101 research outputs found

    Computer Immunodeficiency: Analogy between Computer Security and HIV

    Get PDF
    Current security systems are designed to prevent foreseeable attacks. Those security systems do not prevent effectively the more emergent types of attacks, like a botnet, whose presence and behavior is difficult to predict. In order to predominate those types of attacks, we advocate an adaptive security approach based on the animal immune system. But since those sophisticated attacks can also be directed at the security systems themselves, leading to computer immunodeficiency, like HIV, in this paper we propose a protocol that protects the immune system itself. This approach discriminates between attacks on the security systems, which are part of the computer immune system, and attacks on other vital computer systems in an information infrastructure

    A quest to optimize the clinical pharmacology of tuberculosis and human immunodeficiency virus drug treatment

    Get PDF
    Tuberculose (TB) is op dit moment de dodelijkste infectieuze ziekte wereldwijd, met alleen in 2016 al 1.7 miljoen doden. HIV infectie is de belangrijkste risicofactor voor TB. Patiënten met een TB/HIV co-infectie hebben last van geneesmiddel interacties, ze moeten veel pillen slikken en ze moeten hun levensstijl ingrijpend aanpassen voor de genezing of remming van hun infectie. Ten slotte lopen ze ook nog eens de kans dat de behandeling niet goed lukt doordat zij een wat andere resorptie, omzetting of uitscheiding van geneesmiddelen hebben (door natuurlijk voorkomende variatie in farmacokinetiek). Dit proefschrift richt zich op het optimaliseren van de medicamenteuze TB behandeling bij de combinatie van TB en HIV infectie en daarnaast op het gebruik van het antiretrovirale middel darunavir. We hebben in de literatuur onderzocht wat er bekend is over het effect van HIV infectie op de bloedspiegelconcentraties van de meest gangbare TB geneesmiddelen. TB patiënten worden normaal gesproken 6 maanden lang behandeld met geneesmiddelen. In de praktijk blijkt echter dat een deel van de patiënten langer behandeld moet worden. We hebben onderzocht welke risicofactoren kunnen bijdragen aan een langere behandeling. We verschaften ook inzicht in de complexiteit van de behandeling van mensen met TB en HIV door de opgedane ervaringen te beschrijven. Daarnaast hebben we ook methoden, zoals laboratoriumbepalingen en algoritmes, ontwikkeld die kunnen helpen bij het optimaal doseren van de HIV medicijn darunavir. Ook hebben we gekeken naar de voedingspatronen van patiënten die darunavir gebruiken met als doel om gezonder eten te bevorderen

    Risk factors contributing to a low darunavir plasma concentration

    Get PDF
    Darunavir is an efficacious drug; however, pharmacokinetic variability has been reported. The objective of this study was to find predisposing factors for low darunavir plasma concentrations in patients starting the once- or twice-daily dosage. Darunavir plasma concentrations from January 2010 till December 2014 of human immunodeficiency virus-infected individuals treated in the outpatient clinic of the University Medical Center Groningen were retrospectively reviewed. The first darunavir plasma concentration of patients within 8weeks after initiation of darunavir therapy was selected. A dichotomous logistic regression analysis was conducted to select the set of variables best predicting a darunavir concentration below median population pharmacokinetic curve. In total 113 patients were included. The variables best predicting a darunavir concentration besides food intake included age together with estimated glomerular filtration rate (Hosmer-Lemeshow test P=0.945, Nagelkerke R-2=0.284). Systematic evaluation of therapeutic drug monitoring results may help to identify patients at risk for low drug exposure

    "Flogging dead horses": evaluating when have clinical trials achieved sufficiency and stability? A case study in cardiac rehabilitation

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Most systematic reviews conclude that another clinical trial is needed. Measures of sufficiency and stability may indicate whether this is true.</p> <p>Objectives: To show how evidence accumulated on centre-based versus home-based cardiac rehabilitation, including estimates of sufficiency and stability</p> <p>Methods</p> <p>Systematic reviews of clinical trials of home versus centre-based cardiac rehabilitation were used to develop a cumulative meta-analysis over time. We calculated the standardised mean difference (SMD) in effect, confidence intervals and indicators of sufficiency and stability. Sufficiency refers to whether the meta-analytic database adequately demonstrates that an intervention works - is statistically superior to another. It does this by assessing the number of studies with null results that would be required to make the meta-analytic effect non-statistically significant. Stability refers to whether the direction and size of the effect is stable as new studies are added to the meta-analysis.</p> <p>Results</p> <p>The standardised mean effect difference reduced over fourteen comparisons from a non-significant difference favouring home-based cardiac rehabilitation to a very small difference favouring hospital (SMD -0.10, 95% CI -0.32 to 0.13). This difference did not reach the sufficiency threshold (failsafe ratio 0.039 < 1) but did achieve the criteria for stability (cumulative slope 0.003 < 0.005).</p> <p>Conclusions</p> <p>The evidence points to a relatively small effect difference which was stable but not sufficient in terms of the suggested thresholds. Sufficiency should arguably be based on substantive significance and decided by patients. Research on patient preferences should be the priority. Sufficiency and stability measures are useful tools that need to be tested in further case studies.</p

    Internet of things: where to be is to trust

    Get PDF
    [EN] Networks' creation is getting more and more required, anytime, anywhere. Devices that can participate on these networks can be quite different among them. Sensors, mobiles, home appliances, or other type of devices will have to collaborate to increase and improve the services provided to clients. In the same way, network configuration, security mechanisms establishment, and optimal performance control must be done by them. Some of these devices could have limited resources to work, sometimes even resources restriction not existing, they must work to optimize network traffic. In this article, we center our researching on spontaneous networks. We propose a secure spontaneous ad-hoc network, based on direct peer-to-peer interaction and communities' creation to grant a quick, easy, and secure access to users to surf the Web. Each device will have an identity in the network. Each community will also have an identity and will act as a unity on a world based on Internet connection. Security will be established in the moment they access to the network through the use of the trust chain generated by nodes. Trust is modified by each node on the basis of nodes behaviorLacuesta, R.; Palacios-Navarro, G.; Cetina Englada, C.; Peñalver Herrero, ML.; Lloret, J. (2012). Internet of things: where to be is to trust. EURASIP Journal on Wireless Communications and Networking. (203):1-16. doi:10.1186/1687-1499-2012-203S116203Lipnack J, Stamps J: Virtual Teams: Researching Across Space, Time, and Organizations with Technology. New York: John Wiley and Sons; 1997.Ahuja MK, Carley KN: Network structure in virtual organizations, organization science, Vol. 10, No. 6, Special Issue: Communication Processes for Virtual Organizations, November–December. 1999, 741-757.Mowshowitz A: Virtual organization. Commun ACM 1997, 40(9):30-37. 10.1145/260750.260759Preuß S: CH Cap, Overview of spontaneous networking-evolving concepts and technologies, in Rostocker Informatik-Berichte. Rostock: Fachbereich Informatik der Universit; 2000:113-123.Feeney LM, Ahlgren B, Westerlund A: Spontaneous networking: an application-oriented approach to ad hoc networking. IEEE Commun Mag 2001, 39(6):176-181. 10.1109/35.925687Latvakoski J, Pakkala D, Pääkkönen P: A communication architecture for spontaneous systems. IEEE Wirel Commun 2004, 11(3):36-42. 10.1109/MWC.2004.1308947Mani M, Nguyen A-M, Crespi N: SCOPE: a prototype for spontaneous P2P social networking. Proceedings of 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) 2010, 220-225.Legendre F, de Amorim MD, Fdida S: Implicit merging of overlapping spontaneous networks. Proceedings of Vehicular Technology Conference 2004, 3050-3054.Zarate Silva VH, De Cruz Salgado EI, Ramos Quintana F: AWISPA: an awareness framework for collaborative spontaneous networks. 36th Annual Frontiers in Education Conference 2006, 27-31.Perkins CE, Bhagwat P: Highly dynamic destination sequenced distance-vector routing (DSDV) for mobile computers. Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM’94 1994, 234-244.Johnson DB, Maltz DA, Broch J: DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. Boston, MA: Ad Hoc Networking (Addison-Wesley Longman Publishing; 2001.Perkins C, Belding-Royer E, Das S: Ad hoc on-demand distance vector (AODV) routing, RFC 3561. 2003.Park V, Corson MS: IETF MANET Internet Draft “draft-ietf-MANET-tora-spe03.txt”, November 2000. 2012. Accessed March http://tools.ietf.org/html/draft-ietf-manet-tora-spec-03Viana AC, De Amorim MD, Fdida S, de Rezende JF: Self-organization in spontaneous networks: the approach of DHT-based routing protocols. Ad Hoc Networks 2005, 3(5):589-606. 10.1016/j.adhoc.2004.08.006Lacuesta R, Peñalver L: IP addresses configuration in spontaneous networks. In Proceedings of the 9th WSEAS International Conference on Computers. Athens, Greece; 2005:1-6.Alvarez-Hamelin JI, Viana AC, de Amorim M Dias: Architectural considerations for a self-configuring routing scheme for spontaneous networks, Technical Report 1. 2005.Lacuesta R, Peñalver L: Automatic configuration of ad-hoc networks: establishing unique IP link-local addresses. In Proceedings of the International Conference on Emerging Security Information, Systems and Technologies (SECURWARE’07). Valencia, Spain; 2007:157-162.Foulks EF: Social network therapies and society: an overview. Contemp Fam Therapy 1985, 3(4):316-320.IBM: A Smarter Planet. 2012. http://www.ibm.com/smarterplanetMontenegro G, Kushalnagar N, Hui J, Culler D: RFC 4944: Transmission of IPv6 Packets over IEEE 802.15.4 Networks. 2007.Alcaraz C, Najera P, Lopez J, Roman R: Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?, 1st International workshop on the security of The internet of Things (SecIoT). tokyo (Japan); 2010. . Accessed January 2012 1er International Workshop on the Security of The Internet of Things (SecIoT 2010) http://www.nics.uma.es/seciot10/files/pdf/alcaraz_seciot10_paper.pdfFerscha A, Davies N, Schmidt A, Streitz N: Pervasive Socio-Technical Fabric. Procedia Computer Science 2011, 7: 88-91.Hubaux JP, Buttyán L, Capkun S: The quest for security in mobile ad-hoc networks, in Proceedings of the ACM Symposium on Mobile Ad-hoc Networking and Computing. 2001, 146-155.Wang Y, Varadharajan V: Interaction trust evaluation in decentralized environments, e-commerce and web technologies. In Proceedings of 5th International Conference on Electronic Commerce and Web Technologies, vol LNCS 3182. Springer; 2004:144-153.Jimin L, Junbao L, Aiguo A, Zhenpeng L: Two-way trust evaluation based on feedback. in Conference on Logistics Systems and Intelligent Management 2010, 3: 1910-1914.Daskapan S, Nurtanti I, Van den Berg J: Trust algorithms in P2P file sharing networks. Int J Internet Technol Secured Trans 2010, 2(1–2):174-200.Maña A, Koshutanski H, Pérez EJ: A trust negotiation based security framework for service provisioning in load-balancing clusters. Comput Secur 2012, 31(1):4-25. 10.1016/j.cose.2011.11.006Stajano F, Anderson R: The resurrecting duckling security issues for ad-hoc wireless networks. Security Protocols, 7th International Workshop Proceedings, Lecture notes in Computer Science, LNCS 1296 1999, 172-194.Balfanz D, Smetters DK, Stewart P, ChiWong H: Talking to strangers: authentication in ad-hoc wireless networks, in Symposium on Network and Distributed Systems Security (NDSS’02). San Diego, CA; 2002.Capkun S, Hubaux JP, Buttyán L: Mobility helps security in ad-hoc networks. In Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing. MD, USA: Annapolis; 2003:46-56.Metzger MJ: Privacy, trust, and disclosure: exploring barriers to electronic commerce. J Comput-Mediat Commun 2004, 9(4). http://jcmc.indiana.edu/vol9/issue4/metzger.html 2004, 9(4)
    corecore