156 research outputs found

    HYBRID ATTRIBUTE BASED ENCRYPTION AND VERIFIABLE DELEGATION FOR DATA CONFIDENTIALITY AND CORRECTNESS OF THE DELEGATION IN THE CLOUD

    Get PDF
    In the cloud, for accomplishing access control and keeping information classified, the information proprietors could embrace trait based encryption to encode the put away information. Clients with restricted registering power are however more inclined to assign the veil of the decoding undertaking to the cloud servers to diminish the figuring cost. Thus, quality based encryption with designation develops. In any case, there are admonitions and inquiries staying in the past significant works. For example, amid the assignment, the cloud servers could alter or supplant the designated ciphertext and react a fashioned figuring result with vindictive plan. They may likewise cheat the qualified clients by reacting them that they are ineligible with the end goal of cost sparing. Besides, amid the encryption, the entrance strategies may not be sufficiently adaptable too. Since approach for general circuits empowers to accomplish the most grounded type of access control, a development for acknowledging circuit ciphertext-approach property based cross breed encryption with undeniable designation has been considered in our work. In such a framework, joined with unquestionable calculation and encode then-macintosh instrument, the information classification, the fine-grained get to control what's more, the accuracy of the appointed figuring comes about are very much ensured in the meantime. Plus, our plan accomplishes security against picked plaintext assaults under the k-multilinear Decisional Diffie-Hellman supposition. In addition, a broad recreation crusade affirms the possibility and productivity of the proposed arrangement

    Output-sensitive Information flow analysis

    Get PDF
    Part 1: Full PapersInternational audienceConstant-time programming is a countermeasure to prevent cache based attacks where programs should not perform memory accesses that depend on secrets. In some cases this policy can be safely relaxed if one can prove that the program does not leak more information than the public outputs of the computation. We propose a novel approach for verifying constant-time programming based on a new information flow property, called output-sensitive non-interference. Noninterference states that a public observer cannot learn anything about the private data. Since real systems need to intentionally declassify some information, this property is too strong in practice. In order to take into account public outputs we proceed as follows: instead of using complex explicit declassification policies, we partition variables in three sets: input, output and leakage variables. Then, we propose a typing system to statically check that leakage variables do not leak more information about the secret inputs than the public normal output. The novelty of our approach is that we track the dependence of leakage variables with respect not only to the initial values of input variables (as in classical approaches for noninterference), but taking also into account the final values of output variables. We adapted this approach to LLVM IR and we developed a prototype to verify LLVM implementations

    The development and characterisation of porphyrin isothiocyanate–monoclonal antibody conjugates for photoimmunotherapy

    Get PDF
    A promising approach to increase the specificity of photosensitisers used in photodynamic therapy has been through conjugation to monoclonal antibodies (MAb) directed against tumour-associated antigens. Many of the conjugations performed to date have relied on the activated ester method, which can lead to impure conjugate preparations and antibody crosslinking. Here, we report the development of photosensitiser–MAb conjugates utilising two porphyrin isothiocyanates. The presence of a single reactive isothiocyanate allowed facile conjugation to MAb FSP 77 and 17.1A directed against internalising antigens, and MAb 35A7 that binds to a non-internalising antigen. The photosensitiser–MAb conjugates substituted with 1–3 mol of photosensitiser were characterised in vitro. No appreciable loss of immunoreactivity was observed and binding specificity was comparable to that of the unconjugated MAb. Substitution with photosensitiser had a minimal effect on antibody biodistribution in vivo for the majority of the conjugates, although a decreased serum half-life was observed using a cationic photosensitiser at the higher loading ratios. Tumour-to-normal tissue ratios as high as 33.5 were observed using MAb 35A7 conjugates. The internalising conjugate showed a higher level of phototoxicity as compared with the non-internalising reagent, using a cell line engineered to express both target antigens. These data demonstrate the applicability of the isothiocyanate group for the development of high-quality conjugates, and the use of internalising MAb to significantly increase the photodynamic efficiency of conjugates during photoimmunotherapy

    Bio-nanotechnology application in wastewater treatment

    Get PDF
    The nanoparticles have received high interest in the field of medicine and water purification, however, the nanomaterials produced by chemical and physical methods are considered hazardous, expensive, and leave behind harmful substances to the environment. This chapter aimed to focus on green-synthesized nanoparticles and their medical applications. Moreover, the chapter highlighted the applicability of the metallic nanoparticles (MNPs) in the inactivation of microbial cells due to their high surface and small particle size. Modifying nanomaterials produced by green-methods is safe, inexpensive, and easy. Therefore, the control and modification of nanoparticles and their properties were also discussed

    Robustly Safe Compilation

    Get PDF
    Secure compilers generate compiled code that withstands many target-level attacks such as alteration of control flow, data leaks or memory corruption. Many existing secure compilers are proven to be fully abstract, meaning that they reflect and preserve observational equivalence. Fully abstract compilation is strong and useful but, in certain cases, comes at the cost of requiring expensive runtime constructs in compiled code. These constructs may have no relevance for security, but are needed to accommodate differences between the source and target languages that fully abstract compilation necessarily needs

    Micropropagation and conservation of selected endangered anticancer medicinal plants from the Western Ghats of India

    Get PDF
    Globally, cancer is a constant battle which severely affects the human population. The major limitations of the anticancer drugs are the deleterious side effects on the quality of life. Plants play a vital role in curing many diseases with minimal or no side effects. Phytocompounds derived from various medicinal plants serve as the best source of drugs to treat cancer. The global demand for phytomedicines is mostly reached by the medicinal herbs from the tropical nations of the world even though many plant species are threatened with extinction. India is one of the mega diverse countries of the world due to its ecological habitats, latitudinal variation, and diverse climatic range. Western Ghats of India is one of the most important depositories of endemic herbs. It is found along the stretch of south western part of India and constitutes rain forest with more than 4000 diverse medicinal plant species. In recent times, many of these therapeutically valued herbs have become endangered and are being included under the red-listed plant category in this region. Due to a sharp rise in the demand for plant-based products, this rich collection is diminishing at an alarming rate that eventually triggered dangerous to biodiversity. Thus, conservation of the endangered medicinal plants has become a matter of importance. The conservation by using only in situ approaches may not be sufficient enough to safeguard such a huge bio-resource of endangered medicinal plants. Hence, the use of biotechnological methods would be vital to complement the ex vitro protection programs and help to reestablish endangered plant species. In this backdrop, the key tools of biotechnology that could assist plant conservation were developed in terms of in vitro regeneration, seed banking, DNA storage, pollen storage, germplasm storage, gene bank (field gene banking), tissue bank, and cryopreservation. In this chapter, an attempt has been made to critically review major endangered medicinal plants that possess anticancer compounds and their conservation aspects by integrating various biotechnological tool

    Glucose and glutamine fuel protein O-GlcNAcylation to control T cell self-renewal and malignancy

    Get PDF
    Sustained glucose and glutamine transport are essential for activated T lymphocytes to support ATP and macromolecule biosynthesis. We now show that glutamine and glucose also fuel an indispensible dynamic regulation of intracellular protein O-GlcNAcylation at key stages of T cell development, transformation and differentiation. Glucose and glutamine are precursors of UDP-GlcNAc, a substrate for cellular glycosyltransferases. Immune activated T cells contained higher concentrations of UDP-GlcNAc and increased intracellular protein O-GlcNAcylation controlled by the enzyme O-GlcNAc glycosyltransferase as compared to naïve cells. We identified Notch, the T cell antigen receptor and c-Myc as key controllers of T cell protein O-GlcNAcylation, via regulation of glucose and glutamine transport. Loss of O-GlcNAc transferase blocked T cell progenitor renewal, malignant transformation, and peripheral T cell clonal expansion. Nutrient-dependent signaling pathways regulated by O-GlcNAc glycosyltransferase are thus fundamental for T cell biology

    Biophysical Characterization and Membrane Interaction of the Two Fusion Loops of Glycoprotein B from Herpes Simplex Type I Virus

    Get PDF
    The molecular mechanism of entry of herpesviruses requires a multicomponent fusion system. Cell invasion by Herpes simplex virus (HSV) requires four virally encoded glycoproteins: namely gD, gB and gH/gL. The role of gB has remained elusive until recently when the crystal structure of HSV-1 gB became available and the fusion potential of gB was clearly demonstrated. Although much information on gB structure/function relationship has been gathered in recent years, the elucidation of the nature of the fine interactions between gB fusion loops and the membrane bilayer may help to understand the precise molecular mechanism behind herpesvirus-host cell membrane fusion. Here, we report the first biophysical study on the two fusion peptides of gB, with a particular focus on the effects determined by both peptides on lipid bilayers of various compositions. The two fusion loops constitute a structural subdomain wherein key hydrophobic amino acids form a ridge that is supported on both sides by charged residues. When used together the two fusion loops have the ability to significantly destabilize the target membrane bilayer, notwithstanding their low bilayer penetration when used separately. These data support the model of gB fusion loops insertion into cholesterol enriched membranes

    The Role of Endothelin-1 and Endothelin Receptor Antagonists in Inflammatory Response and Sepsis

    Get PDF
    corecore