1,141 research outputs found
Tubulin family: Kinship of key proteins across phylogenetic domains
AbstractAtomic structures obtained by electron microscopy for tubulin, and by X-ray crystallography for bacterial FtsZ, show that the two proteins are highly homologous. The complementarity between such high-resolution studies and low-resolution reconstructions of microtubule complexes is clear, but controversy still abounds
Molecular evolution: Actin's long lost relative found
AbstractThe bacterial protein MreB has been identified as a prokaryotic homolog of the eukaryotic cytoskeletal protein actin. While we still know little about MreB's function, the structural similarities and differences between MreB and actin provide more insight into the remarkable properties of actin
Android Permissions Remystified: A Field Study on Contextual Integrity
Due to the amount of data that smartphone applications can potentially
access, platforms enforce permission systems that allow users to regulate how
applications access protected resources. If users are asked to make security
decisions too frequently and in benign situations, they may become habituated
and approve all future requests without regard for the consequences. If they
are asked to make too few security decisions, they may become concerned that
the platform is revealing too much sensitive information. To explore this
tradeoff, we instrumented the Android platform to collect data regarding how
often and under what circumstances smartphone applications are accessing
protected resources regulated by permissions. We performed a 36-person field
study to explore the notion of "contextual integrity," that is, how often are
applications accessing protected resources when users are not expecting it?
Based on our collection of 27 million data points and exit interviews with
participants, we examine the situations in which users would like the ability
to deny applications access to protected resources. We found out that at least
80% of our participants would have preferred to prevent at least one permission
request, and overall, they thought that over a third of requests were invasive
and desired a mechanism to block them
Implications of the RecA structure
The RecA protein has been the most intensively studied protein involved in homologous genetic recombination, but until recently very little has been known about the molecular details of how RecA can bring two DNA molecules into juxtaposition and switch strands between them. A recent RecA-DNA crystal structure provides some striking new insights
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences
Current smartphone operating systems regulate application permissions by
prompting users on an ask-on-first-use basis. Prior research has shown that
this method is ineffective because it fails to account for context: the
circumstances under which an application first requests access to data may be
vastly different than the circumstances under which it subsequently requests
access. We performed a longitudinal 131-person field study to analyze the
contextuality behind user privacy decisions to regulate access to sensitive
resources. We built a classifier to make privacy decisions on the user's behalf
by detecting when context has changed and, when necessary, inferring privacy
preferences based on the user's past decisions and behavior. Our goal is to
automatically grant appropriate resource requests without further user
intervention, deny inappropriate requests, and only prompt the user when the
system is uncertain of the user's preferences. We show that our approach can
accurately predict users' privacy decisions 96.8% of the time, which is a
four-fold reduction in error rate compared to current systems.Comment: 17 pages, 4 figure
- …