190 research outputs found

    A reduced semantics for deciding trace equivalence using constraint systems

    Full text link
    Many privacy-type properties of security protocols can be modelled using trace equivalence properties in suitable process algebras. It has been shown that such properties can be decided for interesting classes of finite processes (i.e., without replication) by means of symbolic execution and constraint solving. However, this does not suffice to obtain practical tools. Current prototypes suffer from a classical combinatorial explosion problem caused by the exploration of many interleavings in the behaviour of processes. M\"odersheim et al. have tackled this problem for reachability properties using partial order reduction techniques. We revisit their work, generalize it and adapt it for equivalence checking. We obtain an optimization in the form of a reduced symbolic semantics that eliminates redundant interleavings on the fly.Comment: Accepted for publication at POST'1

    Physical inactivity amplifies the negative association between sleep quality and depressive symptoms.

    Get PDF
    Poor sleep quality and physical inactivity are known risk factors for depressive symptoms. Yet, whether these factors differently contribute to depressive symptoms and whether they interact with one another remains unclear. Here, we examined how sleep quality and physical activity influence depressive symptoms in 79,274 adults 50 years of age or older (52.4% women) from the Survey of Health, Aging and Retirement in Europe (SHARE) study. Sleep quality (poor vs. good), physical activity (inactive vs. active), and depressive symptoms (0 to 12 score) were repeatedly collected (7 waves of data collection) between 2004 and 2017. Results showed that sleep quality and physical activity were associated with depressive symptoms. Specifically, participants with poorer sleep quality reported more depressive symptoms than participants with better sleep quality (b = 1.85, 95% CI = 1.83-1.86, p < .001). Likewise, compared to physically active participants, physically inactive participants reported more depressive symptoms (b = 0.44, 95% CI = 0.42-0.45, p < .001). Moreover, sleep quality and physical activity showed an interactive association with depressive symptoms (b = 0.17, 95% CI = 0.13-0.20, p < .001). The negative association between poor sleep quality and higher depressive symptoms was stronger in physically inactive than active participants. These findings suggest that, in adults 50 years of age or older, both poor sleep quality and physical inactivity are related to an increase in depressive symptoms. Moreover, the detrimental association between poor sleep quality and depressive symptoms is amplified in physically inactive individuals

    Expression Profile of Nuclear Receptors along Male Mouse Nephron Segments Reveals a Link between ERRβ and Thick Ascending Limb Function

    Get PDF
    The nuclear receptor family orchestrates many functions related to reproduction, development, metabolism, and adaptation to the circadian cycle. The majority of these receptors are expressed in the kidney, but their exact quantitative localization in this ultrastructured organ remains poorly described, making it difficult to elucidate the renal function of these receptors. In this report, using quantitative PCR on microdissected mouse renal tubules, we established a detailed quantitative expression map of nuclear receptors along the nephron. This map can serve to identify nuclear receptors with specific localization. Thus, we unexpectedly found that the estrogen-related receptor β (ERRβ) is expressed predominantly in the thick ascending limb (TAL) and, to a much lesser extent, in the distal convoluted tubules. In vivo treatment with an ERR inverse agonist (diethylstilbestrol) showed a link between this receptor family and the expression of the Na+,K+-2Cl− cotransporter type 2 (NKCC2), and resulted in phenotype presenting some similarities with the Bartter syndrom (hypokalemia, urinary Na+ loss and volume contraction). Conversely, stimulation of ERRβ with a selective agonist (GSK4716) in a TAL cell line stimulated NKCC2 expression. All together, these results provide broad information regarding the renal expression of all members of the nuclear receptor family and have allowed us to identify a new regulator of ion transport in the TAL segments

    The hitchhiker's guide to decidability and complexity of equivalence properties in security protocols

    Get PDF
    International audiencePrivacy-preserving security properties in cryptographic protocols are typically modelled by observational equivalences in process calculi such as the applied pi-calulus. We survey decidability and complexity results for the automated verification of such equivalences, casting existing results in a common framework which allows for a precise comparison. This unified view, beyond providing a clearer insight on the current state of the art, allowed us to identify some variations in the statements of the decision problems-sometimes resulting in different complexity results. Additionally, we prove a couple of novel or strengthened results

    A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols

    Get PDF
    Catherine Meadows has played an important role in the advancement of formal methods for protocol security verification. Her insights on the use of, for example, narrowing and rewriting logic has made possible the automated discovery of new attacks and the shaping of new protocols. Meadows has also investigated other security aspects, such as, distance-bounding protocols and denial of service attacks. We have been greatly inspired by her work. This paper describes the use of Multiset Rewriting for the specification and verification of timing aspects of protocols, such as network delays, timeouts, timed intruder models and distance-bounding properties. We detail these timed features with a number of examples and describe decidable fragments of related verification problems

    Aetiology of acute meningoencephalitis in Cambodian children, 2010–2013

    Get PDF
    Acute meningoencephalitis (AME) is associated with considerable morbidity and mortality in children in developing countries. Clinical specimens were collected from children presenting with AME at two Cambodian paediatric hospitals to determine the major aetiologies associated with AME in the country. Cerebrospinal fluid (CSF) and blood samples were screened by molecular and cell culture methods for a range of pathogens previously associated with AME in the region. CSF and serum (acute and convalescent) were screened for antibodies to arboviruses such as Japanese encephalitis virus (JEV), dengue virus (DENV), and chikungunya virus (CHIKV). From July 2010 through December 2013, 1160 children (one month to 15 years of age) presenting with AME to two major paediatric hospitals were enroled into the study. Pathogens associated with AME were identified using molecular diagnostics, cell culture and serology. According to a diagnostic algorithm, a confirmed or highly probable aetiologic agent was detected in 35.0% (n=406) of AME cases, with a further 9.2% (total: 44.2%, n=513) aetiologies defined as suspected. JEV (24.4%, n=283) was the most commonly identified pathogen followed by Orientia tsutsugamushi (4.7%, n=55), DENV (4.6%, n=53), enteroviruses (3.5%, n=41), CHIKV (2.0%, n=23) and Streptococcus pneumoniae (1.6%, n=19). The majority of aetiologies identified for paediatric AME in Cambodia were vaccine preventable and/or treatable with appropriate antimicrobials

    Timing attacks: symbolic framework and proof techniques

    Get PDF
    We propose a framework for timing attacks, based on (a variant of) the applied-pi calculus. Since many privacy properties, as well as strong secrecy and game-based security properties, are stated as process equivalences, we focus on (time) trace equivalence. We show that actually, considering timing attacks does not add any complexity: time trace equivalence can be reduced to length trace equivalence, where the attacker no longer has access to execution times but can still compare the length of messages. We therefore deduce from a previous decidability result for length equivalence that time trace equivalence is decidable for bounded processes and the standard cryptographic primitives. As an application, we study several protocols that aim for privacy. In particular, we (automatically) detect an existing timing attack against the biometric passport and new timing attacks against the Private Authentication protocol

    Human Skin Microbiota: High Diversity of DNA Viruses Identified on the Human Skin by High Throughput Sequencing

    Get PDF
    The human skin is a complex ecosystem that hosts a heterogeneous flora. Until recently, the diversity of the cutaneous microbiota was mainly investigated for bacteria through culture based assays subsequently confirmed by molecular techniques. There are now many evidences that viruses represent a significant part of the cutaneous flora as demonstrated by the asymptomatic carriage of beta and gamma-human papillomaviruses on the healthy skin. Furthermore, it has been recently suggested that some representatives of the Polyomavirus genus might share a similar feature. In the present study, the cutaneous virome of the surface of the normal-appearing skin from five healthy individuals and one patient with Merkel cell carcinoma was investigated through a high throughput metagenomic sequencing approach in an attempt to provide a thorough description of the cutaneous flora, with a particular focus on its viral component. The results emphasize the high diversity of the viral cutaneous flora with multiple polyomaviruses, papillomaviruses and circoviruses being detected on normal-appearing skin. Moreover, this approach resulted in the identification of new Papillomavirus and Circovirus genomes and confirmed a very low level of genetic diversity within human polyomavirus species. Although viruses are generally considered as pathogen agents, our findings support the existence of a complex viral flora present at the surface of healthy-appearing human skin in various individuals. The dynamics and anatomical variations of this skin virome and its variations according to pathological conditions remain to be further studied. The potential involvement of these viruses, alone or in combination, in skin proliferative disorders and oncogenesis is another crucial issue to be elucidated
    corecore