889 resultados para Medium Access Control (MAC)
Resumo:
Background: Infection with EBV and a lack in vitamin D may be important environmental triggers of MS. 1,25-(OH)2D3 mediates a shift of antigen presenting cells (APC) and CD4+ T cells to a less inflammatory profile. Although CD8+ T cells do express the vitamin D receptor, a direct effect of 1,25(OH)2D3 on these cells has not been demonstrated until now. Since CD8+ T cells are important immune mediators of the inflammatory response in MS, we examined whether vitamin D directly affects the CD8+ T cell response, and more specifically if it modulates the EBV-specific CD8+ T cell response. Material and Methods: To explore whether the vitamin D status may influence the pattern of the EBV-specific CD8+ T cell response, PBMC of 10 patients with early MS and 10 healthy controls (HC) were stimulated with a pool of immunodominant 8-10 mer peptide epitopes known to elicit CD8+ T cell responses. PBMC were stimulated with this EBV CD8 peptide pool, medium (negative control) or anti- CD3/anti-CD28 beads (positive control). The following assays were performed: ELISPOT to assess the secretion of IFN-gamma by T cells in general; cytometric beads array (CBA) and ELISA to determine whichcytokines were released by EBV-specific CD8+ T cells after six days of culture; and intracellular cytokine staining assay to determine by which subtype of T cells secreted given cytokines. To examine whether vitamin D could directly modulate CD8+ T cell immune responses, we depleted CD4+ T cells using negative selection. Results: We found that pre-treatment of vitamin D had an antiinflammatory action on both EBV-specific CD8+ T cells and on CD3/ CD28-stimulated T cells: secretion of pro-inflammatory cytokines (IFNgamma and TNF-alpha) was decreased, whereas secretion of antiinflammatory cytokines (IL-5 and TGF-beta) was increased. At baseline, CD8+ T cells of early MS patients showed a higher secretion of TNFalpha and lower secretion of IL-5. Addition of vitamin D did not restore the same levels of both cytokines as compared to HC. Vitamin D-pretreated CD8+T cells exhibited a decreased secretion of IFN-gamma and TNF-alpha, even after depletion of CD4+ T cells from culture. Conclusion: Vitamin D has a direct anti-inflammatory effect on CD8+ T cells independently from CD4+ T cells. CD8+ T cells of patients with earlyMS are less responsive to the inflammatory effect of vitamin D than HC, pointing toward an intrinsic dysregulation of CD8+ T cells. The modulation of EBV-specific CD8+T cells by vitaminDsuggests that there may be interplay between these twomajor environmental factors of MS. This study was supported by a grant from the Swiss National Foundation (PP00P3-124893), and by an unrestricted research grant from Bayer to RDP.
Resumo:
L’avénement des réseaux sociaux, tel que Facebook, MySpace et LinkedIn, a fourni une plateforme permettant aux individus de rester facilement connectés avec leurs amis, leurs familles ou encore leurs collègues tout en les encourageant activement à partager leurs données personnelles à travers le réseau. Avec la richesse des activités disponibles sur un réseau social, la quantité et la variété des informations personnelles partagées sont considérables. De plus, de part leur nature numérique, ces informations peuvent être facilement copiées, modifiées ou divulguées sans le consentement explicite de leur propriétaire. Ainsi, l’information personnelle révélée par les réseaux sociaux peut affecter de manière concrète la vie de leurs utilisateurs avec des risques pour leur vie privée allant d’un simple embarras à la ruine complète de leur réputation, en passant par l’usurpation d’identité. Malheureusement, la plupart des utilisateurs ne sont pas conscients de ces risques et les outils mis en place par les réseaux sociaux actuels ne sont pas suffisants pour protéger efficacement la vie privée de leurs utilisateurs. En outre, même si un utilisateur peut contrôler l’accès à son propre profil, il ne peut pas contrôler ce que les autres révèlent à son sujet. En effet, les “amis” d’un utilisateur sur un réseau social peuvent parfois révéler plus d’information à son propos que celui-ci ne le souhaiterait. Le respect de la vie privée est un droit fondamental pour chaque individu. Nous pré- sentons dans cette thèse une approche qui vise à accroître la prise de conscience des utilisateurs des risques par rapport à leur vie privée et à maintenir la souveraineté sur leurs données lorsqu’ils utilisent un réseau social. La première contribution de cette thèse réside dans la classification des risques multiples ainsi que les atteintes à la vie privée des utilisateurs d’un réseau social. Nous introduisons ensuite un cadre formel pour le respect de la vie privée dans les réseaux sociaux ainsi que le concept de politique de vie privée (UPP). Celle-ci définie par l’utilisateur offre une manière simple et flexible de spécifier et communiquer leur attentes en terme de respect de la vie privée à d’autres utilisateurs, tiers parties ainsi qu’au fournisseur du réseau social. Par ailleurs, nous dé- finissons une taxonomie (possiblement non-exhaustive) des critères qu’un réseau social peut intégrer dans sa conception pour améliorer le respect de la vie privée. En introduisant le concept de réseau social respectueux de la vie privée (PSNS), nous proposons Privacy Watch, un réseau social respectueux de la vie privée qui combine les concepts de provenance et d’imputabilité afin d’aider les utilisateurs à maintenir la souveraineté sur leurs données personnelles. Finalement, nous décrivons et comparons les différentes propositions de réseaux sociaux respectueux de la vie privée qui ont émergé récemment. Nous classifions aussi ces différentes approches au regard des critères de respect de la vie privée introduits dans cette thèse.
Resumo:
In dieser Arbeit wird ein generisches Modell fuer synchrone Gruppenarbeit auf gemeinsamen Informationsraeumen entwickelt. Fuer die Entwicklung dieses Modells muessen die Grundfunktionen fuer Anwendungen der synchronen Gruppenarbeit realisiert werden. Neben der Modellierung des Datenraumes (Datenmodell) und der operationellen Schnittstelle (Interaktionsmodell), muessen Mechanismen fuer die Darstellung der Aktivitaeten der Gruppenmitglieder auf dem Informationsraum (Awareness), sowie fuer die Synchronisierung gleichzeitiger Zugriffe verschiedener Benutzer auf dem Datenraum realisiert werden (Nebenlaeufgkeitskontrolle). Das Grundproblem bei der Loesung der Nebenlaeufigkeit liegt bei der Aufgabe der Isolation aus den klassischen ACID-Transaktionen zu gunsten von Awareness. Die rapide Entwicklung von Techniken der mobilen Kommunikation ermoeglicht den Einsatz dieser Geraete fuer den Zugriff auf Daten im Internet. Durch UMTSund WLAN-Technologien koennen Mobilgeraete fuer Anwendungen ueber die reine Kommunikation hinaus eingesetzt werden. Eine natuerliche Folge dieser Entwicklung sind Anwendungen fuer die Zusammenarbeit mehrerer Benutzer. In der Arbeit wird daher auf die Unterstuetzung mobiler Geraete besonderen Wert gelegt. Die Interaktion der Benutzer auf den gemeinsamen Datenraum wird durch einfache Navigationsoperationen mit einem Cursor (Finger) realisiert, wobei der Datenraum durch XML-Dokumente dargestellt wird. Die Visualisierung basiert auf der Transformierung von XML-Dokumenten in andere XML-basierte Sprachen wie HTML oder SVG durch XSLT-Stylesheets. Awareness-Informationen werden, aehnlich dem Fokus/Nimbus-Modell, von der Interaktion der Benutzer und der Ermittlung der sichtbaren Objekte bei dem Benutzer hergeleitet. Fuer eine geeignete Kontrolle der Nebenlaeufigkeit wurde der Begriff der visuellen Transaktion eingefuehrt, wo die Auswirkungen einer Transaktion von anderen Benutzern (Transaktionen) beobachtet werden koennen. Die Synchronisierung basiert auf einem Sperrverfahren und der Einfuehrung der neuen W-Sperre und der Grundoperationen readV und writeV. Das Modell (Groupware-Server) wird in der Arbeit in einem Prototyp implementiert. Weiterhin wird eine Java-Anwendung sowohl auf einem Desktop PC als auch auf einem Pocket PC (iPAQ 3970) implementiert, welche die Einsetzbarkeit dieses Prototyps demonstriert.
Resumo:
Die ubiquitäre Datenverarbeitung ist ein attraktives Forschungsgebiet des vergangenen und aktuellen Jahrzehnts. Es handelt von unaufdringlicher Unterstützung von Menschen in ihren alltäglichen Aufgaben durch Rechner. Diese Unterstützung wird durch die Allgegenwärtigkeit von Rechnern ermöglicht die sich spontan zu verteilten Kommunikationsnetzwerken zusammen finden, um Informationen auszutauschen und zu verarbeiten. Umgebende Intelligenz ist eine Anwendung der ubiquitären Datenverarbeitung und eine strategische Forschungsrichtung der Information Society Technology der Europäischen Union. Das Ziel der umbebenden Intelligenz ist komfortableres und sichereres Leben. Verteilte Kommunikationsnetzwerke für die ubiquitäre Datenverarbeitung charakterisieren sich durch Heterogenität der verwendeten Rechner. Diese reichen von Kleinstrechnern, eingebettet in Gegenstände des täglichen Gebrauchs, bis hin zu leistungsfähigen Großrechnern. Die Rechner verbinden sich spontan über kabellose Netzwerktechnologien wie wireless local area networks (WLAN), Bluetooth, oder UMTS. Die Heterogenität verkompliziert die Entwicklung und den Aufbau von verteilten Kommunikationsnetzwerken. Middleware ist eine Software Technologie um Komplexität durch Abstraktion zu einer homogenen Schicht zu reduzieren. Middleware bietet eine einheitliche Sicht auf die durch sie abstrahierten Ressourcen, Funktionalitäten, und Rechner. Verteilte Kommunikationsnetzwerke für die ubiquitäre Datenverarbeitung sind durch die spontane Verbindung von Rechnern gekennzeichnet. Klassische Middleware geht davon aus, dass Rechner dauerhaft miteinander in Kommunikationsbeziehungen stehen. Das Konzept der dienstorienterten Architektur ermöglicht die Entwicklung von Middleware die auch spontane Verbindungen zwischen Rechnern erlaubt. Die Funktionalität von Middleware ist dabei durch Dienste realisiert, die unabhängige Software-Einheiten darstellen. Das Wireless World Research Forum beschreibt Dienste die zukünftige Middleware beinhalten sollte. Diese Dienste werden von einer Ausführungsumgebung beherbergt. Jedoch gibt es noch keine Definitionen wie sich eine solche Ausführungsumgebung ausprägen und welchen Funktionsumfang sie haben muss. Diese Arbeit trägt zu Aspekten der Middleware-Entwicklung für verteilte Kommunikationsnetzwerke in der ubiquitären Datenverarbeitung bei. Der Schwerpunkt liegt auf Middleware und Grundlagentechnologien. Die Beiträge liegen als Konzepte und Ideen für die Entwicklung von Middleware vor. Sie decken die Bereiche Dienstfindung, Dienstaktualisierung, sowie Verträge zwischen Diensten ab. Sie sind in einem Rahmenwerk bereit gestellt, welches auf die Entwicklung von Middleware optimiert ist. Dieses Rahmenwerk, Framework for Applications in Mobile Environments (FAME²) genannt, beinhaltet Richtlinien, eine Definition einer Ausführungsumgebung, sowie Unterstützung für verschiedene Zugriffskontrollmechanismen um Middleware vor unerlaubter Benutzung zu schützen. Das Leistungsspektrum der Ausführungsumgebung von FAME² umfasst: • minimale Ressourcenbenutzung, um auch auf Rechnern mit wenigen Ressourcen, wie z.B. Mobiltelefone und Kleinstrechnern, nutzbar zu sein • Unterstützung für die Anpassung von Middleware durch Änderung der enthaltenen Dienste während die Middleware ausgeführt wird • eine offene Schnittstelle um praktisch jede existierende Lösung für das Finden von Diensten zu verwenden • und eine Möglichkeit der Aktualisierung von Diensten zu deren Laufzeit um damit Fehlerbereinigende, optimierende, und anpassende Wartungsarbeiten an Diensten durchführen zu können Eine begleitende Arbeit ist das Extensible Constraint Framework (ECF), welches Design by Contract (DbC) im Rahmen von FAME² nutzbar macht. DbC ist eine Technologie um Verträge zwischen Diensten zu formulieren und damit die Qualität von Software zu erhöhen. ECF erlaubt das aushandeln sowie die Optimierung von solchen Verträgen.
Resumo:
Traditionally, we've focussed on the question of how to make a system easy to code the first time, or perhaps on how to ease the system's continued evolution. But if we look at life cycle costs, then we must conclude that the important question is how to make a system easy to operate. To do this we need to make it easy for the operators to see what's going on and to then manipulate the system so that it does what it is supposed to. This is a radically different criterion for success. What makes a computer system visible and controllable? This is a difficult question, but it's clear that today's modern operating systems with nearly 50 million source lines of code are neither. Strikingly, the MIT Lisp Machine and its commercial successors provided almost the same functionality as today's mainstream sytsems, but with only 1 Million lines of code. This paper is a retrospective examination of the features of the Lisp Machine hardware and software system. Our key claim is that by building the Object Abstraction into the lowest tiers of the system, great synergy and clarity were obtained. It is our hope that this is a lesson that can impact tomorrow's designs. We also speculate on how the spirit of the Lisp Machine could be extended to include a comprehensive access control model and how new layers of abstraction could further enrich this model.
Resumo:
In the B-ISDN there is a provision for four classes of services, all of them supported by a single transport network (the ATM network). Three of these services, the connected oriented (CO) ones, permit connection access control (CAC) but the fourth, the connectionless oriented (CLO) one, does not. Therefore, when CLO service and CO services have to share the same ATM link, a conflict may arise. This is because a bandwidth allocation to obtain maximum statistical gain can damage the contracted ATM quality of service (QOS); and vice versa, in order to guarantee the contracted QOS, the statistical gain have to be sacrificed. The paper presents a performance evaluation study of the influence of the CLO service on a CO service (a circuit emulation service or a variable bit-rate service) when sharing the same link
Resumo:
The aim of this thesis is to describe and analyze the geographical distribution of everyday criminality in the town of Borlänge during the year 2002 and to analyze which measures to be taken in the physical social planning to decrease this everyday criminality there. The term everyday criminality is here to be understood as those categories of crime that appear most frequently in the records of reports to the police every year. Here two kinds of crime have been in focus, thefts from cars and office burglary.In fulfilling this aim two main questions have been answered. The first one is how the everyday criminality was distributed geographically in the town of Borlänge during the year 2002. The second one is which measures to be taken in the physical social planning to decrease this everyday criminality in the town of Borlänge.In order to answer the first question a spatial autocorrelation analysis, Local Moran LISA has been used. This method is based on the measurement Moran´s I and shows the spatial autocorrelation for every single location. To answer the second question three different theories of crime prevention through environmental design have been studied and applied in the analysis. These are Jane Jacobs’ ideas about ”the living city”, Oscar Newman´s ideas about ”defensible space” and Ronald V. Clarke´s theories about crime prevention.The major conclusions that can be drawn from this thesis are that the risk of being exposed to thefts from cars, during the analyzed time period, was highest in Centrum and Hagalund and their surroundings. The lowest risk of being exposed to this type of crime was found in Domnarvet and Islingby, during the year 2002. The highest risk of being a victim of the crime office burglary was found in Hagalund and its surroundings and in the single area of Kvarnsveden. The corresponding lowest risk was found in Lergärdet and its surroundings and in Norra Backa and Kupolen. The measures that should be taken in order to decrease these types of criminality can be divided into overall changes and place-specific changes. When it comes to the crime thefts from cars a more attractive central business district, a better view of parking lots from nearby buildings, dividing of larger parking lot zones into smaller ones, migration of hidden parking lots and stronger access control to parking lots where problems with this kind of crime have occurred have been suggested as overall changes. The corresponding place-specific changes are to remove vegetation that is blocking the view, better lighting and to put up signs with information about increased risk of exposure to crime at parking lots with the most problems. To decrease the amount of office burglaries overall changes as to create a better view of the area from nearby surroundings, move bigger office compartments or divide them into smaller units, rebuild characteristic buildings and increase security by strengthening the access control to offices with these kinds of problems could be useful. Finally there are possibilities to decrease office burglary by using place-specific measures as surveillance cameras combined with signs containing information about these, high fences and better lighting around the buildings where a higher risk of being exposed to this kind of criminality is present.
Resumo:
Rollbaserad åtkomstkontroll är en standardiserad och väl etablerad modell för att hantera åtkomsträttigheter i informationssystem. Den vedertagna ANSI-standarden 359-2004 saknar dock stöd för att geografiskt avgränsa rollbehörigheter. Informationssystem som behandlar geografiska data och de senaste årens ökade spridning av mobila enheter påkallar ett behov av att sådana rumsliga aspekter diskuteras inom kontexten av rollbaserad åtkomstkontroll. Arbetet syftar till att bringa klarhet i hur det befintliga kunskapstillståndet inom ämnesområdet rollbaserad åtkomst kontroll med geografisk avgränsning ser ut, och vilka aspekter hos detta som står i behov av vidare utveckling. Genom de teoretiska referensramar som skapats vid inledande litteraturstudier har en efterföljande systematisk litteraturgenomgång möjliggjorts, där vetenskapligt material selekterats genom fördefinierade urvalskriterier. Sammanställningen och analysen av den systematiska litteraturgenomgångens resultat har i samverkan med de teoretiska referensramarna lett fram till arbetets huvudsakliga kunskapsbidrag: en områdesöversikt där ämnets state-of-the-art presenteras och en strukturerad lista över angelägna forsknings- och utvecklingsbehov inom området.
Resumo:
Information is one of the most valuable organization s assets, mainly on a global and highly competitive world. On this scenery there are two antagonists forces: on one side, organizations struggle for keeping protected its information, specially those considered as strategic, on the other side, the invaders, leaded by innumerous reasons - such as hobby, challenge or one single protest with the intention of capturing and corrupting the information of other organizations. This thesis presents the descriptive results of one research that had as its main objective to identify which variables influence the Executives´ and CIOs´ perceptions toward Information Security. In addition, the research also identified the profile of Rio Grande do Norte s organizations and its Executives/CIOs concerning Information Security, computed the level of agreement of the respondents according to NBR ISO/IEC 17799 (Information technology Code of practice for information security management) on its dimension Access Control. The research was based on a model, which took into account the following variables: origin of the organization s capital, sector of production, number of PCs networked, number of employees with rights to network, number of attacks suffered by the organizations, respondent´s positions, education level, literacy on Information Technology and specific training on network. In the goal´s point of view, the research was classified as exploratory and descriptive, and, in relation of the approach, quantitative. One questionnaire was applied on 33 Executives and CIOs of the 50 Rio Grande do Norte s organizations that collected the highest taxes of ICMS - Imposto sobre Circulação de Mercadorias on 2000. After the data collecting, cluster analysis and chi-square statistical tools were used for data analysis. The research made clear that the Executives and CIOs of Rio Grande do Norte s organizations have low level of agreement concerning the rules of the NBR ISO/IEC 17799. It also made evident that the Executives and CIOs have its perception toward Information Security influenced by the number of PCs networked and by the number of attacks suffered by the organizations
Resumo:
A descontaminação dos explantes é um dos princípios básicos para o sucesso da cultura de tecidos. Um dos problemas diagnosticados na propagação in vitro da figueira, através de gemas apicais, é a contaminação endógena dos explantes por bactérias. Este trabalho teve como objetivo avaliar a eficiência de alguns antibióticos em meio de cultura para o controle de bactérias endógenas em gemas apicais de figueira. Foram avaliados os seguintes tratamentos: T1(sem adição de antibiótico); T2 (30 mg L-1 de cloranfenicol); T3 (250 mg L-1 de ampicilina sódica); T4 (500 mg L-1 de ácido nalidícico); T5 (150 mg L-1 de cefalotina sódica); T6 (500 mg L-1 de tetraciclina), e T7 (400 mg L-1 de norfloxacina). Após coletados em campo, os segmentos de ramos contendo as gemas foram colocados em recipiente com água corrente. Posteriormente, as gemas apicais foram imersas em álcool etílico a 70% e hipoclorito de sódio a 2,5%. Todo procedimento de desinfestação externa dos explantes foi realizado em câmara de fluxo laminar. Os explantes foram inoculados em tubos de ensaio contendo 15 mL de meio básico MS suplementado, após a autoclavagem, com as doses de antibióticos de acordo com os tratamentos estabelecidos. Após a inoculação, os explantes foram mantidos em sala de crescimento por quatro dias no escuro e, em seguida, sob fotoperíodo de 16 horas de luz branca fria e irradiância de 25 µmol m s-1, na temperatura de 22 ± 3ºC. A assepsia realizada externamente nos explantes foi suficiente para o controle de contaminação fúngica, e a adição de antibióticos ao meio, após autoclavagem, foi eficiente para o controle de bactérias endógenas, cujo antibiótico ampicilina sódica proporcionou mais de 90% de explantes sobreviventes.
Resumo:
Nowadays due to the security vulnerability of distributed systems, it is needed mechanisms to guarantee the security requirements of distributed objects communications. Middleware Platforms component integration platforms provide security functions that typically offer services for auditing, for guarantee messages protection, authentication, and access control. In order to support these functions, middleware platforms use digital certificates that are provided and managed by external entities. However, most middleware platforms do not define requirements to get, to maintain, to validate and to delegate digital certificates. In addition, most digital certification systems use X.509 certificates that are complex and have a lot of attributes. In order to address these problems, this work proposes a digital certification generic service for middleware platforms. This service provides flexibility via the joint use of public key certificates, to implement the authentication function, and attributes certificates to the authorization function. It also supports delegation. Certificate based access control is transparent for objects. The proposed service defines the digital certificate format, the store and retrieval system, certificate validation and support for delegation. In order to validate the proposed architecture, this work presents the implementation of the digital certification service for the CORBA middleware platform and a case study that illustrates the service functionalities
Resumo:
This work discusses the application of techniques of ensembles in multimodal recognition systems development in revocable biometrics. Biometric systems are the future identification techniques and user access control and a proof of this is the constant increases of such systems in current society. However, there is still much advancement to be developed, mainly with regard to the accuracy, security and processing time of such systems. In the search for developing more efficient techniques, the multimodal systems and the use of revocable biometrics are promising, and can model many of the problems involved in traditional biometric recognition. A multimodal system is characterized by combining different techniques of biometric security and overcome many limitations, how: failures in the extraction or processing the dataset. Among the various possibilities to develop a multimodal system, the use of ensembles is a subject quite promising, motivated by performance and flexibility that they are demonstrating over the years, in its many applications. Givin emphasis in relation to safety, one of the biggest problems found is that the biometrics is permanently related with the user and the fact of cannot be changed if compromised. However, this problem has been solved by techniques known as revocable biometrics, which consists of applying a transformation on the biometric data in order to protect the unique characteristics, making its cancellation and replacement. In order to contribute to this important subject, this work compares the performance of individual classifiers methods, as well as the set of classifiers, in the context of the original data and the biometric space transformed by different functions. Another factor to be highlighted is the use of Genetic Algorithms (GA) in different parts of the systems, seeking to further maximize their eficiency. One of the motivations of this development is to evaluate the gain that maximized ensembles systems by different GA can bring to the data in the transformed space. Another relevant factor is to generate revocable systems even more eficient by combining two or more functions of transformations, demonstrating that is possible to extract information of a similar standard through applying different transformation functions. With all this, it is clear the importance of revocable biometrics, ensembles and GA in the development of more eficient biometric systems, something that is increasingly important in the present day
Resumo:
A study was conducted during 23 days in order to evaluate the impact of floating aquatic macrophyte on the water quality of a fishpond. Water samples were collected in four points, three inside the pond and one in water inlet. Drastic reduction of dissolved oxygen was observed in the pond, down to 0.87 mg/L. No significant differences (P > 0.05) were observed for total CO 2, nitrite and ammonia with respect to inlet water (P1) and inside the pond (P2, P3 e P4). Chlorophyll a displayed an inverse relationship with phosphorus. Among nitrogen compounds, ammonia presented the highest concentrations except in water inlet where nitrate was higher, 513.33 μg/l, as well as the highest conductivity values. The pH was slightly acid. The results obtained showed that the macrophyte cover promoted an adverse effect in the medium. Under control, aquatic plants might impact positively due to its capacity to reduce total phosphorus and nitrate in the water column as observed in this study.