160 research outputs found

    SUMO chain formation is required for response to replication arrest in S. pombe

    Get PDF
    SUMO is a ubiquitin-like protein that is post-translationally attached to one or more lysine residues on target proteins. Despite having only 18% sequence identity with ubiquitin, SUMO contains the conserved betabetaalphabetabetaalphabeta fold present in ubiquitin. However, SUMO differs from ubiquitin in having an extended N-terminus. In S. pombe the N-terminus of SUMO/Pmt3 is significantly longer than those of SUMO in S. cerevisiae, human and Drosophila. Here we investigate the role of this N-terminal region. We have used two dimensional gel electrophoresis to demonstrate that S. pombe SUMO/Pmt3 is phosphorylated, and that this occurs on serine residues at the extreme N-terminus of the protein. Mutation of these residues (in pmt3-1) results in a dramatic reduction in both the levels of high Mr SUMO-containing species and of total SUMO/Pmt3, indicating that phosphorylation of SUMO/Pmt3 is required for its stability. Despite the significant reduction in high Mr SUMO-containing species, pmt3-1 cells do not display an aberrant cell morphology or sensitivity to genotoxins or stress. Additionally, we demonstrate that two lysine residues in the N-terminus of S. pombe SUMO/Pmt3 (K14 and K30) can act as acceptor sites for SUMO chain formation in vitro. Inability to form SUMO chains results in aberrant cell and nuclear morphologies, including stretched and fragmented chromatin. SUMO chain mutants are sensitive to the DNA synthesis inhibitor, hydroxyurea (HU), but not to other genotoxins, such as UV, MMS or CPT. This implies a role for SUMO chains in the response to replication arrest in S. pomb

    Public perception of "scarless" surgery : a critical analysis of the literature

    Get PDF
    Evidence relating to the perception and view of patients and physicians on natural orifice transluminal endoscopic surgery (NOTES) and laparoendoscopic single-site surgery (LESS) was scrutinized. A comprehensive literature search was performed through PubMed. A total of 18 studies were included in the analysis. Patients demonstrated interest in scarless surgery, with a preference for LESS over NOTES. Safety and efficacy remain the key factors in the decision-making process of patients. With more information about the safety and reproducibility of LESS and NOTES, and with improved educational efforts, patients and physicians alike may feel more comfortable in widespread application of scarless surgery.(undefined

    Localization of recombination proteins and Srs2 reveals anti-recombinase function in vivo

    Get PDF
    Homologous recombination (HR), although an important DNA repair mechanism, is dangerous to the cell if improperly regulated. The Srs2 β€œanti-recombinase” restricts HR by disassembling the Rad51 nucleoprotein filament, an intermediate preceding the exchange of homologous DNA strands. Here, we cytologically characterize Srs2 function in vivo and describe a novel mechanism for regulating the initiation of HR. We find that Srs2 is recruited separately to replication and repair centers and identify the genetic requirements for recruitment. In the absence of Srs2 activity, Rad51 foci accumulate, and surprisingly, can form in the absence of Rad52 mediation. However, these Rad51 foci do not represent repair-proficient filaments, as determined by recombination assays. Antagonistic roles for Rad52 and Srs2 in Rad51 filament formation are also observed in vitro. Furthermore, we provide evidence that Srs2 removes Rad51 indiscriminately from DNA, while the Rad52 protein coordinates appropriate filament reformation. This constant breakdown and rebuilding of filaments may act as a stringent quality control mechanism during HR

    Crystal Structure of UBA2ufd-Ubc9: Insights into E1-E2 Interactions in Sumo Pathways

    Get PDF
    Canonical ubiquitin-like proteins (UBLs) such as ubiquitin, Sumo, NEDD8, and ISG15 are ligated to targets by E1-E2-E3 multienzyme cascades. The Sumo cascade, conserved among all eukaryotes, regulates numerous biological processes including protein localization, transcription, DNA replication, and mitosis. Sumo conjugation is initiated by the heterodimeric Aos1-Uba2 E1 enzyme (in humans called Sae1-Uba2), which activates Sumo's C-terminus, binds the dedicated E2 enzyme Ubc9, and promotes Sumo C-terminal transfer between the Uba2 and Ubc9 catalytic cysteines. To gain insights into details of E1-E2 interactions in the Sumo pathway, we determined crystal structures of the C-terminal ubiquitin fold domain (ufd) from yeast Uba2 (Uba2ufd), alone and in complex with Ubc9. The overall structures of both yeast Uba2ufd and Ubc9 superimpose well on their individual human counterparts, suggesting conservation of fundamental features of Sumo conjugation. Docking the Uba2ufd-Ubc9 and prior full-length human Uba2 structures allows generation of models for steps in Sumo transfer from Uba2 to Ubc9, and supports the notion that Uba2 undergoes remarkable conformational changes during the reaction. Comparisons to previous structures from the NEDD8 cascade demonstrate that UBL cascades generally utilize some parallel E1-E2 interaction surfaces. In addition, the structure of the Uba2ufd-Ubc9 complex reveals interactions unique to Sumo E1 and E2. Comparison with a previous Ubc9-E3 complex structure demonstrates overlap between Uba2 and E3 binding sites on Ubc9, indicating that loading with Sumo and E3-catalyzed transfer to substrates are strictly separate steps. The results suggest mechanisms establishing specificity and order in Sumo conjugation cascades

    Protection against DDoS Attacks Based on Traffic Level Measurements

    No full text
    A method for protecting an Internet server against a bandwidth-consuming DDoS attack is proposed and analyzed. Incoming traffic is monitored continuously and "dangerous " traffic intensity rises are detected. Such an event activates a traffic filtering rule which pushes down the incoming aggregate traffic to an acceptable level by discarding excess packets according to the measured relative traffic levels of active sources. Compared to other studies, our method has a structurally stronger base: legitimate traffic to the server is not necessarily hindered because of the attack or the traffic suppression. The method is supported by an analysis and a simulation as well

    A Game Based Analysis of the Client Puzzle Approach to Defend Against DoS Attacks

    No full text
    DoS attacks are aimed at the loss of or the reduction in availability, which is one of the most important general security requirements in computer networks. A promising approach proposed to alleviate the problem of DoS attacks is to use client puzzles. In this paper, we study this approach using the apparatus of game theory. In our analysis, we derive the optimal strategy for the attacked server (e.g., a web server on the Internet) in all conceivable cases. We also present two new client puzzles as examples

    Information security aspects of Industry 4.0

    No full text
    • …
    corecore