17 research outputs found
Securing dynamic itineraries for mobile agent applications
In this paper we present a novel mechanism for the protection of dynamic itineraries for mobile agent applications. Itineraries that are decided as the agent goes are essential in complex applications based on mobile agents, but no approach has been presented until now to protect them. We have conceived a cryptographic scheme for shielding dynamic itineraries from tampering, impersonation and disclosure. By using trust strategically, our scheme provides a balanced trade-off between flexibility and security. Our protection scheme has been thought always bearing in mind a feasible implementation, and thus facilitates the development of applications that make use of it. An example application based on a real healthcare scenario is also presented to show its operation
Metodología para el Desarrollo Automatizado de Aplicaciones Seguras Basadas en Agentes Móviles
En este trabajo presentamos una metodología para el diseño de aplicaciones basadas en agentes móviles seguros, y unas herramientas para aplicar esta metodología. Los recientes avances en el campo de la seguridad de los agentes móviles pueden desbloquear el uso de esta tecnología, pero falta aún superar la complejidad que suponen al programador de las aplicaciones. La metodología propuesta, y el uso de nuestras herramientas, permiten agilizar el proceso de diseño de arquitecturas criptográficas, y de los agentes que las utilizan. La implementación presentada es muy flexible, y permite utilizarse con cualquier plataforma de agentes que siga los estándares de IEEE-FIPA y que permita los esquemas de protección conducidos por agente.En aquest treball presentem una metodologia per al disseny d'aplicacions basades en agents mòbils segurs, i unes eines per aplicar aquesta metodologia. Els recents avenços en el camp de la seguretat dels agents mòbils poden desbloquejar l'ús d'aquesta tecnologia, però falta encara superar la complexitat que suposen el programador de les aplicacions. la metodologia proposada i l'ús de les nostres eines, permeten agilitzar el procés de disseny d'arquitectures criptogràfiques, i dels agents que les utilitzen. la implementació presentada és molt flexible, i permet la seva utilització amb qualsevol plataforma d'agents que segueixi els estàndards de IEEE-FIPA i que permeti els esquemes de protecció conduïts per agent.In this work a methodology for the design of applications based on secure mobile agents is presented, and several tools for applying this methodology
Generación de Agentes Móviles Seguros a partir de Itinerarios y Arquitecturas Criptográficas
En este trabajo presentamos un esquema para la creación de agentes móviles seguros a partir de una representación del itinerario que deben seguir, el código a ejecutar, y una especificación de la arquitectura criptográfica con la que estarán protegidos. Este tipo de agentes es muy útil en aplicaciones seguras, pero su programación resulta muy complicada. El esquema propuesto facilita enormemente esta tarea, automatizando el proceso a partir de especificaciones concretas. En la práctica hemos conseguido un sistema de generación de código de fácil utilización que permite, no sólo la programación de agentes móviles seguros, sino también la creación sencilla de nuevos esquemas criptográficos para la protección del código y los datos de los agentes. El sistema puede usarse para desarrollar aplicaciones de propósito general basadas en el framework de ejecución de agentes Jade.En aquest treball presentem un esquema per a la creació d'agents mòbils segurs a partir d'una representació de l'itinerari que han de seguir, el codi a executar, i una especificació de l'arquitectura criptogràfica amb què estaran protegits. Aquest tipus d'agents és molt útil en aplicacions segures, però la seva programació és molt complicada. L'esquema proposat facilita enormement aquesta tasca, automatitzant el procés a partir d'especificacions concretes. A la pràctica hem aconseguit un sistema de generació de codi de fàcil utilització que permet, no només la programació d'agents mòbils segurs, sinó també la creació senzilla de nous esquemes criptogràfics per a la protecció del codi i les dades dels agents. El sistema es pot utilitzar per construir aplicacions de finalitat general basades en el framework d'execució d'agents Jade.In this work we present a schema for the creation of the secure mobile agents from a representation of the itinerary which they must follow, the code to execute and the specification of the cryptographic architecture by which they will be protected
Matched cohort study on the efficacy of tocilizumab in patients with COVID-19
Background: Tocilizumab has been proposed as a treatment for the new disease COVID-19, however, there is not enough scientific evidence to support this treatment. The objective of this study is to analyze whether the use of tocilizumab is associated with respiratory improvement and a shorter time to discharge in patients with COVID-19 and lung involvement. Methods: Observational study on a cohort of 418 patients, admitted to three county hospitals in Catalonia (Spain). Patients admitted consecutively were included and followed until discharge or up to 30 days of admission. A sub-cohort of patients treated with tocilizumab and a sub-cohort of control patients were identified, matched by a large number of risk factors and clinical variables. Sub-cohorts were also matched by the number of other treatments for COVID-19 that patients received. Increment in SAFI (inspired oxygen fraction / saturation) 48 h after the start of treatment, and time to discharge, were the primary outcomes. Mortality, which was a secondary outcome, was analyzed in the total cohort, by using logistic regression models, adjusted by confounders. Results: There were 96 patients treated with tocilizumab. Of them, 22 patients could be matched with an equivalent number of control patients. The increment in SAFI from baseline to 48 h of treatment, was not significantly different between groups (tocilizumab: −0.04; control: 0.09; p = 0.636). Also, no difference in time to discharge was found between the two sub-cohorts (logrank test: p = 0.472). The logistic regression models, did not show an effect of tocilizumab on mortality (OR 0.99; p = 0.990). Conclusions: We did not find a clinical benefit associated with the use tocilizumab, in terms of respiratory function at 48 h of treatment, or time to discharge
Association between COVID-19 prognosis and disease presentation, comorbidities and chronic treatment of hospitalized patients
mportance The rapid pandemic expansion of the disease caused by the new SARS-CoV-2 virus has compromised health systems worldwide. Knowledge of prognostic factors in affected patients can help optimize care. Objective The objective of this study was to analyze the relationship between the prognosis of COVID-19 and the form of presentation of the disease, the previous pathologies of patients and their chronic treatments. Design, participants and locations This was an observational study on a cohort of 418 patients admitted to three regional hospitals in Catalonia (Spain). As primary outcomes, severe disease (need for oxygen therapy via nonrebreather mask or mechanical ventilation) and death were studied. Multivariate binary logistic regression models were performed to study the association between the different factors and the results. Results Advanced age, male sex and obesity were independent markers of poor prognosis. The most frequent presenting symptom was fever, while dyspnea was associated with severe disease and the presence of cough with greater survival. Low oxygen saturation in the emergency room, elevated CRP in the emergency room and initial radiological involvement were all related to worse prognosis. The presence of eosinophilia (% of eosinophils) was an independent marker of less severe disease. Conclusions This study identified the most robust markers of poor prognosis for COVID-19. These results can help to correctly stratify patients at the beginning of hospitalization based on the risk of developing severe disease
Sub-micro- and nano-sized polyethylene terephthalate deconstruction with engineered protein nanopores
The identification or design of biocatalysts to mitigate the accumulation of plastics, including sub-micro- and nano-sized polyethylene terephthalate (nPET), is becoming a global challenge. Here we computationally incorporated two hydrolytic active sites with geometries similar to that of Idionella sakaiensis PET hydrolase, to fragaceatoxin C (FraC), a membrane pore-forming protein. FraCm1/m2 could be assembled into octameric nanopores (7.0 nm high × 1.6–6.0 nm entry), which deconstructed (40 °C, pH 7.0) nPET from GoodFellow, commodities and plastic bottles. FraCm1 and FraCm2 degrade nPET by endo- and exo-type chain scission. While FraCm1 produces bis(2-hydroxyethyl) terephthalate as the main product, FraCm2 yields a high diversity of oligomers and terephthalic acid. Mechanistic and biochemical differences with benchmark PET hydrolases, along with pore and nPET dynamics, suggest that these pore-forming protein catalytic nanoreactors do not deconstruct macro-PET but are promising in nanotechnology for filtering, capturing and breaking down nPET, for example, in wastewater treatment plants. [Figure not available: see fulltext.]. © 2023, The Author(s).This study was conducted under the auspices of the FuturEnzyme Project funded by the European Union’s Horizon 2020 Research and Innovation Programme under the auspices of the FuturEnzyme Project (grant agreement no. 101000327) and the PlasticsFatE project (grant agreement no. 95921), and Horizon Europe Research and Innovation Programme under grant agreement no. GA101060625 (Nymphe project). We also acknowledge financial support under grants PID2020-112758RB-I00 (M.F.), PDC2021-121534-I00 (M.F.), TED2021-130544B-I00 (M.F.), PID2019-106370RB-I00 (V.G.) and PID2019-105838RB-C31 (F.J.P.) from the Ministerio de Ciencia e Innovación, Agencia Estatal de Investigación (AEI) (Digital Object Identifier MCIN/AEI/10.13039/501100011033), Fondo Europeo de Desarrollo Regional (ERDF) A way of making Europe and the European Union NextGenerationEU/PRTR, UCM-Banco Santander Grants PR87/19-22556 and PR108/20-26896 and UnaEuropa (Unano) SF2106 (to A.M.P.). S.G.-L. was supported by a Real Colegio Complutense Postdoctoral Fellowship for Distinguished Junior Scholars. S.R. thanks the Spanish Ministry of Science and Innovation for a PhD fellowship (FPU19/00608). D.H.-M. thanks Complutense University of Madrid and Banco Santander for a PhD fellowship (CT82/20/CT83/20). A.R.-M. thanks the Spanish Ministry of Science and Innovation for a PhD fellowship (PRE2020-091825) and the project PID2019-106370RB-I00. We thank M. J. Vicente for the ESI–MS analysis, performed at the Servicio Interdepartamental de Investigación (SIDI) from the Autonomous University of Madrid, Spain.Supplementary dataPeer reviewe
Securing dynamic itineraries for mobile agent applications
In this paper we present a novel mechanism for the protection of dynamic itineraries for mobile agent applications. Itineraries that are decided as the agent goes are essential in complex applications based on mobile agents, but no approach has been presented until now to protect them. We have conceived a cryptographic scheme for shielding dynamic itineraries from tampering, impersonation and disclosure. By using trust strategically, our scheme provides a balanced trade-off between flexibility and security. Our protection scheme has been thought always bearing in mind a feasible implementation, and thus facilitates the development of applications that make use of it. An example application based on a real healthcare scenario is also presented to show its operation
Generación de Agentes Móviles Seguros a partir de Itinerarios y Arquitecturas Criptográficas
En este trabajo presentamos un esquema para la creación de agentes móviles seguros a partir de una representación del itinerario que deben seguir, el código a ejecutar, y una especificación de la arquitectura criptográfica con la que estarán protegidos. Este tipo de agentes es muy útil en aplicaciones seguras, pero su programación resulta muy complicada. El esquema propuesto facilita enormemente esta tarea, automatizando el proceso a partir de especificaciones concretas. En la práctica hemos conseguido un sistema de generación de código de fácil utilización que permite, no sólo la programación de agentes móviles seguros, sino también la creación sencilla de nuevos esquemas criptográficos para la protección del código y los datos de los agentes. El sistema puede usarse para desarrollar aplicaciones de propósito general basadas en el framework de ejecución de agentes Jade.En aquest treball presentem un esquema per a la creació d'agents mòbils segurs a partir d'una representació de l'itinerari que han de seguir, el codi a executar, i una especificació de l'arquitectura criptogràfica amb què estaran protegits. Aquest tipus d'agents és molt útil en aplicacions segures, però la seva programació és molt complicada. L'esquema proposat facilita enormement aquesta tasca, automatitzant el procés a partir d'especificacions concretes. A la pràctica hem aconseguit un sistema de generació de codi de fàcil utilització que permet, no només la programació d'agents mòbils segurs, sinó també la creació senzilla de nous esquemes criptogràfics per a la protecció del codi i les dades dels agents. El sistema es pot utilitzar per construir aplicacions de finalitat general basades en el framework d'execució d'agents Jade.In this work we present a schema for the creation of the secure mobile agents from a representation of the itinerary which they must follow, the code to execute and the specification of the cryptographic architecture by which they will be protected
Promoting the development of secure mobile agent applications
Peer-reviewedIn this paper we present a software architecture and a development environment for the implementation of applications based on secure mobile agents. Recent breakthroughs in mobile agent security have unblocked this technology, but there is still one important issue to overcome: the complexity of programming applications using these security solutions. Our proposal aims to facilitate and speed up the process of implementing cryptographic protocols, and to allow the reuse of these protocols for the development of secure mobile agents. As a result, the proposed architecture and development environment promote the use of mobile agent technology for the implementation of secure distributed applications.En este artículo presentamos una arquitectura de software y un entorno de desarrollo para la implementación de aplicaciones basadas en agentes móviles seguros. Recientes avances en la seguridad de los agentes móviles han desbloqueado esta tecnología, pero todavía queda una cuestión importante por superar: la complejidad de la programación de aplicaciones utilizando estas soluciones seguras. Nuestra propuesta tiene por objeto facilitar y acelerar el proceso de implementación de protocolos criptográficos, y permitir la reutilización de estos protocolos para el desarrollo de agentes móviles seguros. Como resultado, la arquitectura propuesta y el entorno de desarrollo fomentan el uso de la tecnología de agentes móviles para la implementación de aplicaciones distribuidas seguras.En aquest article presentem una arquitectura de programari i un entorn de desenvolupament per a la implementació d'aplicacions basades en agents mòbils segurs. Recents avanços en la seguretat dels agents mòbils han desbloquejat aquesta tecnologia, però encara resta una qüestió important per superar: la complexitat de la programació d'aplicacions utilitzant aquestes solucions segures. La nostra proposta té per objecte facilitar i accelerar el procés d'implementació de protocols criptogràfics, i permetre la reutilització d'aquests protocols per al desenvolupament d'agents mòbils segurs. Com a resultat, l'arquitectura proposada i l'entorn de desenvolupament fomenten l'ús de la tecnologia d'agents mòbils per a la implementació d'aplicacions distribuïdes segures
Protecting mobile agents from external replay attacks
Peer-reviewedThis paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solutions is that they do not allow the agent to perform legal migrations to the same platform several times. The aim of this paper is to address these issues by presenting a novel solution based on authorisation entities, which allow the agent to be reexecuted on the same platform a number of times determined at runtime. The proposed protocol is secure under the assumption that authorisation entities are trusted.Preprin