1,141 research outputs found

    Tubulin family: Kinship of key proteins across phylogenetic domains

    Get PDF
    AbstractAtomic structures obtained by electron microscopy for tubulin, and by X-ray crystallography for bacterial FtsZ, show that the two proteins are highly homologous. The complementarity between such high-resolution studies and low-resolution reconstructions of microtubule complexes is clear, but controversy still abounds

    Molecular evolution: Actin's long lost relative found

    Get PDF
    AbstractThe bacterial protein MreB has been identified as a prokaryotic homolog of the eukaryotic cytoskeletal protein actin. While we still know little about MreB's function, the structural similarities and differences between MreB and actin provide more insight into the remarkable properties of actin

    Android Permissions Remystified: A Field Study on Contextual Integrity

    Full text link
    Due to the amount of data that smartphone applications can potentially access, platforms enforce permission systems that allow users to regulate how applications access protected resources. If users are asked to make security decisions too frequently and in benign situations, they may become habituated and approve all future requests without regard for the consequences. If they are asked to make too few security decisions, they may become concerned that the platform is revealing too much sensitive information. To explore this tradeoff, we instrumented the Android platform to collect data regarding how often and under what circumstances smartphone applications are accessing protected resources regulated by permissions. We performed a 36-person field study to explore the notion of "contextual integrity," that is, how often are applications accessing protected resources when users are not expecting it? Based on our collection of 27 million data points and exit interviews with participants, we examine the situations in which users would like the ability to deny applications access to protected resources. We found out that at least 80% of our participants would have preferred to prevent at least one permission request, and overall, they thought that over a third of requests were invasive and desired a mechanism to block them

    Implications of the RecA structure

    Get PDF
    The RecA protein has been the most intensively studied protein involved in homologous genetic recombination, but until recently very little has been known about the molecular details of how RecA can bring two DNA molecules into juxtaposition and switch strands between them. A recent RecA-DNA crystal structure provides some striking new insights

    The Real ID Act: Fixing Identity Documents with Duct Tape

    Get PDF

    The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences

    Full text link
    Current smartphone operating systems regulate application permissions by prompting users on an ask-on-first-use basis. Prior research has shown that this method is ineffective because it fails to account for context: the circumstances under which an application first requests access to data may be vastly different than the circumstances under which it subsequently requests access. We performed a longitudinal 131-person field study to analyze the contextuality behind user privacy decisions to regulate access to sensitive resources. We built a classifier to make privacy decisions on the user's behalf by detecting when context has changed and, when necessary, inferring privacy preferences based on the user's past decisions and behavior. Our goal is to automatically grant appropriate resource requests without further user intervention, deny inappropriate requests, and only prompt the user when the system is uncertain of the user's preferences. We show that our approach can accurately predict users' privacy decisions 96.8% of the time, which is a four-fold reduction in error rate compared to current systems.Comment: 17 pages, 4 figure

    Actin as a Tension Sensor

    Get PDF
    • …
    corecore