73 research outputs found

    CamFlow: Managed Data-sharing for Cloud Services

    Full text link
    A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many companies build on this infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS applications. From the start, strong isolation between cloud tenants was seen to be of paramount importance, provided first by virtual machines (VM) and later by containers, which share the operating system (OS) kernel. Increasingly it is the case that applications also require facilities to effect isolation and protection of data managed by those applications. They also require flexible data sharing with other applications, often across the traditional cloud-isolation boundaries; for example, when government provides many related services for its citizens on a common platform. Similar considerations apply to the end-users of applications. But in particular, the incorporation of cloud services within `Internet of Things' architectures is driving the requirements for both protection and cross-application data sharing. These concerns relate to the management of data. Traditional access control is application and principal/role specific, applied at policy enforcement points, after which there is no subsequent control over where data flows; a crucial issue once data has left its owner's control by cloud-hosted applications and within cloud-services. Information Flow Control (IFC), in addition, offers system-wide, end-to-end, flow control based on the properties of the data. We discuss the potential of cloud-deployed IFC for enforcing owners' dataflow policy with regard to protection and sharing, as well as safeguarding against malicious or buggy software. In addition, the audit log associated with IFC provides transparency, giving configurable system-wide visibility over data flows. [...]Comment: 14 pages, 8 figure

    Information Flow Audit for Transparency and Compliance in the Handling of Personal Data

    Get PDF
    This is the author accepted manuscript. The final version is available from IEEE via http://dx.doi.org/10.1109/IC2EW.2016.29The adoption of cloud computing is increasing and its use is becoming widespread in many sectors. As the proportion of services provided using cloud computing increases, legal and regulatory issues are becoming more significant. In this paper we explore how an Information Flow Audit (IFA) mechanism, that provides key data regarding provenance, can be used to verify compliance with regulatory and contractual duty, and survey potential extensions. We explore the use of IFA for such a purpose through a smart electricity metering use case derived from a French Data Protection Agency recommendation.This work was supported by UK Engineering and Physical Sciences Research Council grant EP/K011510 CloudSafetyNet: End-to-End Application Security in the Cloud. We acknowledge the support of Microsoft through the Microsoft Cloud Computing Research Centre

    Introducing the Fair and Logical Trade Project

    Get PDF
    We introduce our framework for logic-based composi- tional e-commerce interaction. We aim to provide open- source software which adds a light-weight formal messag- ing layer to business communications, to increase the ac- cessibility of e-commerce infrastructure to smaller business players. In the process we hope to develop a comprehensive theory of business communication. We present the logical structures and techniques we apply, and provide initial pro- totype testing results

    Spons & Shields:practical isolation for trusted execution

    Get PDF

    Covalent inhibitors of EGFR family protein kinases induce degradation of human Tribbles 2 (TRIB2) pseudokinase in cancer cells

    Get PDF
    A major challenge associated with biochemical and cellular analysis of pseudokinases is a lack of target-validated small-molecule compounds with which to probe function. Tribbles 2 (TRIB2) is a cancer-associated pseudokinase with a diverse interactome, including the canonical AKT signaling module. There is substantial evidence that human TRIB2 promotes survival and drug resistance in solid tumors and blood cancers and therefore is of interest as a therapeutic target. The unusual TRIB2 pseudokinase domain contains a unique cysteine-rich C-helix and interacts with a conserved peptide motif in its own carboxyl-terminal tail, which also supports its interaction with E3 ubiquitin ligases. We found that TRIB2 is a target of previously described small-molecule protein kinase inhibitors, which were originally designed to inhibit the canonical kinase domains of epidermal growth factor receptor tyrosine kinase family members. Using a thermal shift assay, we discovered TRIB2-binding compounds within the Published Kinase Inhibitor Set (PKIS) and used a drug repurposing approach to classify compounds that either stabilized or destabilized TRIB2 in vitro. TRIB2 destabilizing agents, including the covalent drug afatinib, led to rapid TRIB2 degradation in human AML cancer cells, eliciting tractable effects on signaling and survival. Our data reveal new drug leads for the development of TRIB2-degrading compounds, which will also be invaluable for unraveling the cellular mechanisms of TRIB2-based signaling. Our study highlights that small molecule–induced protein down-regulation through drug “off-targets” might be relevant for other inhibitors that serendipitously target pseudokinases

    Structure-based design of nucleoside-derived analogues as sulfotransferase inhibitors

    Get PDF
    Sulfotransferases (STs) catalyse the transfer of a sulfonyl group (‘sulfation’) from the enzyme co-factor 3ʹ-phosphoadenosine 5ʹ-phosphosulfate (PAPS) to a variety of biomolecules. Tyrosine sulfation of proteins and carbohydrate sulfation play a crucial role in many protein-protein interactions and cell signalling pathways in the extracellular matrix. This is catalysed by several membrane-bound STs, including tyrosylprotein sulfotransferase 1 (TPST1) and heparan sulfate 2-O-sulfotransferase (HS2ST1). Recently, involvement of these enzymes and their post-translational modifications in a growing number of disease areas has been reported, including inflammation, cancer and Alzheimer’s disease. Despite their growing importance, the development of small molecules to probe the biological effect of TPST and carbohydrate ST inhibition remains in its infancy. We have used a structure-based approach and molecular docking to design a library of adenosine 3',5'-diphosphate (PAP) and PAPS mimetics based upon 2'-deoxyadenosine and using 2'-deoxy-PAP as a benchmark. The use of allyl groups as masked methyl esters was exploited in the synthesis of PAP-mimetics, and click chemistry was employed for the divergent synthesis of a series of PAPS-mimetics. A suite of in vitro assays employing TPST1 and HS2ST, and a kinase counter screen, were used to evaluate inhibitory parameters and relative specificity for the STs

    Plk4 and Aurora A cooperate in the initiation of acentriolar spindle assembly in mammalian oocytes

    Get PDF
    Establishing the bipolar spindle in mammalian oocytes after their prolonged arrest is crucial for meiotic fidelity and subsequent development. In contrast to somatic cells, the first meiotic spindle assembles in the absence of centriole-containing centrosomes. Ran-GTP can promote microtubule nucleation near chromatin, but additional unidentified factors are postulated for the activity of multiple acentriolar microtubule organizing centers in the oocyte. We now demonstrate that partially overlapping, nonredundant functions of Aurora A and Plk4 kinases contribute to initiate acentriolar meiosis I spindle formation. Loss of microtubule nucleation after simultaneous chemical inhibition of both kinases can be significantly rescued by drug-resistant Aurora A alone. Drug-resistant Plk4 can enhance Aurora A–mediated rescue, and, accordingly, Plk4 can phosphorylate and potentiate the activity of Aurora A in vitro. Both kinases function distinctly from Ran, which amplifies microtubule growth. We conclude that Aurora A and Plk4 are rate-limiting factors contributing to microtubule growth as the acentriolar oocyte resumes meiosis.L. Bury was the recipient of a Cancer Research UK research studentship from Cambridge Cancer Centre. P.A. Coelho is supported by Cancer Research UK program grant C3/A18795 to D.M. Glover. M. Zernicka-Goetz is a Wellcome Trust Senior Fellow. P.A. Eyers acknowledges North West Cancer Research for additional support (grants CR1037 and CR1088)

    Optimizing structural modeling for a specific protein scaffold: knottins or inhibitor cystine knots

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Knottins are small, diverse and stable proteins with important drug design potential. They can be classified in 30 families which cover a wide range of sequences (1621 sequenced), three-dimensional structures (155 solved) and functions (> 10). Inter knottin similarity lies mainly between 15% and 40% sequence identity and 1.5 to 4.5 Å backbone deviations although they all share a tightly knotted disulfide core. This important variability is likely to arise from the highly diverse loops which connect the successive knotted cysteines. The prediction of structural models for all knottin sequences would open new directions for the analysis of interaction sites and to provide a better understanding of the structural and functional organization of proteins sharing this scaffold.</p> <p>Results</p> <p>We have designed an automated modeling procedure for predicting the three-dimensionnal structure of knottins. The different steps of the homology modeling pipeline were carefully optimized relatively to a test set of knottins with known structures: template selection and alignment, extraction of structural constraints and model building, model evaluation and refinement. After optimization, the accuracy of predicted models was shown to lie between 1.50 and 1.96 Å from native structures at 50% and 10% maximum sequence identity levels, respectively. These average model deviations represent an improvement varying between 0.74 and 1.17 Å over a basic homology modeling derived from a unique template. A database of 1621 structural models for all known knottin sequences was generated and is freely accessible from our web server at <url>http://knottin.cbs.cnrs.fr</url>. Models can also be interactively constructed from any knottin sequence using the structure prediction module Knoter1D3D available from our protein analysis toolkit PAT at <url>http://pat.cbs.cnrs.fr</url>.</p> <p>Conclusions</p> <p>This work explores different directions for a systematic homology modeling of a diverse family of protein sequences. In particular, we have shown that the accuracy of the models constructed at a low level of sequence identity can be improved by 1) a careful optimization of the modeling procedure, 2) the combination of multiple structural templates and 3) the use of conserved structural features as modeling restraints.</p

    Data provenance to audit compliance with privacy policy in the Internet of Things

    Get PDF
    Managing privacy in the IoT presents a significant challenge. We make the case that information obtained by auditing the flows of data can assist in demonstrating that the systems handling personal data satisfy regulatory and user requirements. Thus, components handling personal data should be audited to demonstrate that their actions comply with all such policies and requirements. A valuable side-effect of this approach is that such an auditing process will highlight areas where technical enforcement has been incompletely or incorrectly specified. There is a clear role for technical assistance in aligning privacy policy enforcement mechanisms with data protection regulations. The first step necessary in producing technology to accomplish this alignment is to gather evidence of data flows. We describe our work producing, representing and querying audit data and discuss outstanding challenges.Engineering and Applied Science
    corecore