936 resultados para Cryptographic Protocols, Provable Security, ID-Based Cryptography
Resumo:
As part of a European initiative (EuroVacc), we report the design, construction, and immunogenicity of two HIV-1 vaccine candidates based on a clade C virus strain (CN54) representing the current major epidemic in Asia and parts of Africa. Open reading frames encoding an artificial 160-kDa GagPolNef (GPN) polyprotein and the external glycoprotein gp120 were fully RNA and codon optimized. A DNA vaccine (DNA-GPN and DNA-gp120, referred to as DNA-C), and a replication-deficient vaccinia virus encoding both reading frames (NYVAC-C), were assessed regarding immunogenicity in Balb/C mice. The intramuscular administration of both plasmid DNA constructs, followed by two booster DNA immunizations, induced substantial T-cell responses against both antigens as well as Env-specific antibodies. Whereas low doses of NYVAC-C failed to induce specific CTL or antibodies, high doses generated cellular as well as humoral immune responses, but these did not reach the levels seen following DNA vaccination. The most potent immune responses were detectable using prime:boost protocols, regardless of whether DNA-C or NYVAC-C was used as the priming or boosting agent. These preclinical findings revealed the immunogenic response triggered by DNA-C and its enhancement by combining it with NYVAC-C, thus complementing the macaque preclinical and human phase I clinical studies of EuroVacc.
Resumo:
Postmortem MRI (PMMR) examinations are seldom performed in legal medicine due to long examination times, unfamiliarity with the technique, and high costs. Furthermore, it is difficult to obtain access to an MRI device used for patients in clinical settings to image an entire human body. An alternative is available: ex situ organ examination. To our knowledge, there is no standardized protocol that includes ex situ organ preparation and scanning parameters for postmortem MRI. Thus, our objective was to develop a standard procedure for ex situ heart PMMR examinations. We also tested the oily contrast agent Angiofil® commonly used for PMCT angiography, for its applicability in MRI. We worked with a 3 Tesla MRI device and 32-channel head coils. Twelve porcine hearts were used to test different materials to find the best way to prepare and place organs in the device and to test scanning parameters. For coronary MR angiography, we tested different mixtures of Angiofil® and different injection materials. In a second step, 17 human hearts were examined to test the procedure and its applicability to human organs. We established two standardized protocols: one for preparation of the heart and another for scanning parameters based on experience in clinical practice. The established protocols enabled a standardized technical procedure with comparable radiological images, allowing for easy radiological reading. The performance of coronary MR angiography enabled detailed coronary assessment and revealed the utility of Angiofil® as a contrast agent for PMMR. Our simple, reproducible method for performing heart examinations ex situ yields high quality images and visualization of the coronary arteries.
Resumo:
OBJECTIVE: To compare outcomes of patients with lymph node (LN)-positive urothelial carcinoma of the bladder (UCB) treated with or without cisplatin-based combined adjuvant chemotherapy (AC) after radical cystectomy (RC). PATIENTS AND METHODS: We retrospectively analysed 1523 patients with LN-positive UCB, who underwent RC with bilateral pelvic LN dissection. All patients had no evidence of disease after RC. AC was administered within 3 months. Competing-risks models were applied to compare UCB-related mortality. RESULTS: Of the 1523 patients, 874 (57.4%) received AC. The cumulative 1-, 2- and 5-year UCB-related mortality rates for all patients were 16%, 36% and 56%, respectively. Administration of AC was associated with an 18% relative reduction in the risk of UCB-related death (subhazard ratio 0.82, P = 0.005). The absolute reduction in mortality was 3.5% at 5 years. The positive effect of AC was detectable in patients aged ≤70 years, in women, in pT3-4 disease, and in those with a higher LN density and lymphovascular invasion. This study is limited by its retrospective and non-randomised design, selection bias, the absence of central pathological review and lack in standardisation of LN dissection and cisplatin-based protocols. CONCLUSION: AC seems to reduce UCB-related mortality in patients with LN-positive UCB after RC. Younger patients, women and those with high-risk features such as pT3-4 disease, a higher LN density and lymphovascular invasion appear to benefit most. Appropriately powered prospective randomised trials are necessary to confirm these findings.
Resumo:
This article envisions the use of context-awareness to improve single sign-on solutions (SSO) for mobile users. The attribute-based SSO is expected to increase users' perceived ease of use of the system and service providers' authentication security of the application. From these two features we derive two value propositions for a new business model for mobile platforms. The business model can be considered as an instantiation of the privacy-friendly business model pattern presented in our previous work, reinforcing our claim that privacy-friendly value propositions are possible and can be used to obtain a competitive advantage.
Resumo:
Multicast is one method to transfer information in IPv4 based communication. Other methods are unicast and broadcast. Multicast is based on the group concept where data is sent from one point to a group of receivers and this remarkably saves bandwidth. Group members express an interest to receive data by using Internet Group Management Protocol and traffic is received by only those receivers who want it. The most common multicast applications are media streaming applications, surveillance applications and data collection applications. There are many data security methods to protect unicast communication that is the most common transfer method in Internet. Popular data security methods are encryption, authentication, access control and firewalls. The characteristics of multicast such as dynamic membership cause that all these data security mechanisms can not be used to protect multicast traffic. Nowadays the protection of multicast traffic is possible via traffic restrictions where traffic is allowed to propagate only to certain areas. One way to implement this is packet filters. Methods tested in this thesis are MVR, IGMP Filtering and access control lists which worked as supposed. These methods restrict the propagation of multicast but are laborious to configure in a large scale. There are also a few manufacturerspecific products that make possible to encrypt multicast traffic. These separate products are expensive and mainly intended to protect video transmissions via satellite. Investigation of multicast security has taken place for several years and the security methods that will be the results of the investigation are getting ready. An IETF working group called MSEC is standardizing these security methods. The target of this working group is to standardize data security protocols for multicast during 2004.
Resumo:
Mobile technologies have brought about major changes in police equipment and police work. If a utopian narrative remains strongly linked to the adoption of new technologies, often formulated as 'magic bullets' to real occupational problems, there are important tensions between their 'imagined' outcomes and the (unexpected) effects that accompany their daily 'practical' use by police officers. This article offers an analysis of police officers' perceptions and interactions with security devices. In so doing, it develops a conceptual typology of strategies for coping with new technology inspired by Le Bourhis and Lascoumes: challenging, neutralizing and diverting. To that purpose, we adopt an ethnographic approach that focuses on the discourses, practices and actions of police officers in relation to three security devices: the mobile digital terminal, the mobile phone and the body camera. Based on a case study of a North American municipal police department, the article addresses how these technological devices are perceived and experienced by police officers on the beat.
Resumo:
Introduction: The Violence Medical Unit (VMU), a specialised forensic medical consultation, was created at the Lausanne university Hospital in 2006. All patients consulting at the ED for interpersonal violencerelated injury are referred to the VMU, which provides forensic documentation of the injury and referral to the relevant community based victim-support organisations within 48 hours of the ED visit. This frees the ED medical staff from forensic injury documentation and legal/social referral, tasks for which they lack both time and training. Among community violence, assaults by nightclub security agents against patrons have increased from 6% to 10% between 2007 and 2009. We set out to characterise the demographics, assault mechanisms, subsequent injuries, prior alcohol intake and ED & VMU costs incurred by this group of patients. Methods: We retrospectively included all patients consulting at the VMU due to assault by nightclub security agents from January 2007 to December 2009. Data was obtained from ED & VMU medical, nursing and administrative records. Results: Our sample included 70 patients, of which 64 were referred by the CHUV ED. The victims were typically young (median age 29) males (93%). 77% of assaults occurred on the weekend between 12 PM and 4 AM, and 73% of the victims were under the influence of alcohol. 83% of the patients were punched, kicked and/or head-butted; 9% had been struck with a blunt instrument. 80% of the injuries were in the head and neck area and 19% of the victims sustained fractures. 21% of the victims were prescribed medical leave. Total ED & VMU costs averaged 1048 SFr. Conclusion: Medical staff treating this population of assault victims must be aware of the assault mechanisms and injury patterns, in particular the high probability of fractures, in order to provide adequate diagnosis and care. Associated inebriation mandates liberal use of radiology, as delayed or missed diagnosis may have medical, medicolegal and legal implications. Emergency medical services play an important role in detecting and reporting of such incidents. Centralised management of the forensic documentation facilitates referral to victim support organisations and epidemiological data collection. Magnitudes and trends of the different types of violence can be determined, and this information can be then impact public safety management policies.
Resumo:
JXTA is a mature set of open protocols, with morethan 10 years of history, that enable the creation and deployment of peer-to-peer (P2P) networks, allowing the execution of services in a distributed manner. Throughout its lifecycle, ithas slowly evolved in order to appeal a broad set of different applications. Part of this evolution includes providing basic security capabilities in its protocols in order to achieve some degree of message privacy and authentication. However, undersome contexts, more advanced security requirements should be met, such as anonymity. There are several methods to attain anonymity in generic P2P networks. In this paper, we proposehow to adapt a replicated message-based approach to JXTA, by taking advantage of its idiosyncracies and capabilities.
Resumo:
JXTA is an open peer-to-peer (P2P) protocols specification that, in its about 10 years of history, has slowly evolved to appeal to a broad set of applications. As part of this process,some long awaited security improvements have been included in the latest versions. However, under some contexts, even more advanced security requirements should be met, such as anonymity. Several approaches exist to deploy anonymity in P2P networks, but no perfect solution exists. Even though path-based approaches are quite popular, it is considered that, in dynamicgroups, using a split message-based one is better. In this work, we propose an anonymity service for JXTA using such approach. The proposal takes advantage JXTA's core services, in a manner so that it can be easily integrated to existing end applications and services.
Resumo:
The extension of traditional data mining methods to time series has been effectively applied to a wide range of domains such as finance, econometrics, biology, security, and medicine. Many existing mining methods deal with the task of change points detection, but very few provide a flexible approach. Querying specific change points with linguistic variables is particularly useful in crime analysis, where intuitive, understandable, and appropriate detection of changes can significantly improve the allocation of resources for timely and concise operations. In this paper, we propose an on-line method for detecting and querying change points in crime-related time series with the use of a meaningful representation and a fuzzy inference system. Change points detection is based on a shape space representation, and linguistic terms describing geometric properties of the change points are used to express queries, offering the advantage of intuitiveness and flexibility. An empirical evaluation is first conducted on a crime data set to confirm the validity of the proposed method and then on a financial data set to test its general applicability. A comparison to a similar change-point detection algorithm and a sensitivity analysis are also conducted. Results show that the method is able to accurately detect change points at very low computational costs. More broadly, the detection of specific change points within time series of virtually any domain is made more intuitive and more understandable, even for experts not related to data mining.
Resumo:
Peer-reviewed
Resumo:
The purpose of this thesis is to examine how services can be developed and how the voice of the customer can be incorporated to the strategic planning of services. Furthermore, the objective is to investigate the methods of customer need analysis and service bundling. The data is collected from secondary and primary sources by reviewing the existing academic literature and by conducting in-depth interviews and surveys. The main findings of this research indicate that the service development in personal security service industry should be conducted through a formalized process and the process should begin with setting the strategic objectives. Moreover, the voice of the customer should be incorporated into all stages of the development process, especially into the front-end of the process. Furthermore, the information on customer needs should be gathered in a manner tailored for the purposes of service development.