858 resultados para stop-and-wait protocols
Resumo:
Dendritic cells (DCs) play critical roles in immune-mediated kidney diseases. Little is known, however, about DC subsets in human chronic kidney disease, with previous studies restricted to a limited set of pathologies and to using immunohistochemical methods. In this study, we developed novel protocols for extracting renal DC subsets from diseased human kidneys and identified, enumerated, and phenotyped them by multicolor flow cytometry. We detected significantly greater numbers of total DCs as well as CD141(hi) and CD1c(+) myeloid DC (mDCs) subsets in diseased biopsies with interstitial fibrosis than diseased biopsies without fibrosis or healthy kidney tissue. In contrast, plasmacytoid DC numbers were significantly higher in the fibrotic group compared with healthy tissue only. Numbers of all DC subsets correlated with loss of kidney function, recorded as estimated glomerular filtration rate. CD141(hi) DCs expressed C-type lectin domain family 9 member A (CLEC9A), whereas the majority of CD1c(+) DCs lacked the expression of CD1a and DC-specific ICAM-3-grabbing nonintegrin (DC-SIGN), suggesting these mDC subsets may be circulating CD141(hi) and CD1c(+) blood DCs infiltrating kidney tissue. Our analysis revealed CLEC9A(+) and CD1c(+) cells were restricted to the tubulointerstitium. Notably, DC expression of the costimulatory and maturation molecule CD86 was significantly increased in both diseased cohorts compared with healthy tissue. Transforming growth factor-β levels in dissociated tissue supernatants were significantly elevated in diseased biopsies with fibrosis compared with nonfibrotic biopsies, with mDCs identified as a major source of this profibrotic cytokine. Collectively, our data indicate that activated mDC subsets, likely recruited into the tubulointerstitium, are positioned to play a role in the development of fibrosis and, thus, progression to chronic kidney disease.
Resumo:
This research introduces a general methodology in order to create a Coloured Petri Net (CPN) model of a security protocol. Then standard or user-defined security properties of the created CPN model are identified. After adding an attacker model to the protocol model, the security property is verified using state space method. This approach is applied to analyse a number of trusted computing protocols. The results show the applicability of proposed method to analyse both standard and user-defined properties.
Resumo:
The recent floods in south-east Queensland have focused policy, academic and community attention on the challenges associated with severe weather events (SWE), specifically pre-disaster preparation, disaster-response and post-disaster community resilience. Financially, the cost of SWE was $9 billion in the 2011 Australian Federal Budget (Swan 2011); psychologically and emotionally, the impact on individual mental health and community wellbeing is also significant but more difficult to quantify. However, recent estimates suggest that as many as one in five will subsequently experience major emotional distress (Bonanno et al. 2010). With climate change predicted to increase the frequency and intensity of a wide range of SWE in Australia (Garnaut 2011; The Climate Institute 2011), there is an urgent and critical need to ensure that the unique psychological and social needs of more vulnerable community members - such as older residents - are better understood and integrated into disaster preparedness and response policy, planning and protocols. Navigating the complex dynamics of SWE can be particularly challenging for older adults and their disaster experience is frequently magnified by a wide array of cumulative and interactive stressors, which intertwine to make them uniquely vulnerable to significant short and long-term adverse effects. This current article provides a brief introduction to the current literature in this area and highlights a gap in the research relating to communication tools during and after severe weather events.
Resumo:
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.
Resumo:
At Eurocrypt’04, Freedman, Nissim and Pinkas introduced a fuzzy private matching problem. The problem is defined as follows. Given two parties, each of them having a set of vectors where each vector has T integer components, the fuzzy private matching is to securely test if each vector of one set matches any vector of another set for at least t components where t < T. In the conclusion of their paper, they asked whether it was possible to design a fuzzy private matching protocol without incurring a communication complexity with the factor (T t ) . We answer their question in the affirmative by presenting a protocol based on homomorphic encryption, combined with the novel notion of a share-hiding error-correcting secret sharing scheme, which we show how to implement with efficient decoding using interleaved Reed-Solomon codes. This scheme may be of independent interest. Our protocol is provably secure against passive adversaries, and has better efficiency than previous protocols for certain parameter values.
Resumo:
This paper makes a formal security analysis of the current Australian e-passport implementation using model checking tools CASPER/CSP/FDR. We highlight security issues in the current implementation and identify new threats when an e-passport system is integrated with an automated processing system like SmartGate. The paper also provides a security analysis of the European Union (EU) proposal for Extended Access Control (EAC) that is intended to provide improved security in protecting biometric information of the e-passport bearer. The current e-passport specification fails to provide a list of adequate security goals that could be used for security evaluation. We fill this gap; we present a collection of security goals for evaluation of e-passport protocols. Our analysis confirms existing security weaknesses that were previously identified and shows that both the Australian e-passport implementation and the EU proposal fail to address many security and privacy aspects that are paramount in implementing a secure border control mechanism. ACM Classification C.2.2 (Communication/Networking and Information Technology – Network Protocols – Model Checking), D.2.4 (Software Engineering – Software/Program Verification – Formal Methods), D.4.6 (Operating Systems – Security and Privacy Protection – Authentication)
Resumo:
We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on human identification protocols. The attack is an application of Coppersmith’s baby-step giant-step algorithm on human identification protcols. Under this attack, the achievable security of some of the best candidates for human identification protocols in the literature is further reduced. We show that our protocol preserves similar usability while achieves better security than these protocols. A comprehensive security analysis is provided which suggests parameters guaranteeing desired levels of security.
Resumo:
Working primarily within the natural landscape, this practice-led research project explored connections between the artist's visual and perceptual experience of a journey or place while simultaneously emphasizing the capacity for digital media to create a perceptual dissonance. By exploring concepts of time, viewpoint, duration of sequences and the manipulation of traditional constructs of stop-frame animation, the practical work created a cognitive awareness of the elements of the journey through optical sensations. The work allowed an opportunity to reflect on the nature of visual experience and its mediation through images. The project recontextualized the selected mediums of still photography, animation and projection within contemporary display modes of multiple screen installations by analysing relationships between the experienced and the perceived. The resulting works added to current discourse on the interstices between still and moving imagery in a digital world.
Resumo:
Bandwidths and offsets are important components in vehicle traffic control strategies. This article proposes new methods for quantifying and selecting them. Bandwidth is the amount of green time available for vehicles to travel through adjacent intersections without the requirement to stop at the second traffic light. The offset is the difference between the starting-time of ``green'' periods at two adjacent intersections, along a given route. The core ideas in this article were developed during the 2013 Maths and Industry Study Group in Brisbane, Australia. Analytical expressions for computing bandwidth, as a function of offset, are developed. An optimisation model, for selecting offsets across an arterial, is proposed. Arterial roads were focussed upon, as bandwidth and offset have a greater impact on these types of road as opposed to a full traffic network. A generic optimisation-simulation approach is also proposed to refine an initial starting solution, according to a specified metric. A metric that reflects the number of stops, and the distance between stops, is proposed to explicitly reduce the dissatisfaction of road users, and to implicitly reduce fuel consumption and emissions. Conceptually the optimisation-simulation approach is superior as it handles real-life complexities and is a global optimisation approach. The models and equations in this article can be used in road planning and traffic control.
Resumo:
Motivated by the need of private set operations in a distributed environment, we extend the two-party private matching problem proposed by Freedman, Nissim and Pinkas (FNP) at Eurocrypt’04 to the distributed setting. By using a secret sharing scheme, we provide a distributed solution of the FNP private matching called the distributed private matching. In our distributed private matching scheme, we use a polynomial to represent one party’s dataset as in FNP and then distribute the polynomial to multiple servers. We extend our solution to the distributed set intersection and the cardinality of the intersection, and further we show how to apply the distributed private matching in order to compute distributed subset relation. Our work extends the primitives of private matching and set intersection by Freedman et al. Our distributed construction might be of great value when the dataset is outsourced and its privacy is the main concern. In such cases, our distributed solutions keep the utility of those set operations while the dataset privacy is not compromised. Comparing with previous works, we achieve a more efficient solution in terms of computation. All protocols constructed in this paper are provably secure against a semi-honest adversary under the Decisional Diffie-Hellman assumption.
Resumo:
Reframe is changing our approach to the evaluation of courses, units, teaching and student experience at QUT. We are moving away from a single survey tool to a richer, more holistic and customisable approach. These protocols allows academic staff and administrators access to the ways in which the policy is enacted through process.
Resumo:
Virus-based transgene expression systems have become particularly valuable for recombinant protein production in plants. The dual-module in-plant activation (INPACT) expression platform consists of a uniquely designed split-gene cassette incorporating the cis replication elements of Tobacco yellow dwarf geminivirus (TYDV) and an ethanol-inducible activation cassette encoding the TYDV Rep and RepA replication-associated proteins. The INPACT system is essentially tailored for recombinant protein production in stably transformed plants and provides both inducible and high-level transient transgene expression with the potential to be adapted to diverse crop species. The construction of a novel split-gene cassette, the inducible nature of the system and the ability to amplify transgene expression via rolling-circle replication differentiates this system from other DNA- and RNA-based virus vector systems used for stable or transient recombinant protein production in plants. Here we provide a detailed protocol describing the design and construction of a split-gene INPACT cassette, and we highlight factors that may influence optimal activation and amplification of gene expression in transgenic plants. By using Nicotiana tabacum, the protocol takes 6-9 months to complete, and recombinant proteins expressed using INPACT can accumulate to up to 10% of the leaf total soluble protein.
Resumo:
OBJECTIVE To explore social equity, health planning, regulatory and ethical dilemmas in responding to a pandemic influenza (H5N1) outbreak, and the adequacy of protocols and standards such as the International Health Regulations (2005). APPROACH This paper analyses the role of legal and ethical considerations for pandemic preparedness, including an exploration of the relevance of cross-jurisdictional and cross-cultural perspectives in assessing the validity of goals for harmonisation of laws and policies both within and between nations. Australian and international experience is reviewed in various areas, including distribution of vaccines during a pandemic, the distribution of authority between national and local levels of government, and global and regional equity issues for poorer countries. CONCLUSION This paper finds that questions such as those of distributional justice (resource allocation) and regulatory frameworks raise important issues about the cultural and ethical acceptability of planning measures. Serious doubt is cast on a 'one size fits all' approach to international planning for managing a pandemic. It is concluded that a more nuanced approach than that contained in international guidelines may be required if an effective response is to be constructed internationally. IMPLICATIONS The paper commends the wisdom of reliance on 'soft law', international guidance that leaves plenty of room for each nation to construct its response in conformity with its own cultural and value requirements.
Resumo:
Objective To explore social equity, health planning, regulatory and ethical dilemmas in responding to a pandemic influenza (H5N1) outbreak, and the adequacy of protocols and standards such as the International Health Regulations (2005). Approach This paper analyses the role of legal and ethical considerations for pandemic preparedness, including an exploration of the relevance of cross-jurisdictional and cross-cultural perspectives in assessing the validity of goals for harmonisation of laws and policies both within and between nations. Australian and international experience is reviewed in various areas, including distribution of vaccines during a pandemic, the distribution of authority between national and local levels of government, and global and regional equity issues for poorer countries. Conclusion This paper finds that questions such as those of distributional justice (resource allocation) and regulatory frameworks raise important issues about the cultural and ethical acceptability of planning measures. Serious doubt is cast on a ‘one size fits all’ approach to international planning for managing a pandemic. It is concluded that a more nuanced approach than that contained in international guidelines may be required if an effective response is to be constructed internationally. Implications The paper commends the wisdom of reliance on ‘soft law’, international guidance that leaves plenty of room for each nation to construct its response in conformity with its own cultural and value requirements.
Resumo:
Binary Ti vectors are the plasmid vectors of choice in Agrobacterium-mediated plant transformation protocols. The pGreen series of binary Ti vectors are configured for ease-of-use and to meet the demands of a wide range of transformation procedures for many plant species. This plasmid system allows any arrangement of selectable marker and reporter gene at the right and left T-DNA borders without compromising the choice of restriction sites for cloning, since the pGreen cloning sites are based on the well-known pBluescript general vector plasmids. Its size and copy number in Escherichia coli offers increased efficiencies in routine in vitro recombination procedures. pGreen can replicate in Agrobacterium only if another plasmid, pSoup, is co-resident in the same strain. pSoup provides replication functions in trans for pGreen. The removal of RepA and Mob functions has enabled the size of pGreen to be kept to a minimum. Versions of pGreen have been used to transform several plant species with the same efficiencies as other binary Ti vectors. Information on the pGreen plasmid system is supplemented by an Internet site (http://www.pgreen.ac.uk) through which comprehensive information, protocols, order forms and lists of different pGreen marker gene permutations can be found.