Results 111 to 120 of about 29,464,938 (335)

Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment

open access: yesIEEE Access, 2019
For secure communication between any two neighboring sensing devices on the Internet of Things (IoT) environment, it is essential to design a secure device access control and key agreement protocol, in which the two phases, namely, “node authentication ...
A. Das   +4 more
semanticscholar   +1 more source

An algebraic basis for specifying and enforcing access control in security systems [PDF]

open access: yes, 2000
Security services in a multi-user environment are often based on access control mechanisms. Static aspects of an access control policy can be formalised using abstract algebraic models.
Pahl, Claus
core  

Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?

open access: yesFEBS Letters, EarlyView.
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes   +3 more
wiley   +1 more source

Pilot introduction of long-lasting insecticidal nets and hammock nets in the indigenous Comarca of Guna Yala, Panama

open access: yesMalaria Journal
Background After almost 70 years of using indoor residual spraying (IRS) as the primary intervention for malaria vector control, the Republic of Panama wanted to evaluate the operational feasibility and acceptability of distributing long-lasting ...
A. Oscar E. González   +9 more
doaj   +1 more source

Risk Screening Tools Could Potentially Miss HIV-Positive Individuals Who Seek Testing Services: A Secondary Program Data Analysis on the Performance Characteristics of an Adolescent and Adult HIV Risk Screening Tool in Uganda

open access: yesTropical Medicine and Infectious Disease
Improving HIV testing efficiency saves financial and material resources for health. We conducted a secondary data analysis of routinely collected HIV risk-screening program data in Uganda, from October to November 2019, to determine the performance ...
Marvin Lubega   +10 more
doaj   +1 more source

Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation

open access: yesFEBS Letters, EarlyView.
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe   +3 more
wiley   +1 more source

Dynamic User Role Assignment in Remote Access Control [PDF]

open access: yes, 2009
The Role-Based Access Control (RBAC) model has been widely applied to a single domain in which users are known to the administrative unit of that domain, beforehand.
Hartel, Pieter   +3 more
core   +2 more sources

An upstream open reading frame regulates expression of the mitochondrial protein Slm35 and mitophagy flux

open access: yesFEBS Letters, EarlyView.
This study reveals how the mitochondrial protein Slm35 is regulated in Saccharomyces cerevisiae. The authors identify stress‐responsive DNA elements and two upstream open reading frames (uORFs) in the 5′ untranslated region of SLM35. One uORF restricts translation, and its mutation increases Slm35 protein levels and mitophagy.
Hernán Romo‐Casanueva   +5 more
wiley   +1 more source

Sequence determinants of RNA G‐quadruplex unfolding by Arg‐rich regions

open access: yesFEBS Letters, EarlyView.
We show that Arg‐rich peptides selectively unfold RNA G‐quadruplexes, but not RNA stem‐loops or DNA/RNA duplexes. This length‐dependent activity is inhibited by acidic residues and is conserved among SR and SR‐related proteins (SRSF1, SRSF3, SRSF9, U1‐70K, and U2AF1).
Naiduwadura Ivon Upekala De Silva   +10 more
wiley   +1 more source

Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario

open access: yesIEEE Access, 2019
The rapid development of the Internet of Things (IoT) and the explosive growth of valuable data produced by user equipment have led to strong demand for access control, especially hierarchical access control, which is performed from a group communication
Mingxin Ma, Guozhen Shi, Fenghua Li
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy