4 resultados para Security Requirement
em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP)
Resumo:
In alveolar macrophages, leukotriene (IT) B(4) and cysteinyl LTs (LTC(4), LTD(4) and LTE(4)) both enhance Fc gamma receptor (Fc gamma R)-mediated phagocytosis. In the present study we investigated the role of specific PKC isoforms (PKC-alpha and -delta), the MAP kinases p38 and ERK 1/2, and PI3K in mediating the potentiation of Fc gamma R-mediated phagocytosis induced by addition of leukotrienes to the AMs. It was found that exogenously added LTB(4) and LTD(4) both enhanced PKC-delta and -alpha phosphorylation during Fc gamma R engagement. Studies with isoform-selective inhibitors indicated that exogenous LTB(4) effects were dependent on both PKC-alpha and -delta, while LTD(4) effects were exclusively due to PKC-delta activation. Although both exogenous LTB(4) and LTD(4) enhanced p38 and ERK 1/2 activation, LTB(4) required only ERK 1/2, while LTD(4) required only p38 activation. Activation by both LTs was dependent on PI3K activation. Effects of endogenous LTs on kinase activation were also investigated using selective LT receptor antagonists. Endogenous LTB(4) contributed to Fc gamma R-mediated activation of PKC-alpha, ERK 1/2 and PI3K, while endogenous cysLTs contributes to activation of PKC-delta, p38 and PI3K. Taken together, our data show that the capacities of LTB(4) and LTD(4) to enhance Fc gamma R-mediated phagocytosis reflect their differential activation of specific kinase programs. (C) 2008 Elsevier Ltd. All rights reserved.
Resumo:
Security administrators face the challenge of designing, deploying and maintaining a variety of configuration files related to security systems, especially in large-scale networks. These files have heterogeneous syntaxes and follow differing semantic concepts. Nevertheless, they are interdependent due to security services having to cooperate and their configuration to be consistent with each other, so that global security policies are completely and correctly enforced. To tackle this problem, our approach supports a comfortable definition of an abstract high-level security policy and provides an automated derivation of the desired configuration files. It is an extension of policy-based management and policy hierarchies, combining model-based management (MBM) with system modularization. MBM employs an object-oriented model of the managed system to obtain the details needed for automated policy refinement. The modularization into abstract subsystems (ASs) segment the system-and the model-into units which more closely encapsulate related system components and provide focused abstract views. As a result, scalability is achieved and even comprehensive IT systems can be modelled in a unified manner. The associated tool MoBaSeC (Model-Based-Service-Configuration) supports interactive graphical modelling, automated model analysis and policy refinement with the derivation of configuration files. We describe the MBM and AS approaches, outline the tool functions and exemplify their applications and results obtained. Copyright (C) 2010 John Wiley & Sons, Ltd.
Resumo:
Policy hierarchies and automated policy refinement are powerful approaches to simplify administration of security services in complex network environments. A crucial issue for the practical use of these approaches is to ensure the validity of the policy hierarchy, i.e. since the policy sets for the lower levels are automatically derived from the abstract policies (defined by the modeller), we must be sure that the derived policies uphold the high-level ones. This paper builds upon previous work on Model-based Management, particularly on the Diagram of Abstract Subsystems approach, and goes further to propose a formal validation approach for the policy hierarchies yielded by the automated policy refinement process. We establish general validation conditions for a multi-layered policy model, i.e. necessary and sufficient conditions that a policy hierarchy must satisfy so that the lower-level policy sets are valid refinements of the higher-level policies according to the criteria of consistency and completeness. Relying upon the validation conditions and upon axioms about the model representativeness, two theorems are proved to ensure compliance between the resulting system behaviour and the abstract policies that are modelled.
Structural requirement for PPAR gamma binding revealed by a meta analysis of holo-crystal structures
Resumo:
PPAR gamma is a ligand regulated transcriptional factor that modulates the transcription of several genes involved in fat and sugar metabolism. Due to its easy bacterial expression and crystallization, several crystal structures of holo-PPAR gamma have been reported and deposited in the Protein Data Bank. Here, we investigated the three-dimensional electrostatic properties of 55 PPAR gamma ligands and used this information for clustering them through principal component analysis. We found out that, according to their electrostatic potential, these ligands can be separated in three groups, with different binding features. We also observed that non-selective and selective ligands show different 3D electrostatic properties and are separated in different clusters. The relevance of this analysis for the development of new binders is discussed. (C) 2010 Elsevier Masson SAS. All rights reserved.