Results 91 to 100 of about 7,761,143 (347)

Monitoring health systems readiness and inpatient malaria case-management at Kenyan county hospitals

open access: yesMalaria Journal, 2018
Background Change of severe malaria treatment policy from quinine to artesunate, a major malaria control advance in Africa, is compromised by scarce data to monitor policy translation into practice.
Dejan Zurovac   +7 more
doaj   +1 more source

Making tau amyloid models in vitro: a crucial and underestimated challenge

open access: yesFEBS Letters, EarlyView.
This review highlights the challenges of producing in vitro amyloid assemblies of the tau protein. We review how accurately the existing protocols mimic tau deposits found in the brain of patients affected with tauopathies. We discuss the important properties that should be considered when forming amyloids and the benchmarks that should be used to ...
Julien Broc, Clara Piersson, Yann Fichou
wiley   +1 more source

An Insider Threat Mitigation Framework Using Attribute Based Access Control [PDF]

open access: yesarXiv, 2023
Insider Threat is a significant and potentially dangerous security issue in corporate settings. It is difficult to mitigate because, unlike external threats, insiders have knowledge of an organization's access policies, access hierarchy, access protocols, and access scheduling.
arxiv  

Unraveling Mycobacterium tuberculosis acid resistance and pH homeostasis mechanisms

open access: yesFEBS Letters, EarlyView.
Mycobacterium tuberculosis exhibits a remarkable resilience to acid stress. In this Review, we discuss some of the molecular mechanisms and metabolic pathways used by the tubercle bacilli to adapt and resist host‐mediated acid stress. Mycobacterium tuberculosis (Mtb) is a successful pathogen that has developed a variety of strategies to survive and ...
Janïs Laudouze   +3 more
wiley   +1 more source

Screening a nation for hepatitis C virus elimination: a cross-sectional study on prevalence of hepatitis C and associated risk factors in the Rwandan general population

open access: yesBMJ Open, 2019
Objectives We analysed data collected during programmatic screening activities conducted in 2017 to describe hepatitis C virus (HCV) seroprevalence in the general population and identify associated factors.Design We analysed data collected between June ...
Neil Gupta   +9 more
doaj   +1 more source

Towards A Generic Formal Framework for Access Control Systems [PDF]

open access: yesarXiv, 2012
There have been many proposals for access control models and authorization policy languages, which are used to inform the design of access control systems. Most, if not all, of these proposals impose restrictions on the implementation of access control systems, thereby limiting the type of authorization requests that can be processed or the structure ...
arxiv  

Zero Trust Federation: Sharing Context under User Control toward Zero Trust in Identity Federation [PDF]

open access: yesarXiv, 2022
To securely control access to systems, the concept of Zero Trust has been proposed. Access Control based on Zero Trust concept removes implicit trust and instead focuses on evaluating trustworthiness at every access request by using contexts. Contexts are information about the entity making an access request like the user and the device status ...
arxiv  

Distributed Random Access Algorithm: Scheduling and Congesion Control

open access: yes, 2009
This paper provides proofs of the rate stability, Harris recurrence, and epsilon-optimality of CSMA algorithms where the backoff parameter of each node is based on its backlog.
Jiang, Libin   +3 more
core   +2 more sources

Argumentation for Access Control [PDF]

open access: yes, 2005
In this paper we are interested in argument based reasoning for access control, for example in the context of agents negotiating access to resources or web services in virtual organizations. We use a logical framework which contains agents with objectives concerning access to a resource or provision of a service, including security objectives.
BOELLA, Guido   +2 more
openaire   +3 more sources

Unconventional mRNA processing and degradation pathways for the polycistronic yrzI (spyTA) mRNA in Bacillus subtilis

open access: yesFEBS Letters, EarlyView.
The S1025 peptide is the major antidote to the YrzI toxin, which we renamed here as SpyT (Small Peptide YrzI Toxin) and SpyA (Small Peptide YrzI Antitoxin) (1). Degradation of the toxin–antitoxin spyTA mRNA, either by a translation‐dependent cleavage by the endoribonuclease Rae1 (2) or by direct attack by 3′‐exoribonucleases (3), also contributes to ...
Laetitia Gilet   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy