986 resultados para immune protection


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Abstract. The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we collate the algorithms used, the development of the systems and the outcome of their implementation. It provides an introduction and review of the key developments within this field, in addition to making suggestions for future research.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we review the algorithms used, the development of the systems and the outcome of their implementation. We provide an introduction and analysis of the key developments within this field, in addition to making suggestions for future research.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

NlmCategory="UNASSIGNED">We previously reported that TLR4(-/-) mice are refractory to mouse-adapted A/PR/8/34 (PR8) influenza-induced lethality and that therapeutic administration of the TLR4 antagonist Eritoran blocked PR8-induced lethality and acute lung injury (ALI) when given starting 2 days post infection. Herein we extend these findings: anti-TLR4- or -TLR2-specific IgG therapy also conferred significant protection of wild-type (WT) mice from lethal PR8 infection. If treatment is initiated 3 h before PR8 infection and continued daily for 4 days, Eritoran failed to protect WT and TLR4(-/-) mice, implying that Eritoran must block a virus-induced, non-TLR4 signal that is required for protection. Mechanistically, we determined that (i) Eritoran blocks high-mobility group B1 (HMGB1)-mediated, TLR4-dependent signaling in vitro and circulating HMGB1 in vivo, and an HMGB1 inhibitor protects against PR8; (ii) Eritoran inhibits pulmonary lung edema associated with ALI; (iii) interleukin (IL)-1β contributes significantly to PR8-induced lethality, as evidenced by partial protection by IL-1 receptor antagonist (IL-1Ra) therapy. Synergistic protection against PR8-induced lethality was achieved when Eritoran and the antiviral drug oseltamivir were administered starting 4 days post infection. Eritoran treatment does not prevent development of an adaptive immune response to subsequent PR8 challenge. Overall, our data support the potential of a host-targeted therapeutic approach to influenza infection.Mucosal Immunology advance online publication 27 January 2016; doi:10.1038/mi.2015.141.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Leishmania (Viannia) shawi was characterized only recently, and few studies concerning the immunogenic and protective properties of its antigens have been performed. The present study aimed to evaluate the protective potential of the five antigenic fractions isolated from L. (V.) shawi promastigotes in experimental cutaneous leishmaniasis.Soluble antigen from L. (V.) shawi promastigotes was submitted to reverse phase HPLC to purify F1, F2, F3, F4 and F5 antigens. BALB/c mice were immunized once a week for two consecutive weeks by subcutaneous routes in the rump, using 25 mu g protein. After 1 week, groups were challenged in the footpad with L. (V.) shawi promastigotes. After 8 weeks, those same mice were sacrificed and parasite burden as well as the cellular and humoral immune responses were evaluated.F1 and F5-immunized mice restrained lesion progression and parasite load in the skin. However, only the F1 group was able to control the parasitism in lymph nodes, which was associated with low IL-4 and high IFN-gamma production; IgG2a isotype was increased in this group. Immunizations with F2, F3 and F4 antigens did not protect mice.The capability of antigens to restrain IL-4 levels and increase IFN-gamma was associated with protection, such as in immunization using F1 antigen.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Although the attenuated Mycobacterium bovis Bacillus Calmette-Guérin (BCG) vaccine has been used since 1921, tuberculosis (TB) control still proceeds at a slow pace. The main reason is the variable efficacy of BCG protection against TB among adults, which ranges from 0-80%. Subsequently, the mc2-CMX vaccine was developed with promising results. Nonetheless, this recombinant vaccine needs to be compared to the standard BCG vaccine. The objective of this study was to evaluate the immune response induced by mc2-CMX and compare it to the response generated by BCG. BALB/c mice were immunised with both vaccines and challenged with Mycobacterium tuberculosis (Mtb). The immune and inflammatory responses were evaluated by ELISA, flow cytometry, and histopathology. Mice vaccinated with mc2-CMX and challenged with Mtb induced an increase in the IgG1 and IgG2 levels against CMX as well as recalled specific CD4+ T-cells that produced T-helper 1 cytokines in the lungs and spleen compared with BCG vaccinated and challenged mice. Both vaccines reduced the lung inflammatory pathology induced by the Mtb infection. The mc2-CMX vaccine induces a humoral and cellular response that is superior to BCG and is efficiently recalled after challenge with Mtb, although both vaccines induced similar inflammatory reductions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In his report into corruption in Queensland, Fitzgerald listed whistleblower protection as a necessary part of a strong governance regime. "What is required is an accessible, independent body to which disclosures can be made, confidentially (at least in the first instance) and in any event free from fear of reprisals." It was one of the reforms studied by the Electoral and Administrative Review Committee, the report of which resulted in the Whistleblowers Protection Act 1994 (WPA). The need for whistleblower protection was supported by all sides of Parliament. The Premier, Wayne Goss, in his Second Reading Speech on the Public Sector Ethics Bill , said that that Act and the WPA would form a package with the former outlining required behaviour and the WPA encouraging staff to report wrongdoing. The WPA was subsequently passed and has remained virtually unamended for over a decade. Such consistency is either an indication of skilled drafting and effectiveness or the fact that the Act has been neglected. It is the hypothesis of this paper that the latter is the case. This hypothesis will be tested by examining the sincerity and diligence with which the Act has been treated during, and following, its passage.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article explains the relevance of the Code and its place in the regulatory framework, discusses some of the key issues arising in the recent review (as identified by consumer advocates1), and explains the relationship between the Code and the Financial Ombudsman Service.