824 resultados para Key Compromise Impersonation
Resumo:
Three-party password-authenticated key exchange (3PAKE) protocols allow entities to negotiate a secret session key with the aid of a trusted server with whom they share a human-memorable password. Recently, Lou and Huang proposed a simple 3PAKE protocol based on elliptic curve cryptography, which is claimed to be secure and to provide superior efficiency when compared with similar-purpose solutions. In this paper, however, we show that the solution is vulnerable to key-compromise impersonation and offline password guessing attacks from system insiders or outsiders, which indicates that the empirical approach used to evaluate the scheme's security is flawed. These results highlight the need of employing provable security approaches when designing and analyzing PAKE schemes. Copyright (c) 2011 John Wiley & Sons, Ltd.
Resumo:
This chapter attempts to identify some important issues in developing realistic simulation models based on new economic geography, and it suggests a direction for solving the difficulties. Specifically, adopting the IDE Geographical Simulation Model (IDE-GSM) as an example, we discuss some problems in developing a realistic simulation model for East Asia. The first and largest problem in this region is the lack of reliable economic datasets at the sub-national level, and this issue needs to be resolved in the long term. However, to deal with the existing situation in the short term, we utilize some techniques to produce more realistic and reliable simulation models. One key compromise is to use a 'topology' representation of geography, rather than a 'mesh' or 'grid' representation or simple 'straight lines' connecting each city which are used in many other models. In addition to this, a modal choice model that takes into consideration both money and time costs seems to work well.
Resumo:
Heat shock protein 90 (Hsp90) is an essential chaperone involved in the fungal stress response that can be harnessed as a novel antifungal target for the treatment of invasive aspergillosis. We previously showed that genetic repression of Hsp90 reduced Aspergillus fumigatus virulence and potentiated the effect of the echinocandin caspofungin. In this study, we sought to identify sites of posttranslational modifications (phosphorylation or acetylation) that are important for Hsp90 function in A. fumigatus. Phosphopeptide enrichment and tandem mass spectrometry revealed phosphorylation of three residues in Hsp90 (S49, S288, and T681), but their mutation did not compromise Hsp90 function. Acetylation of lysine residues of Hsp90 was recovered after treatment with deacetylase inhibitors, and acetylation-mimetic mutations (K27A and K271A) resulted in reduced virulence in a murine model of invasive aspergillosis, supporting their role in Hsp90 function. A single deletion of lysine K27 or an acetylation-mimetic mutation (K27A) resulted in increased susceptibility to voriconazole and caspofungin. This effect was attenuated following a deacetylation-mimetic mutation (K27R), suggesting that this site is crucial and should be deacetylated for proper Hsp90 function in antifungal resistance pathways. In contrast to previous reports in Candida albicans, the lysine deacetylase inhibitor trichostatin A (TSA) was active alone against A. fumigatus and potentiated the effect of caspofungin against both the wild type and an echinocandin-resistant strain. Our results indicate that the Hsp90 K27 residue is required for azole and echinocandin resistance in A. fumigatus and that deacetylase inhibition may represent an adjunctive anti-Aspergillus strategy.
Resumo:
The design, reformulation, and final signing of Plan Colombia by the then US President, Bill Clinton, on the 13 July 2000 initiated in a new era of the US State´s involvement in supposedly sovereign-territorial issues of Colombian politics. The implementation of Plan Colombia there-on-after brought about a major realignment of political-military scales and terrains of conflict that have renewed discourses concerning the contemporary imperialist interests of key US-based but transnationally-projected social forces, leading to arguments that stress the invigorated geo-political dimension of present-day strategies of capitalist accumulation. With the election of Álvaro Uribe Vélez as Colombian President in May 2002 and his pledge to strengthen the national military campaign aganist the region´s longest-surviving insurgency guerrilla group, Las FARC-EP, as well as other guerrilla factions, combined with a new focus on establishing the State project of “Democratic Security”; the military realm of governance and attempts to ensure property security and expanding capitalist investment have attained precedence in Colombia´s national political domains. This working paper examines the interrelated nature of Plan Colombia -as a binational and indeed regional security strategy- and Uribe´s Democratic Security project as a means of showing the manner in which they have worked to pave the way for the implementation of a new “total market” regime of accumulation, based on large-scale agro-industrial investment which is accelerated through processes of accumulation via dispossession. As such, the political and social reconfigurations involved manifest the multifarious scales of governance that become intertwined in incorporating neoliberalism in specific regions of the world economy. Furthermore, the militarisation-securitisation of such policies also illustrate the explicit contradictions of neoliberalism in a peripheral context, where coercion seems to prevail, something which leads to a profound questioning of the extent to which neoliberalism can be thought of as a hegemonic politico-economic project.
Resumo:
Most of the proposed key management protocols for wireless sensor networks (WSNs) in the literature assume that a single base station is used and that the base station is trustworthy. However, there are applications in which multiple base stations are used and the security of the base stations must be considered. This paper investigates a key management protocol in wireless sensor networks which include multiple base stations. We consider the situations in which both the base stations and the sensor nodes can be compromised. The proposed key management protocol, mKeying, includes two schemes, a key distribution scheme, mKeyDist, supporting multiple base stations in the network, and a key revocation scheme, mKeyRev, used to efficiently remove the compromised nodes from the network. Our analyses show that the proposed protocol is efficient and secure against the compromise of the base stations and the sensor nodes.
Resumo:
With the advent of cloud computing, many applications have embraced the ensuing paradigm shift towards modern distributed key-value data stores, like HBase, in order to benefit from the elastic scalability on offer. However, many applications still hesitate to make the leap from the traditional relational database model simply because they cannot compromise on the standard transactional guarantees of atomicity, isolation, and durability. To get the best of both worlds, one option is to integrate an independent transaction management component with a distributed key-value store. In this paper, we discuss the implications of this approach for durability. In particular, if the transaction manager provides durability (e.g., through logging), then we can relax durability constraints in the key-value store. However, if a component fails (e.g., a client or a key-value server), then we need a coordinated recovery procedure to ensure that commits are persisted correctly. In our research, we integrate an independent transaction manager with HBase. Our main contribution is a failure recovery middleware for the integrated system, which tracks the progress of each commit as it is flushed down by the client and persisted within HBase, so that we can recover reliably from failures. During recovery, commits that were interrupted by the failure are replayed from the transaction management log. Importantly, the recovery process does not interrupt transaction processing on the available servers. Using a benchmark, we evaluate the impact of component failure, and subsequent recovery, on application performance.
Resumo:
Calling the Single Resolution Mechanism an “inelegant step in the right direction”, this Commentary singles out the Single Resolution Fund, with its considerable mutualisation of risk, as the key advance – but one that will require changes over time in the extremely complex decision-making mechanisms agreed.
Resumo:
Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.
Resumo:
IKK epsilon (IKKε) is induced by the activation of nuclear factor-κB (NF-κB). Whole-body IKKε knockout mice on a high-fat diet (HFD) were protected from insulin resistance and showed altered energy balance. We demonstrate that IKKε is expressed in neurons and is upregulated in the hypothalamus of obese mice, contributing to insulin and leptin resistance. Blocking IKKε in the hypothalamus of obese mice with CAYMAN10576 or small interfering RNA decreased NF-κB activation in this tissue, relieving the inflammatory environment. Inhibition of IKKε activity, but not TBK1, reduced IRS-1(Ser307) phosphorylation and insulin and leptin resistance by an improvement of the IR/IRS-1/Akt and JAK2/STAT3 pathways in the hypothalamus. These improvements were independent of body weight and food intake. Increased insulin and leptin action/signaling in the hypothalamus may contribute to a decrease in adiposity and hypophagia and an enhancement of energy expenditure accompanied by lower NPY and increased POMC mRNA levels. Improvement of hypothalamic insulin action decreases fasting glycemia, glycemia after pyruvate injection, and PEPCK protein expression in the liver of HFD-fed and db/db mice, suggesting a reduction in hepatic glucose production. We suggest that IKKε may be a key inflammatory mediator in the hypothalamus of obese mice, and its hypothalamic inhibition improves energy and glucose metabolism.
Biased Random-key Genetic Algorithms For The Winner Determination Problem In Combinatorial Auctions.
Resumo:
Abstract In this paper, we address the problem of picking a subset of bids in a general combinatorial auction so as to maximize the overall profit using the first-price model. This winner determination problem assumes that a single bidding round is held to determine both the winners and prices to be paid. We introduce six variants of biased random-key genetic algorithms for this problem. Three of them use a novel initialization technique that makes use of solutions of intermediate linear programming relaxations of an exact mixed integer-linear programming model as initial chromosomes of the population. An experimental evaluation compares the effectiveness of the proposed algorithms with the standard mixed linear integer programming formulation, a specialized exact algorithm, and the best-performing heuristics proposed for this problem. The proposed algorithms are competitive and offer strong results, mainly for large-scale auctions.
Resumo:
12 Suppl 1
Resumo:
As hypoxia-induced inflammatory angiogenesis may contribute to sickle cell disease manifestations, we compared the angiogenic molecular profiles of plasma from sickle cell disease individuals and correlated these with in vitro endothelial cell-mediated angiogenesis-stimulating activity and in vivo neovascularization. Bioplex demonstrated that plasma from steady-state sickle cell anemia patients presented elevated concentrations of pro-angiogenic factors (Angiopoietin-1, basic fibroblast growth factor, vascular endothelial growth factor, vascular endothelial growth factor-D and placental growth factor) and displayed potent pro-angiogenic activity, significantly augmenting endothelial cell proliferation, migration and capillary-like structure formation. In vivo neovascularization of Matrigel plugs was significantly greater in sickle cell disease mice, compared with non-sickle cell disease mice, consistent with an upregulation of angiogenesis in the disease. In plasma from patients with hemoglobin SC disease without proliferative retinopathy, anti-angiogenic endostatin and thrombospondin-2 were significantly elevated. In contrast, plasma from hemoglobin SC individuals with proliferative retinopathy displayed a pro-angiogenic profile and had more significant effects on endothelial cell proliferation and capillary formation than plasma of patients without retinopathy. Hydroxyurea therapy was associated with significant reductions in plasma angiogenic factor profile, in association with an inhibition of endothelial cell-mediated angiogenic mechanisms and neovascularization. Thus, sickle cell anemia and retinopathic hemoglobin SC individuals present a highly angiogenic circulating milieu, capable of stimulating key endothelial cell-mediated angiogenic mechanisms. Combination anti-angiogenic therapy for preventing progression of unregulated neovascularization and associated manifestations in sickle cell disease, such as pulmonary hypertension, may be indicated; furthermore, the benefits and drawbacks of the potent anti-angiogenic effects of hydroxyurea should be clarified.
Resumo:
Cancer is a multistep process that begins with the transformation of normal epithelial cells and continues with tumor growth, stromal invasion and metastasis. The remodeling of the peritumoral environment is decisive for the onset of tumor invasiveness. This event is dependent on epithelial-stromal interactions, degradation of extracellular matrix components and reorganization of fibrillar components. Our research group has studied in a new proposed rodent model the participation of cellular and molecular components in the prostate microenvironment that contributes to cancer progression. Our group adopted the gerbil Meriones unguiculatus as an alternative experimental model for prostate cancer study. This model has presented significant responses to hormonal treatments and to development of spontaneous and induced neoplasias. The data obtained indicate reorganization of type I collagen fibers and reticular fibers, synthesis of new components such as tenascin and proteoglycans, degradation of basement membrane components and elastic fibers and increased expression of metalloproteinases. Fibroblasts that border the region, apparently participate in the stromal reaction. The roles of each of these events, as well as some signaling molecules, participants of neoplastic progression and factors that promote genetic reprogramming during epithelial-stromal transition are also discussed.
Resumo:
535
Resumo:
In the first paper of this series (Albuquerque & Brandão, 2004) we revised the Vezenyii species group of the exclusively Neotropical solenopsidine (Myrmicinae) ant genus Oxyepoecus. In this closing paper we update distribution information on the Vezenyii group species and revise the other Oxyepoecus species-group (Rastratus). We describe two species (Oxyepoecus myops n. sp. and O. rosai n. sp.) and redescribe previously known species of the group [O. daguerrei (Santschi, 1933), O. mandibularis (Emery, 1913), O. plaumanni Kempf, 1974, O. rastratus Mayr, 1887, and O. reticulatus Kempf, 1974], adding locality records and comments on the meagre biological data of these species. We also present an identification key to Oxyepoecus species based on workers.