5,769 research outputs found
Recommended from our members
Substrate-Specific Inhibition Constants for Phospholipase A2 Acting on Unique Phospholipid Substrates in Mixed Micelles and Membranes Using Lipidomics.
Assaying lipolytic enzymes is extremely challenging because they act on water-insoluble lipid substrates, which are normally components of micelles, vesicles, and cellular membranes. We extended a new lipidomics-based liquid chromatographic-mass spectrometric assay for phospholipases A2 to perform inhibition analysis using a variety of commercially available synthetic and natural phospholipids as substrates. Potent and selective inhibitors of three recombinant human enzymes, including cytosolic, calcium-independent, and secreted phospholipases A2 were used to establish and validate this assay. This is a novel use of dose-response curves with a mixture of phospholipid substrates, not previously feasible using traditional radioactive assays. The new application of lipidomics to developing assays for lipolytic enzymes revolutionizes in vitro testing for the discovery of potent and selective inhibitors using mixtures of membranelike substrates
Atmospheric chemistry of bioaerosols: heterogeneous and multiphase reactions with atmospheric oxidants and other trace gases.
Advances in analytical techniques and instrumentation have now established methods for detecting, quantifying, and identifying the chemical and microbial constituents of particulate matter in the atmosphere. For example, recent cryo-TEM studies of sea spray have identified whole bacteria and viruses ejected from ocean seawater into air. A focal point of this perspective is directed towards the reactivity of aerosol particles of biological origin with oxidants (OH, NO3, and O3) present in the atmosphere. Complementary information on the reactivity of aerosol particles is obtained from field investigations and laboratory studies. Laboratory studies of different types of biologically-derived particles offer important information related to their impacts on the local and global environment. These studies can also unravel a range of different chemistries and reactivity afforded by the complexity and diversity of the chemical make-up of these particles. Laboratory experiments as the ones reviewed herein can elucidate the chemistry of biological aerosols
A Formal Approach to Exploiting Multi-Stage Attacks based on File-System Vulnerabilities of Web Applications (Extended Version)
Web applications require access to the file-system for many different tasks.
When analyzing the security of a web application, secu- rity analysts should
thus consider the impact that file-system operations have on the security of
the whole application. Moreover, the analysis should take into consideration
how file-system vulnerabilities might in- teract with other vulnerabilities
leading an attacker to breach into the web application. In this paper, we first
propose a classification of file- system vulnerabilities, and then, based on
this classification, we present a formal approach that allows one to exploit
file-system vulnerabilities. We give a formal representation of web
applications, databases and file- systems, and show how to reason about
file-system vulnerabilities. We also show how to combine file-system
vulnerabilities and SQL-Injection vulnerabilities for the identification of
complex, multi-stage attacks. We have developed an automatic tool that
implements our approach and we show its efficiency by discussing several
real-world case studies, which are witness to the fact that our tool can
generate, and exploit, complex attacks that, to the best of our knowledge, no
other state-of-the-art-tool for the security of web applications can find
Student, Athlete, or Neither at All: A closer look into the experiences of Black basketball players in the NCAA
Senior Project submitted to The Division of Social Studies of Bard College
On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals
The importance of the Electronic Health Record (EHR) has been addressed in recent years by governments and institutions.Many large scale projects have been funded with the aim to allow healthcare professionals to consult patients data. Properties such as confidentiality, authentication and authorization are the key for the success for these projects. The Integrating the Healthcare Enterprise (IHE) initiative promotes the coordinated use of established standards for authenticated and secure EHR exchanges among clinics and hospitals. In particular, the IHE integration profile named XUA permits to attest user identities by relying on SAML assertions, i.e. XML documents containing authentication statements. In this paper, we provide a formal model for the secure issuance of such an assertion. We first specify the scenario using the process calculus COWS and then analyse it using the model checker CMC. Our analysis reveals a potential flaw in the XUA profile when using a SAML assertion in an unprotected network. We then suggest a solution for this flaw, and model check and implement this solution to show that it is secure and feasible
A reduced semantics for deciding trace equivalence using constraint systems
Many privacy-type properties of security protocols can be modelled using
trace equivalence properties in suitable process algebras. It has been shown
that such properties can be decided for interesting classes of finite processes
(i.e., without replication) by means of symbolic execution and constraint
solving. However, this does not suffice to obtain practical tools. Current
prototypes suffer from a classical combinatorial explosion problem caused by
the exploration of many interleavings in the behaviour of processes.
M\"odersheim et al. have tackled this problem for reachability properties using
partial order reduction techniques. We revisit their work, generalize it and
adapt it for equivalence checking. We obtain an optimization in the form of a
reduced symbolic semantics that eliminates redundant interleavings on the fly.Comment: Accepted for publication at POST'1
Two-photon interference from two blinking quantum emitters
We investigate the effect of blinking on the two-photon interference
measurement from two independent quantum emitters. We find that blinking
significantly alters the statistics in the second-order intensity correlation
function g and the outcome of two-photon interference
measurements performed with independent quantum emitters. We theoretically
demonstrate that the presence of blinking can be experimentally recognized by a
deviation from the g value when distinguishable photons
impinge on a beam splitter. Our results show that blinking imposes a mandatory
cross-check measurement to correctly estimate the degree of
indistinguishablility of photons emitted by independent quantum emitters
- …