Results 91 to 100 of about 7,761,143 (347)
Monitoring health systems readiness and inpatient malaria case-management at Kenyan county hospitals
Background Change of severe malaria treatment policy from quinine to artesunate, a major malaria control advance in Africa, is compromised by scarce data to monitor policy translation into practice.
Dejan Zurovac+7 more
doaj +1 more source
Making tau amyloid models in vitro: a crucial and underestimated challenge
This review highlights the challenges of producing in vitro amyloid assemblies of the tau protein. We review how accurately the existing protocols mimic tau deposits found in the brain of patients affected with tauopathies. We discuss the important properties that should be considered when forming amyloids and the benchmarks that should be used to ...
Julien Broc, Clara Piersson, Yann Fichou
wiley +1 more source
An Insider Threat Mitigation Framework Using Attribute Based Access Control [PDF]
Insider Threat is a significant and potentially dangerous security issue in corporate settings. It is difficult to mitigate because, unlike external threats, insiders have knowledge of an organization's access policies, access hierarchy, access protocols, and access scheduling.
arxiv
Unraveling Mycobacterium tuberculosis acid resistance and pH homeostasis mechanisms
Mycobacterium tuberculosis exhibits a remarkable resilience to acid stress. In this Review, we discuss some of the molecular mechanisms and metabolic pathways used by the tubercle bacilli to adapt and resist host‐mediated acid stress. Mycobacterium tuberculosis (Mtb) is a successful pathogen that has developed a variety of strategies to survive and ...
Janïs Laudouze+3 more
wiley +1 more source
Objectives We analysed data collected during programmatic screening activities conducted in 2017 to describe hepatitis C virus (HCV) seroprevalence in the general population and identify associated factors.Design We analysed data collected between June ...
Neil Gupta+9 more
doaj +1 more source
Towards A Generic Formal Framework for Access Control Systems [PDF]
There have been many proposals for access control models and authorization policy languages, which are used to inform the design of access control systems. Most, if not all, of these proposals impose restrictions on the implementation of access control systems, thereby limiting the type of authorization requests that can be processed or the structure ...
arxiv
Zero Trust Federation: Sharing Context under User Control toward Zero Trust in Identity Federation [PDF]
To securely control access to systems, the concept of Zero Trust has been proposed. Access Control based on Zero Trust concept removes implicit trust and instead focuses on evaluating trustworthiness at every access request by using contexts. Contexts are information about the entity making an access request like the user and the device status ...
arxiv
Distributed Random Access Algorithm: Scheduling and Congesion Control
This paper provides proofs of the rate stability, Harris recurrence, and epsilon-optimality of CSMA algorithms where the backoff parameter of each node is based on its backlog.
Jiang, Libin+3 more
core +2 more sources
Argumentation for Access Control [PDF]
In this paper we are interested in argument based reasoning for access control, for example in the context of agents negotiating access to resources or web services in virtual organizations. We use a logical framework which contains agents with objectives concerning access to a resource or provision of a service, including security objectives.
BOELLA, Guido+2 more
openaire +3 more sources
The S1025 peptide is the major antidote to the YrzI toxin, which we renamed here as SpyT (Small Peptide YrzI Toxin) and SpyA (Small Peptide YrzI Antitoxin) (1). Degradation of the toxin–antitoxin spyTA mRNA, either by a translation‐dependent cleavage by the endoribonuclease Rae1 (2) or by direct attack by 3′‐exoribonucleases (3), also contributes to ...
Laetitia Gilet+4 more
wiley +1 more source