27 research outputs found

    Participant Domain Name Token Profile for security enhancements supporting service oriented architecture

    Get PDF
    This research proposes a new secure token profile for improving the existing Web Services security standards. It provides a new authentication mechanism. This additional level of security is important for the Service-Oriented Architecture (SOA), which is an architectural style that uses a set of principles and design rules to shape interacting applications and maintain interoperability. Currently, the market push is towards SOA, which provides several advantages, for instance: integration with heterogeneous systems, services reuse, standardization of data exchange, etc. Web Services is one of the technologies to implement SOA and it can be implemented using Simple Object Access Protocol (SOAP). A SOAP-based Web Service relies on XML for its message format and common application layer protocols for message negotiation and transmission. However, it is a security challenge when a message is transmitted over the network, especially on the Internet. The Organization for Advancement of Structured Information Standards (OASIS) announced a set of Web Services Security standards that focus on two major areas. “Who” can use the Web Service and “What” are the permissions. However, the location or domain of the message sender is not authenticated. Therefore, a new secure token profile called: Participant Domain Name Token Profile (PDNT) is created to tackle this issue. The PDNT provides a new security feature, which the existing token profiles do not address. Location-based authentication is achieved if adopting the PDNT when using Web Services. In the performance evaluation, PDNT is demonstrated to be significantly faster than other secure token profiles. The processing overhead of using the PDNT with other secure token profiles is very small given the additional security provided. Therefore all the participants can acquire the benefits of increased security and performance at low cost

    China

    Full text link
    Economic development processes in post-1949 China can be divided into two periods. In the first, 1950-70, the economy was extensively and intensively controlled by the state with a priority for developing heavy industries. In the second, since the 80s and known as the \u27reform period,\u27 the Chinese economy has increasingly been integrated with the world economy and relying on light (rural) industries as the prime motor of economic growth. Yet, in both these periods, Chinese policymakers shared the same \u27developmental\u27 philosophy in which social costs, that is the reproduction costs of human labour and nature, are largely ignored. The following is a critical sketch of government policies and their impact on the domestic population in these two periods

    Guidelines for the use and interpretation of assays for monitoring autophagy (3rd edition)

    Get PDF
    In 2008 we published the first set of guidelines for standardizing research in autophagy. Since then, research on this topic has continued to accelerate, and many new scientists have entered the field. Our knowledge base and relevant new technologies have also been expanding. Accordingly, it is important to update these guidelines for monitoring autophagy in different organisms. Various reviews have described the range of assays that have been used for this purpose. Nevertheless, there continues to be confusion regarding acceptable methods to measure autophagy, especially in multicellular eukaryotes. For example, a key point that needs to be emphasized is that there is a difference between measurements that monitor the numbers or volume of autophagic elements (e.g., autophagosomes or autolysosomes) at any stage of the autophagic process versus those that measure fl ux through the autophagy pathway (i.e., the complete process including the amount and rate of cargo sequestered and degraded). In particular, a block in macroautophagy that results in autophagosome accumulation must be differentiated from stimuli that increase autophagic activity, defi ned as increased autophagy induction coupled with increased delivery to, and degradation within, lysosomes (inmost higher eukaryotes and some protists such as Dictyostelium ) or the vacuole (in plants and fungi). In other words, it is especially important that investigators new to the fi eld understand that the appearance of more autophagosomes does not necessarily equate with more autophagy. In fact, in many cases, autophagosomes accumulate because of a block in trafficking to lysosomes without a concomitant change in autophagosome biogenesis, whereas an increase in autolysosomes may reflect a reduction in degradative activity. It is worth emphasizing here that lysosomal digestion is a stage of autophagy and evaluating its competence is a crucial part of the evaluation of autophagic flux, or complete autophagy. Here, we present a set of guidelines for the selection and interpretation of methods for use by investigators who aim to examine macroautophagy and related processes, as well as for reviewers who need to provide realistic and reasonable critiques of papers that are focused on these processes. These guidelines are not meant to be a formulaic set of rules, because the appropriate assays depend in part on the question being asked and the system being used. In addition, we emphasize that no individual assay is guaranteed to be the most appropriate one in every situation, and we strongly recommend the use of multiple assays to monitor autophagy. Along these lines, because of the potential for pleiotropic effects due to blocking autophagy through genetic manipulation it is imperative to delete or knock down more than one autophagy-related gene. In addition, some individual Atg proteins, or groups of proteins, are involved in other cellular pathways so not all Atg proteins can be used as a specific marker for an autophagic process. In these guidelines, we consider these various methods of assessing autophagy and what information can, or cannot, be obtained from them. Finally, by discussing the merits and limits of particular autophagy assays, we hope to encourage technical innovation in the field

    Guidelines for the use and interpretation of assays for monitoring autophagy (4th edition)1.

    Get PDF
    In 2008, we published the first set of guidelines for standardizing research in autophagy. Since then, this topic has received increasing attention, and many scientists have entered the field. Our knowledge base and relevant new technologies have also been expanding. Thus, it is important to formulate on a regular basis updated guidelines for monitoring autophagy in different organisms. Despite numerous reviews, there continues to be confusion regarding acceptable methods to evaluate autophagy, especially in multicellular eukaryotes. Here, we present a set of guidelines for investigators to select and interpret methods to examine autophagy and related processes, and for reviewers to provide realistic and reasonable critiques of reports that are focused on these processes. These guidelines are not meant to be a dogmatic set of rules, because the appropriateness of any assay largely depends on the question being asked and the system being used. Moreover, no individual assay is perfect for every situation, calling for the use of multiple techniques to properly monitor autophagy in each experimental setting. Finally, several core components of the autophagy machinery have been implicated in distinct autophagic processes (canonical and noncanonical autophagy), implying that genetic approaches to block autophagy should rely on targeting two or more autophagy-related genes that ideally participate in distinct steps of the pathway. Along similar lines, because multiple proteins involved in autophagy also regulate other cellular pathways including apoptosis, not all of them can be used as a specific marker for bona fide autophagic responses. Here, we critically discuss current methods of assessing autophagy and the information they can, or cannot, provide. Our ultimate goal is to encourage intellectual and technical innovation in the field

    A framework for consolidating laboratory data using Enterprise Service Bus

    No full text
    This paper proposes a framework for consolidating laboratory data by adopting an Enterprise Service Bus as a backbone for interchanging laboratory data between: medical instruments, the Laboratory Information Management System and the Hospital Information System. A laboratory test result is one of the major components in medical diagnosis and procedures. It can be used to plan a patient's treatment and monitor the disease over time. The existing architecture has two disadvantages, the security and maintenance issues. The proposed framework can tackle these limitations and reduce the time interval for polling the test requests and results. The Enterprise Service Bus is used for the connectivity layer in the proposed framework and it provides many advantages. The paper also shows the implementation of the proposed framework. © 2010 IEEE

    An SOA-based diseases notification system

    No full text
    This paper proposes a Diseases Notification System which is designed using a SOA pattern. Disease notification is an import component of the disease control systems. A successful diseases notification system will deliver positive effects for human beings. The proposed system is designed and implemented by use of the Business Process Execution Language for the business process layer and Enterprise Service Bus for the connectivity layer. Therefore, it can cope with a dynamically changing environment or requirements. Moreover, the proposed system can reduce the notification process time and it can provide timely information on diseases notification. ©2009 IEEE

    A RDF-based semantic schema mapping transformation system for localized data integration

    No full text
    This paper proposes a new transformation system for data integration which is based on semantic schema mapping, which is RDF-based. An alternative approach for data integration is also proposed. It provides an efficient way to keep legacy systems running and provides an integrated view to users during enterprise mergers and acquisitions. Existing data integration solutions require huge resources, especially in the initial stages. The preparation for data integration is a time consuming and complex process. The proposed system is suitable for data integration in a lean economic environment such as the current depression

    Enhanced and sustainable WS-security using the participant doman name token

    No full text
    This research proposes a new secure token profile for improving the existing Web Services security standards. It provides a new authentication mechanism. This additional level of security is important for the ServiceOriented Architecture (SOA), which is an architectural style that uses a set of principles and design rules to shape interacting applications and maintain interoperability. Web Services is one of the technologies to implement SOA and it can be implemented using Simple Object Access Protocol (SOAP). A SOAP-based Web Service relies on XML for its message format and common application layer protocols for message negotiation and transmission. However, it is a security challenge when a message is transmitted over the network, especially on the Internet. The Organization for Advancement of Structured Information Standards (OASIS) announced a set of Web Services Security standards that focus on two major areas. “Who” can use the Web Service and “What” are the permissions. However, the location or domain of the message sender is not authenticated. Therefore, a new secure token profile is proposed for enhancing existing Web Service security standards and illustrates its performance advantage over existing WS Security standards

    A new secure token for enhancing web service security

    No full text
    This paper proposes a new secure token for improving the existing Web Service Security standards which provide message integrity and message confidentiality. Service Oriented Architecture (SOA) is widely adopted and most of them use Web Services implemented using a Simple Object Access Protocol (SOAP), an XML document or message exchanges between sender and receiver using HTTP protocol. Security is critical because the message is transferred around a public network, the Internet. Whilst current Web Service Security Standards protect the message; the location of the message sender is not authenticated, this can be provided using the proposed token

    Performance enhancement of WS-security using participant domain name (PDNT)

    No full text
    This paper proposes a new secure token profile for enhancing existing Web Services Security (WSS) standards which provide message integrity, message confidentiality, user authentication and authorization. Service Oriented Architecture(SOA) is widely adopted, most systems use Web Servicesimplemented using Simple Object Access Protocol (SOAP), an XML document or message exchanges between sender and receiver using HTTP protocol or other communication protocols. Security is critical because the message is transferred around a public network, the Internet. Whilst current Web Services Security Standards protect the message; the location or domain of the message sender is not authenticated, this can be provided using the proposed token profile. Moreover, the proposed token has a performance advantage over existing WSS standards
    corecore