An important guiding thought that ran through the laws of the Ming Dynasty was "governing the country according to the corpus juries". The founding emperor of Ming Dynasty Zhu Yuanzhang found that the laws of the fo...An important guiding thought that ran through the laws of the Ming Dynasty was "governing the country according to the corpus juries". The founding emperor of Ming Dynasty Zhu Yuanzhang found that the laws of the former Yuan Dynasty could not suit the demands of the development of the new situations, so he developed the new statutes. The laws of the Ming Dynasty absorbed the lessons that the Yuan government law and discipline ceased to be binding or become lax, and put forward that the laws must be strict, and abolished the system of the prime minister, showing a high degree of centralization. The laws of the Ming Dynasty had the important influence on the political thoughts in the late feudal society, so the researches on the legal systems in the Ming dynasty have practical significance. This paper briefly expounds the legal privileges of the Ming Dynasty for reference.展开更多
AIM: To detect the expression of Fas ligand (FasL) in colon cancer tissues and cell lines and analyze the function of FasL-expressing colon cancer cells in inducing Fas-sensitive T lymphocyte apoptosis. METHODS: Ninet...AIM: To detect the expression of Fas ligand (FasL) in colon cancer tissues and cell lines and analyze the function of FasL-expressing colon cancer cells in inducing Fas-sensitive T lymphocyte apoptosis. METHODS: Ninety surgically resected colon cancer tissues and 15 hepatic metastasis specimens were investigatedby immunohistochemical method with normal colon mucosa and colon adenoma as control. The relationship between FasL expression and pathologic features was also analyzed.FasL expression of 4 colon cancer cell lines, SW620, Lovo, LS-174T and SW1116, were detected by Western blotting assay. The function of FasL expressed on colon cancer cells was determined by coculture assay with Jurkat T lymphocytes, the apoptotic rate of which was detectedby flow cytometry assay.RESULTS: Fifty-six (62.22%) cases of all the 90 colon cancer tissues and all (100%) the liver metastasis specimens expressed FasL, significantly higher than normal colon mucosa and colonic adenoma. Higher expression of FasL was found in more advanced stage of colon cancer and in cancer tissues with lymphatic or hepatic metastasis.All the colon cancer cell lines were found to express FasL.After coculture with the SW1116 cells for 24 h with an effector: target ratio 10:1, the rate of apoptosis of Jurkat cells rose from 1.9% to 21.0%.CONCLUSION: The expression of FasL is upregulated in colon cancer and the functionally expressed FasL can induce apoptosis of Fas-expressing T lymphocytes.展开更多
The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalizat...The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalization for RBAC, it is hard to realize RBAC in practical work. Our contribution here is to formalize the main relations of RBAC and take first step to propose concepts of action closure and deta closure of a role, based on which we got the specification and algorithm for the least privileges of a role. We propose that roles' inheritance should consist of inheritance of actions and inheritance of data, and then we got the inheritance of privileges among roles, which can also be supported by existing exploit tools.展开更多
A privilege flow oriented intrusion detection method based on HSMM (Hidden semi-Markov Model) is discussed. The privilege flow model and HSMM are incorporated in the implementation of an anomaly detection IDS (Intrusi...A privilege flow oriented intrusion detection method based on HSMM (Hidden semi-Markov Model) is discussed. The privilege flow model and HSMM are incorporated in the implementation of an anomaly detection IDS (Intrusion Detection System). Using the dataset of DARPA 1998, our experiment results reveal good detection performance and acceptable computation cost.展开更多
Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation me...Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared.展开更多
Objective To study the effect of vasocation intestinal peptide (VIP) on immune privilege of the rat testis. Methods The UU infected SD rats and Leydig cells were intervened by VIP, the secretion of TGF-β and the ex...Objective To study the effect of vasocation intestinal peptide (VIP) on immune privilege of the rat testis. Methods The UU infected SD rats and Leydig cells were intervened by VIP, the secretion of TGF-β and the expression of FasL in rat Leydig cells were compared between VIP-intervened group and control group to test the effect of VIP on immune privilege of the rat testis in vitro and in vivo. Results In vitro, the secretion of TGF-β in Leydig cells could be increased by low dosage of VIP while inhibitited by high dosage of VIP; expression of FasL mRNA in Leydig cells could be decreased by VIP In vivo, increased expression of TGF-β mRNA and decreased FasL mRNA were observed in VIP group in 2-3 weeks after infected by UU. In addition, the apoptosis of Jurkat cells mediated by Leydig cells could be prevented by VIP Conclusion When Leydig cells or testis infected by UU, VIP could regulate the immune function of rat Leydig cells and participate in the regulation of immune privilege of testis through the regulation of TGF-β secretion and FasL expression pattern of Leydig cells.展开更多
PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer ...PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC (Role-based Access control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is deseribed in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also.展开更多
Privileged information has significant importance to listed companies, given both the extent of the markets in which it is used and the relevant effects that it can produce on the prices of financial instruments. The ...Privileged information has significant importance to listed companies, given both the extent of the markets in which it is used and the relevant effects that it can produce on the prices of financial instruments. The term “privileged information” means information that has not yet been made known to the public, which, if disclosed, is able to affect significantly the prices of the securities of listed issuers. This article aims to prove that in many cases, the effects of privileged information can be adequately represented in financial statements, despite their “confidential” nature. For this purpose, this research proposes the existence of a relationship—which can be virtuous or vicious—between financial statements and privileged information. In order to demonstate this thesis, the author carried out an empirical survey concerning both the economic and the legal sector. For the first one, the research considered the price-sensitive information published by companies listed on the Italian Stock Exchange during the first half of 2018, and the result shows that a lot of privileged information is able to generate accounting effects;for the second one, the empirical survey analyzed some significant judgments passed by the Italian Court of Cassation in the 2000s which confirm the companies’ violation of the duty to present privileged information in financial statements.展开更多
This paper studies farmers'privilege under the protection of new plant varieties,and points out that farmers'privilege is given to balance interests of plant breeders and relevant public.Based on this,it analy...This paper studies farmers'privilege under the protection of new plant varieties,and points out that farmers'privilege is given to balance interests of plant breeders and relevant public.Based on this,it analyzes shortcomings of farmers'privilege regulations,and puts forward that it is required to improve farmers'privilege regulations in subjects,objects and contents of rights on the basis of learning from advanced legislation experience of foreign countries,and build the interest sharing mechanism between breeders and farmers.展开更多
Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and passwo...Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and password.As the number of applications increased,as a result,it became increasingly complex to manage all identities like the number of usernames and passwords of an employee.All identities had to be retrieved by users.Both the identities and the access rights associated with those identities had to be protected by an administrator.Management couldn’t even capture such access rights because they couldn’t verify things like privacy and security.Identity management can help solve this problem.The concept behind identity management is to centralize identity management and manage access identity centrally rather than multiple applications with their authentication and authorization mechanisms.In this research work,we develop governance and an identity management framework for information and technology infrastructures with privileged access management,consisting of cybersecurity policies and strategies.The results show the efficiency of the framework compared to the existing information security components.The integrated identity and access management and privileged access management enable organizations to respond to incidents and facilitate compliance.It can automate use cases that manage privileged accounts in the real world.展开更多
Since China has had more than 10 years of experience in the tech-nology for Chinese-language com-puter systems,one American firm,Microsoft,has started cooperation with Chinese software manufachur-ers to develop a Chin...Since China has had more than 10 years of experience in the tech-nology for Chinese-language com-puter systems,one American firm,Microsoft,has started cooperation with Chinese software manufachur-ers to develop a Chinese edition of Windows 4.0.Microsoft will also support the Legend Group in devel-oping the Chinese edition of DOS 6.0,a new system that will hopeful-ly be on computer store shelves be-fore very long.展开更多
Android smartphones largely dominate the smartphone market. For this reason, it is very important to examine these smartphones in terms of digital forensics since they are often used as evidence in trials. It is possi...Android smartphones largely dominate the smartphone market. For this reason, it is very important to examine these smartphones in terms of digital forensics since they are often used as evidence in trials. It is possible to acquire a physical or logical image of these devices. Acquiring physical and logical images has advantages and disadvantages compared to each other. Creating the logical image is done at the file system level. Analysis can be made on this logical image. Both logical image acquisition and analysis of the image can be done by software tools. In this study, the differences between logical image and physical image acquisition in Android smartphones, their advantages and disadvantages compared to each other, the difficulties that may be encountered in obtaining physical images, which type of image contributes to obtaining more useful and effective data, which one should be preferred for different conditions, and the benefits of having root authority are discussed. The practice of getting the logical image of the Android smartphones and making an analysis on the image is also included. Although root privileges are not required for logical image acquisition, it has been observed that very limited data will be obtained with the logical image created without root privileges. Nevertheless, logical image acquisition has advantages too against physical image acquisition.展开更多
Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution...Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path.展开更多
The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machi...The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machine learning capabilities. Saviynt is a cloud-based Identity and Access Management (IAM) system that integrates with Google Cloud Platform (GCP) and other services for additional functionality. However, other problems are associated with the transition, such as the requirement to correctly integrate IAM Saviynt into current IT infrastructures and provide comprehensive training to users on the new system. The paper will give a detailed review of the advantages, disadvantages, and best practices related to this transition.展开更多
The mammalian testis possesses a special immunological environment because of its properties of remarkable immune privilege and effective local innate immunity. Testicular immune privilege protects immunogenic germ ce...The mammalian testis possesses a special immunological environment because of its properties of remarkable immune privilege and effective local innate immunity. Testicular immune privilege protects immunogenic germ cells from systemic immune attack, and local innate immunity is important in preventing testicular microbial infections. The breakdown of local testicular immune homeostasis may lead to orchitis, an etiological factor of male infertility. The mechanisms underlying testicular immune privilege have been investigated for a long time. Increasing evidence shows that both a local immunosuppressive milieu and systemic immune tolerance are involved in maintaining testicular immune privilege status. The mechanisms underlying testicular innate immunity are emerging based on the investigation of the pattern recognition receptor-mediated innate immune response in testicular cells. This review summarizes our current understanding of testicular defense mechanisms and identifies topics that merit further investigation.展开更多
Endoscopic-retrograde-cholangiopancreatography(ERCP) is now a vital modality with primarily therapeutic and occasionally solely diagnostic utility for numerous biliary/pancreatic disorders. It has a significantly stee...Endoscopic-retrograde-cholangiopancreatography(ERCP) is now a vital modality with primarily therapeutic and occasionally solely diagnostic utility for numerous biliary/pancreatic disorders. It has a significantly steeper learning curve than that for other standard gastrointestinal(GI) endoscopies, such as esophagogastroduodenoscopy or colonoscopy, due to greater technical difficulty and higher risk of complications. Yet, GI fellows have limited exposure to ERCP during standard-three-year-GI-fellowships because ERCP is much less frequently performed than esophagogastroduodenoscopy/colonoscopy. This led to adding an optional year of training in therapeutic endoscopy. Yet many graduates from standard three-year-fellowships without advanced training intensely pursue independent/unsupervised ERCP privileges despite inadequate numbers of performed ERCPs and unacceptably low rates of successful selective cannulation of desired(biliary or pancreatic) duct. Hospital credentialing committees have traditionally performed ERCP credentialing, but this practice has led to widespread flouting of recommended guidelines(e.g., planned privileging of applicant with 20% successful cannulation rate, or after performing only 7 ERCPs);and intense politicking of committee members by applicants, their practice groups, and potential competitors. Consequently, some gastroenterologists upon completing standard fellowships train and learn ERCP 'on the job' during independent/unsupervised practice, which can result in bad outcomes: high rates of failed bile duct cannulation. This severe clinical problem is indicated by publication of ≥ 12 ERCP competency studies/guidelines during last 5 years. However, lack of mandatory, quantitative, ERCP credentialing criteria has permitted neglect of recommended guidelines. This work comprehensively reviews literature on ERCP credentialing;reviews rationales for proposed guidelines;reports problems with current system;and proposes novel criteria for competency. This work advocates for mandatory, national, written,minimum, quantitative, standards, including cognitive skills(possibly assessed by a nationwide examination), and technical skills, assessed by number performed(≥ 200-250 ERCPs), types of ERCPs, success rate(approximately ≥ 90%cannulation of desired duct), and letters of recommendation by program director/ERCP mentor. Mandatory criteria should ideally not be monitored by a hospital committee subjected to intense politicking by applicants, their employers, and sometimes even competitors, but an independent national entity,like the National Board of Medical Examiners/American Board of Internal Medicine.展开更多
This paper discusses how to use the security measurements, such as privileges, roles, views, stored procedures and triggers, to ensure the safety of a database system. This paper also gives an example of making use of...This paper discusses how to use the security measurements, such as privileges, roles, views, stored procedures and triggers, to ensure the safety of a database system. This paper also gives an example of making use of some special views of ORACLE DATA DICTIONARY to track the security records of a database system.展开更多
To investigate the effect of ureaplasma urealyticum (UU) on the expression of Fas ligand (FasL) on rat Sertoli cell Materials & Method Isolated rat Sertoli cells were infected by living UU, UU super- natants, inac...To investigate the effect of ureaplasma urealyticum (UU) on the expression of Fas ligand (FasL) on rat Sertoli cell Materials & Method Isolated rat Sertoli cells were infected by living UU, UU super- natants, inactivated UU, then Fluorescence Activated Cell Sorter and observed fluores- cence microscopy were used to assay for the FasL expression on the surface of Sertoli cells. Results UU infection could increase the expression of FasL in Sertoli cell. Conclusion The functional expression of FasL is related to the immune privilege and can give the immune regulation on the testis.展开更多
文摘An important guiding thought that ran through the laws of the Ming Dynasty was "governing the country according to the corpus juries". The founding emperor of Ming Dynasty Zhu Yuanzhang found that the laws of the former Yuan Dynasty could not suit the demands of the development of the new situations, so he developed the new statutes. The laws of the Ming Dynasty absorbed the lessons that the Yuan government law and discipline ceased to be binding or become lax, and put forward that the laws must be strict, and abolished the system of the prime minister, showing a high degree of centralization. The laws of the Ming Dynasty had the important influence on the political thoughts in the late feudal society, so the researches on the legal systems in the Ming dynasty have practical significance. This paper briefly expounds the legal privileges of the Ming Dynasty for reference.
基金Supported by the National Natural Science Foundation of China,No.39900143
文摘AIM: To detect the expression of Fas ligand (FasL) in colon cancer tissues and cell lines and analyze the function of FasL-expressing colon cancer cells in inducing Fas-sensitive T lymphocyte apoptosis. METHODS: Ninety surgically resected colon cancer tissues and 15 hepatic metastasis specimens were investigatedby immunohistochemical method with normal colon mucosa and colon adenoma as control. The relationship between FasL expression and pathologic features was also analyzed.FasL expression of 4 colon cancer cell lines, SW620, Lovo, LS-174T and SW1116, were detected by Western blotting assay. The function of FasL expressed on colon cancer cells was determined by coculture assay with Jurkat T lymphocytes, the apoptotic rate of which was detectedby flow cytometry assay.RESULTS: Fifty-six (62.22%) cases of all the 90 colon cancer tissues and all (100%) the liver metastasis specimens expressed FasL, significantly higher than normal colon mucosa and colonic adenoma. Higher expression of FasL was found in more advanced stage of colon cancer and in cancer tissues with lymphatic or hepatic metastasis.All the colon cancer cell lines were found to express FasL.After coculture with the SW1116 cells for 24 h with an effector: target ratio 10:1, the rate of apoptosis of Jurkat cells rose from 1.9% to 21.0%.CONCLUSION: The expression of FasL is upregulated in colon cancer and the functionally expressed FasL can induce apoptosis of Fas-expressing T lymphocytes.
基金Supported by the National Natural Science Foun-dation of China (60403027)
文摘The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalization for RBAC, it is hard to realize RBAC in practical work. Our contribution here is to formalize the main relations of RBAC and take first step to propose concepts of action closure and deta closure of a role, based on which we got the specification and algorithm for the least privileges of a role. We propose that roles' inheritance should consist of inheritance of actions and inheritance of data, and then we got the inheritance of privileges among roles, which can also be supported by existing exploit tools.
文摘A privilege flow oriented intrusion detection method based on HSMM (Hidden semi-Markov Model) is discussed. The privilege flow model and HSMM are incorporated in the implementation of an anomaly detection IDS (Intrusion Detection System). Using the dataset of DARPA 1998, our experiment results reveal good detection performance and acceptable computation cost.
文摘Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared.
基金This study was supported by Shanghai Education Committee Science and Research Funds (04BB21)
文摘Objective To study the effect of vasocation intestinal peptide (VIP) on immune privilege of the rat testis. Methods The UU infected SD rats and Leydig cells were intervened by VIP, the secretion of TGF-β and the expression of FasL in rat Leydig cells were compared between VIP-intervened group and control group to test the effect of VIP on immune privilege of the rat testis in vitro and in vivo. Results In vitro, the secretion of TGF-β in Leydig cells could be increased by low dosage of VIP while inhibitited by high dosage of VIP; expression of FasL mRNA in Leydig cells could be decreased by VIP In vivo, increased expression of TGF-β mRNA and decreased FasL mRNA were observed in VIP group in 2-3 weeks after infected by UU. In addition, the apoptosis of Jurkat cells mediated by Leydig cells could be prevented by VIP Conclusion When Leydig cells or testis infected by UU, VIP could regulate the immune function of rat Leydig cells and participate in the regulation of immune privilege of testis through the regulation of TGF-β secretion and FasL expression pattern of Leydig cells.
基金Supported by the National Tenth Five-rear Planfor Scientific and Technological Development of China (413160501)the National Natural Science Foundation of China (50477038)
文摘PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC (Role-based Access control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is deseribed in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also.
文摘Privileged information has significant importance to listed companies, given both the extent of the markets in which it is used and the relevant effects that it can produce on the prices of financial instruments. The term “privileged information” means information that has not yet been made known to the public, which, if disclosed, is able to affect significantly the prices of the securities of listed issuers. This article aims to prove that in many cases, the effects of privileged information can be adequately represented in financial statements, despite their “confidential” nature. For this purpose, this research proposes the existence of a relationship—which can be virtuous or vicious—between financial statements and privileged information. In order to demonstate this thesis, the author carried out an empirical survey concerning both the economic and the legal sector. For the first one, the research considered the price-sensitive information published by companies listed on the Italian Stock Exchange during the first half of 2018, and the result shows that a lot of privileged information is able to generate accounting effects;for the second one, the empirical survey analyzed some significant judgments passed by the Italian Court of Cassation in the 2000s which confirm the companies’ violation of the duty to present privileged information in financial statements.
文摘This paper studies farmers'privilege under the protection of new plant varieties,and points out that farmers'privilege is given to balance interests of plant breeders and relevant public.Based on this,it analyzes shortcomings of farmers'privilege regulations,and puts forward that it is required to improve farmers'privilege regulations in subjects,objects and contents of rights on the basis of learning from advanced legislation experience of foreign countries,and build the interest sharing mechanism between breeders and farmers.
基金the Deanship of Scientific Research at Majmaah University for supporting this work under Project Number No.R-2021-150.
文摘Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and password.As the number of applications increased,as a result,it became increasingly complex to manage all identities like the number of usernames and passwords of an employee.All identities had to be retrieved by users.Both the identities and the access rights associated with those identities had to be protected by an administrator.Management couldn’t even capture such access rights because they couldn’t verify things like privacy and security.Identity management can help solve this problem.The concept behind identity management is to centralize identity management and manage access identity centrally rather than multiple applications with their authentication and authorization mechanisms.In this research work,we develop governance and an identity management framework for information and technology infrastructures with privileged access management,consisting of cybersecurity policies and strategies.The results show the efficiency of the framework compared to the existing information security components.The integrated identity and access management and privileged access management enable organizations to respond to incidents and facilitate compliance.It can automate use cases that manage privileged accounts in the real world.
文摘Since China has had more than 10 years of experience in the tech-nology for Chinese-language com-puter systems,one American firm,Microsoft,has started cooperation with Chinese software manufachur-ers to develop a Chinese edition of Windows 4.0.Microsoft will also support the Legend Group in devel-oping the Chinese edition of DOS 6.0,a new system that will hopeful-ly be on computer store shelves be-fore very long.
文摘Android smartphones largely dominate the smartphone market. For this reason, it is very important to examine these smartphones in terms of digital forensics since they are often used as evidence in trials. It is possible to acquire a physical or logical image of these devices. Acquiring physical and logical images has advantages and disadvantages compared to each other. Creating the logical image is done at the file system level. Analysis can be made on this logical image. Both logical image acquisition and analysis of the image can be done by software tools. In this study, the differences between logical image and physical image acquisition in Android smartphones, their advantages and disadvantages compared to each other, the difficulties that may be encountered in obtaining physical images, which type of image contributes to obtaining more useful and effective data, which one should be preferred for different conditions, and the benefits of having root authority are discussed. The practice of getting the logical image of the Android smartphones and making an analysis on the image is also included. Although root privileges are not required for logical image acquisition, it has been observed that very limited data will be obtained with the logical image created without root privileges. Nevertheless, logical image acquisition has advantages too against physical image acquisition.
文摘Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path.
文摘The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machine learning capabilities. Saviynt is a cloud-based Identity and Access Management (IAM) system that integrates with Google Cloud Platform (GCP) and other services for additional functionality. However, other problems are associated with the transition, such as the requirement to correctly integrate IAM Saviynt into current IT infrastructures and provide comprehensive training to users on the new system. The paper will give a detailed review of the advantages, disadvantages, and best practices related to this transition.
文摘The mammalian testis possesses a special immunological environment because of its properties of remarkable immune privilege and effective local innate immunity. Testicular immune privilege protects immunogenic germ cells from systemic immune attack, and local innate immunity is important in preventing testicular microbial infections. The breakdown of local testicular immune homeostasis may lead to orchitis, an etiological factor of male infertility. The mechanisms underlying testicular immune privilege have been investigated for a long time. Increasing evidence shows that both a local immunosuppressive milieu and systemic immune tolerance are involved in maintaining testicular immune privilege status. The mechanisms underlying testicular innate immunity are emerging based on the investigation of the pattern recognition receptor-mediated innate immune response in testicular cells. This review summarizes our current understanding of testicular defense mechanisms and identifies topics that merit further investigation.
文摘Endoscopic-retrograde-cholangiopancreatography(ERCP) is now a vital modality with primarily therapeutic and occasionally solely diagnostic utility for numerous biliary/pancreatic disorders. It has a significantly steeper learning curve than that for other standard gastrointestinal(GI) endoscopies, such as esophagogastroduodenoscopy or colonoscopy, due to greater technical difficulty and higher risk of complications. Yet, GI fellows have limited exposure to ERCP during standard-three-year-GI-fellowships because ERCP is much less frequently performed than esophagogastroduodenoscopy/colonoscopy. This led to adding an optional year of training in therapeutic endoscopy. Yet many graduates from standard three-year-fellowships without advanced training intensely pursue independent/unsupervised ERCP privileges despite inadequate numbers of performed ERCPs and unacceptably low rates of successful selective cannulation of desired(biliary or pancreatic) duct. Hospital credentialing committees have traditionally performed ERCP credentialing, but this practice has led to widespread flouting of recommended guidelines(e.g., planned privileging of applicant with 20% successful cannulation rate, or after performing only 7 ERCPs);and intense politicking of committee members by applicants, their practice groups, and potential competitors. Consequently, some gastroenterologists upon completing standard fellowships train and learn ERCP 'on the job' during independent/unsupervised practice, which can result in bad outcomes: high rates of failed bile duct cannulation. This severe clinical problem is indicated by publication of ≥ 12 ERCP competency studies/guidelines during last 5 years. However, lack of mandatory, quantitative, ERCP credentialing criteria has permitted neglect of recommended guidelines. This work comprehensively reviews literature on ERCP credentialing;reviews rationales for proposed guidelines;reports problems with current system;and proposes novel criteria for competency. This work advocates for mandatory, national, written,minimum, quantitative, standards, including cognitive skills(possibly assessed by a nationwide examination), and technical skills, assessed by number performed(≥ 200-250 ERCPs), types of ERCPs, success rate(approximately ≥ 90%cannulation of desired duct), and letters of recommendation by program director/ERCP mentor. Mandatory criteria should ideally not be monitored by a hospital committee subjected to intense politicking by applicants, their employers, and sometimes even competitors, but an independent national entity,like the National Board of Medical Examiners/American Board of Internal Medicine.
文摘This paper discusses how to use the security measurements, such as privileges, roles, views, stored procedures and triggers, to ensure the safety of a database system. This paper also gives an example of making use of some special views of ORACLE DATA DICTIONARY to track the security records of a database system.
基金Granted by National Natural Science Fundation of China (39970283)
文摘To investigate the effect of ureaplasma urealyticum (UU) on the expression of Fas ligand (FasL) on rat Sertoli cell Materials & Method Isolated rat Sertoli cells were infected by living UU, UU super- natants, inactivated UU, then Fluorescence Activated Cell Sorter and observed fluores- cence microscopy were used to assay for the FasL expression on the surface of Sertoli cells. Results UU infection could increase the expression of FasL in Sertoli cell. Conclusion The functional expression of FasL is related to the immune privilege and can give the immune regulation on the testis.