10 research outputs found

    Cutaneous metastases from primary carcinoma larynx - A rare presentation

    Get PDF
    The incidence of secondary cutaneous deposits from squamous cell carcinoma larynx is very rare. We report a sixty nine year old male who was diagnosed with squamous cell carcinoma of larynx who was treated with radiotherapy and chemotherapy, presented with multiple grouped nodules over the neck  in a zosterifom pattern. Eventhough nodular, plaque-like, exuberant growth and sclerodermoid skin metastases have been described in laryngeal carcinoma, metastases to the skin in a grouped pattern is uncommon with only one case reported so far in the literture. The possible hypothesised cause of dermatomal metastatic distribution my be secondary to perineural lymphatic invasion and invasion of dorsal root gangliaby malignant cells.

    A Hybrid trust model for authorisation using trusted platforms

    Full text link
    Authorisation systems play a vital role in protecting access to resources in distributed systems. Traditionally, authorisation is performed at the user level to determine whether a user has the necessary privileges to access a requested resource. However, when it comes to the user's platform, it is often assumed that the system hosting the user and the software running on it are 'trusted' and that it will behave correctly. In this paper, we propose a hybrid trust model that provides techniques for authorisation taking into account state of user platforms leveraging trusted computing technology. The model encompasses the notions of 'hard' and 'soft' trust to determine whether a platform can be trusted for authorisation. We first explain the rationale for the model and then provide a description of the proposed hybrid model.8 page(s

    On the design of a trust enhanced distributed authorisation architecture for service oriented architectures

    Full text link
    Authorisation systems play a vital role in protecting access to resources in distributed systems. Traditionally, authorisation is performed at the user level to determine whether a user has the necessary privileges to access a requested resource. However, when it comes to the user's platform, it is often assumed that the system hosting the user and the software running on it are 'trusted' and that it will behave correctly. In this paper, we propose a comprehensive trust enhanced distributed authorisation architecture that provides a holistic framework for authorisation taking into account the state of a user platform. The model encompasses the notions of 'hard' and 'soft' trust to determine whether a platform can be trusted for authorisation. We first explain the rationale for the overall model and then describe our hybrid model with 'hard' and 'soft' trust components, followed by a description of the system architecture. We then illustrate proposed architecture in the context of a simple scenario involving a social networking system.8 page(s

    Green Synthesis of Alginate Encapsulated Iron Nanoparticles for Decolorization of Dye

    Full text link
    Abstract — The synthesis of iron nanoparticles (Fe NPs) using green tea leaves has been found to be eco friendly (green synthesis) compared to conventional method which uses chemicals. The green tea extract acts as both reducing and capping agent during the synthesis procedure. The iron nanoparticles formed was used for removal of both organic and inorganic pollutants (dyes) from aqueous solutions. The formed Iron nanoparticles were used as catalyst for degradation of dye. Iron nanoparticles contains iron oxides and zero valent iron (ZVI), which can be used as FENTONlike catalyst, where Fenton is used for degradation of aqueous organic solutes. Iron nanoparticles encapsulated with alginate beads were used for degradation of acid and basic dye. The different parameters such as effect of concentration, pH, dosage and ionic strength of the dye were discussed. The result suggests that the iron nanoparticles were more efficient in decolorization of acidic than basic dye
    corecore