPs and number of associated SNPs. Six SNPs had Bayes factors greater than 10 in favor of an association with invasive serous ovarian cancer. These included rs5762746 (median OR(odds ratio)(per allele) = 0.66; 95% credible interval (CI) = 0.44-1.00) and rs6005835 (median OR(per allele) = 0.69; 95% CI = 0.53-0.91) in CHEK2, rs2078486 (median OR(per allele) = 1.65; 95% CI = 1.21-2.25) and rs12951053 (median OR(per allele) = 1.65; 95% CI = 1.20-2.26) in TP53, rs411697 (median OR (rare homozygote) = 0.53; 95% CI = 0.35 - 0.79) in BACH1 and rs10131 (median OR( rare homozygote) = not estimable) in LIG4. The six most highly associated SNPs are either predicted to be functionally significant or are in LD with such a variant. The variants in TP53 were confirmed to be associated in a large follow-up study. CONCLUSIONS/SIGNIFICANCE: Based on our findings, further follow-up of the DNA repair and response pathways in a larger dataset is warranted to confirm these results.
Resumo:
Multifunctional calcium/calmodulin dependent protein kinases (CaMKs) are key regulators of spine structural plasticity and long-term potentiation (LTP) in neurons. CaMKs have promiscuous and overlapping substrate recognition motifs, and are distinguished in their regulatory role based on differences in the spatiotemporal dynamics of activity. While the function and activity of CaMKII in synaptic plasticity has been extensively studied, that of CaMKI, another major class of CaMK required for LTP, still remain elusive.
Here, we develop a Förster’s Resonance Energy Transfer (FRET) based sensor to measure the spatiotemporal activity dynamics of CaMK1. We monitored CaMKI activity using 2-photon fluorescence lifetime imaging, while inducing LTP in single dendritic spines of rat (Rattus Norvegicus, strain Sprague Dawley) hippocampal CA1 pyramidal neurons using 2-photon glutamate uncaging. Using RNA-interference and pharmacological means, we also characterize the role of CaMKI during spine structural plasticity.
We found that CaMKI was rapidly and transiently activated with a rise time of ~0.3 s and decay time of ~1 s in response to each uncaging pulse. Activity of CaMKI spread out of the spine. Phosphorylation of CaMKI by CaMKK was required for this spreading and for the initial phase of structural LTP. Combined with previous data showing that CaMKII is restricted to the stimulated spine and required for long-term maintenance of structural LTP, these results suggest that CaMK diversity allows the same incoming signal – calcium – to independently regulate distinct phases of LTP by activating different CaMKs with distinct spatiotemporal dynamics.