39 resultados para Security Requirement


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The summit meeting between the two Korean heads of state, which took place in Pyongyang in June 2000, constitutes a major turning point in the peninsula's history. As the effects of the meeting are gradually unfolding, a period of detente no longer seems impossible. But major difficulties remain unsolved and Korea will continue to be one of the world's most volatile areas. The task of this essay is to identify and analyse some of the entrenched political patterns that will challenge policy-makers in the years ahead. To do so it is necessary to portray the conflict in Korea not only in conventional ideological and geopolitical terms, but also, and primarily, as a question of identity. From such a vantage-point two components are essential in the search for a more peaceful peninsula. Substantial progress has recently been made in the first realm, the need to approach security problems, no matter how volatile they seem. in a cooperative and dialogical, rather than merely a coercive manner. The second less accepted but perhaps more important factor, revolves around the necessity to recognize that dialogue has its limits, that the party on the other side of the DMZ cannot always be accommodated or subsumed into compromise. Needed is an ethics of difference: a willingness to accept that the other's sense of identity and politics may be inherently incompatible with one's own.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Reviews the book 'Asia Pacific Security Outlook 2000,' edited by Richard W. Baker and Charles M. Morrison.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Keratinocytes expressing the human papillomavirus (HPV) type 16 E7 protein, as a transgene driven by the K14 promoter, form a murine model of HPV-mediated epithelial cancers in humans. Our previous studies have shown that K14E7 transgenic skin grafts onto syngeneic mice are not susceptible to immune destruction despite the demonstrated presence of a strong, systemic CTL response directed against the E7 protein. Consistent with this finding, we now show that cultured, E7 transgenic keratinocytes (KC) express comparable endogenous levels of E7 protein to a range of CTL-sensitive E7-expressing cell lines but are not susceptible to CTL-mediated lysis in vitro . E7 transgenic and non-transgenic KC are susceptible to conventional mechanisms of CTL-mediated lysis, including perforin and Fas/FasL interaction when an excess of exogenous peptide is provided. The concentration of exogenous peptide required to render a cell susceptible to lysis was similar between KC and other conventional CTL targets (e.g. EL-4), despite large differences in H-2D(b) expression at the cell surface. Furthermore, exposure of KC to IFN-gamma increased H-2D(b) expression, but did not substantially alter the exogenous peptide concentration required to sensitize cells for half maximal lysis. In contrast, the lytic sensitivity of transgenic KC expressing endogenous E7 is modestly improved by exposure to IFN-gamma. Thus, failure of CTL to eliminate KC expressing endogenous E7, and by inference squamous tumours expressing E7, may reflect the need for a sustained, local inflammatory environment during the immune effector phase.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes the inception, planning and first delivery of a security course as part of a postgraduate ecommerce program. The course is reviewed in terms of existing literature on security courses, the common body of knowledge established for security professionals and the job market into which students will graduate. The course described in this paper is a core subject for the e-commerce program. This program was established in 1999 and the first batch of students graduated in 2001. The program is offered at both postgraduate and undergraduate level. The work described here relates to the postgraduate offering. Students on this program are graduates of diverse disciplines and do not have a common e-commerce or business background.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We have previously reported successful trans-complementation of defective Kunjin virus genomic RNAs with a range of large lethal deletions in the nonstructural genes NSI, NS3, and NS5 (A. A. Khromykh et al., J. Virol. 74:3253-3263, 2000). In this study we have mapped further the minimal region in the NS5 gene essential for efficient trans-complementation of genome-length RNAs in repBHK cells to the first 316 of the 905 codons. To allow amplification and easy detection of complemented defective RNAs with deletions apparently affecting virus assembly, we have developed a dual replicon complementation system. In this system defective replicon RNAs with a deletion(s) in the nonstructural genes also encoded the puromycin resistance gene (PAC gene) and the reporter gene for beta-galactosidase (beta-Gal). Complementation of these defective replicon RNAs in repBHK cells resulted in expression of PAC and beta-Gal which allowed establishment of cell lines stably producing replicating defective RNAs by selection with puromycin and comparison of replication efficiencies of complemented defective RNAs by beta-Gal assay. Using this system we demonstrated that deletions in the C-terminal 434 codons of NS3 (codons 178 to 611) were complemented for RNA replication, while any deletions in the first 178 codons were not. None of the genome-length RNAs containing deletions in NS3 shown to be complementable for RNA replication produced secreted defective viruses during complementation in repBHK cells. In contrast, structural proteins produced from these complemented defective RNAs were able to package helper replicon RNA. The results define minimal regions in the NS3 and NS5 genes essential for the formation of complementable replication complex and show a requirement of NS3 in cis for virus assembly.