Results 51 to 60 of about 4,948 (274)
A Survey on Design and Implementation of Protected Searchable Data in the Cloud [PDF]
While cloud computing has exploded in popularity in recent years thanks to the potential efficiency and cost savings of outsourcing the storage and management of data and applications, a number of vulnerabilities that led to multiple attacks have ...
Dowsley, R. +7 more
core +1 more source
Plecstatin inhibits hepatocellular carcinoma tumorigenesis and invasion through cytolinker plectin
The ruthenium‐based metallodrug plecstatin exerts its anticancer effect in hepatocellular carcinoma (HCC) primarily through selective targeting of plectin. By disrupting plectin‐mediated cytoskeletal organization, plecstatin inhibits anchorage‐dependent growth, cell polarization, and tumor cell dissemination.
Zuzana Outla +10 more
wiley +1 more source
State of The Art and Hot Aspects in Cloud Data Storage Security [PDF]
Along with the evolution of cloud computing and cloud storage towards matu- rity, researchers have analyzed an increasing range of cloud computing security aspects, data security being an important topic in this area.
Gehrmann, Christian +2 more
core +3 more sources
DRSIG: Domain and Range Specific Index Generation for encrypted Cloud data [PDF]
One of the most fundamental services of cloud computing is Cloud storage service. Huge amount of sensitive data is stored in the cloud for easy remote access and to reduce the cost of storage.
Geeta Mara, . +5 more
core +1 more source
We show that the majority of the 18 analyzed recurrent cancer‐associated ERBB4 mutations are transforming. The most potent mutations are activating, co‐operate with other ERBB receptors, and are sensitive to pan‐ERBB inhibitors. Activating ERBB4 mutations also promote therapy resistance in EGFR‐mutant lung cancer.
Veera K. Ojala +15 more
wiley +1 more source
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments [PDF]
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies.
Asghar, Muhammad Rizwan +3 more
core +1 more source
CCDC80 suppresses high‐grade serous ovarian cancer migration via negative regulation of B7‐H3
PAX8 is a lineage‐specific master regulator of transcription in high‐grade serous ovarian cancer (HGSC) progression. We show for the first time that PAX8 facilitates proliferation and metastasis by repressing the cell autonomous tumor suppressor CCDC80 and inducing B7‐H3 expression.
Aya Saleh +12 more
wiley +1 more source
Towards privacy-preserving dynamic deep packet inspection over outsourced middleboxes
The prosperity of network function virtualization (NFV) pushes forward the paradigm of migrating in-house middleboxes to third-party providers, i.e., software (virtualized) middlebox services.
Chunxiao Li, Yu Guo, Xia Wang
doaj +1 more source
Keyword-Based Delegable Proofs of Storage
Cloud users (clients) with limited storage capacity at their end can outsource bulk data to the cloud storage server. A client can later access her data by downloading the required data files.
C Wang +11 more
core +1 more source
ZFAS1 is a lncRNA promoting cell proliferation and migration, exhibiting high expression in various cancers. It is conserved, widely expressed, and produces multiple splice variants with unclear roles. We identified several splice variants in hepatocyte models, and found that inhibiting or suppressing regulators of the unfolded protein response (PERK ...
Sébastien Soubeyrand +2 more
wiley +1 more source

