WorldWideScience

Sample records for security checkpoints

  1. The impact of aviation checkpoint queues on optimizing security screening effectiveness

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Adrian J., E-mail: ajlee@citeri.or [Central Illinois Technology and Education Research Institute, 2312 Connie Drive, Springfield, IL 62704-8722 (United States); Jacobson, Sheldon H., E-mail: shj@illinois.ed [Department of Computer Science, University of Illinois at Urbana-Champaign, 201 N. Goodwin Ave. M/C 258, Urbana, IL 61801-2302 (United States)

    2011-08-15

    Passenger screening at aviation security checkpoints is a critical component in protecting airports and aircraft from terrorist threats. Recent developments in screening device technology have increased the ability to detect these threats; however, the average amount of time it takes to screen a passenger still remains a concern. This paper models the queueing process for a multi-level airport checkpoint security system, where multiple security classes are formed through subsets of specialized screening devices. An optimal static assignment policy is obtained which minimizes the steady-state expected amount of time a passenger spends in the security system. Then, an optimal dynamic assignment policy is obtained through a transient analysis that balances the expected number of true alarms with the expected amount of time a passenger spends in the security system. Performance of a two-class system is compared to that of a selective security system containing primary and secondary levels of screening. The key contribution is that the resulting optimal assignment policies increase security and passenger throughput by efficiently and effectively utilizing available screening resources.

  2. The impact of aviation checkpoint queues on optimizing security screening effectiveness

    International Nuclear Information System (INIS)

    Lee, Adrian J.; Jacobson, Sheldon H.

    2011-01-01

    Passenger screening at aviation security checkpoints is a critical component in protecting airports and aircraft from terrorist threats. Recent developments in screening device technology have increased the ability to detect these threats; however, the average amount of time it takes to screen a passenger still remains a concern. This paper models the queueing process for a multi-level airport checkpoint security system, where multiple security classes are formed through subsets of specialized screening devices. An optimal static assignment policy is obtained which minimizes the steady-state expected amount of time a passenger spends in the security system. Then, an optimal dynamic assignment policy is obtained through a transient analysis that balances the expected number of true alarms with the expected amount of time a passenger spends in the security system. Performance of a two-class system is compared to that of a selective security system containing primary and secondary levels of screening. The key contribution is that the resulting optimal assignment policies increase security and passenger throughput by efficiently and effectively utilizing available screening resources.

  3. The Level of Europium-154 Contaminating Samarium-153-EDTMP Activates the Radiation Alarm System at the US Homeland Security Checkpoints

    Directory of Open Access Journals (Sweden)

    Mohammed Najeeb Al Hallak

    2009-08-01

    Full Text Available 153Sm-EDTMP is a radiopharmaceutical composed of EDTMP (ethylenediamine-tetramethylenephosphonate and Samarium-153 [1]. 153Sm-EDTMP has an affinity for skeletal tissue and concentrates in areas with increased bone turnover; thus, it is successfully used in relieving pain related to diffuse bone metastases [1]. The manufacturing process of 153Sm-EDTMP leads to contamination with 154Eu (Europium-154 [2]. A previous study only alluded to the retention of 154Eu in the bones after receiving treatment with 153Sm-EDTMP [2]. Activation of the alarm at security checkpoints after 153Sm-EDTMP therapy has not been previously reported. Two out of 15 patients who received 153Sm-EDTMP at Roger Maris Cancer Center (Fargo, N. Dak., USA activated the radiation activity sensors while passing through checkpoints; one at a US airport and the other while crossing theAmerican-Canadian border. We assume that the 154Eu which remained in the patients’ bones activated the sensors. Methods: In order to investigate this hypothesis, we obtained the consent from 3 of our 15 patients who received 153Sm-EDTMP within the previous 4 months to 2 years, including the patient who had activated the radiation alarm at the airport. The patients were scanned with a handheld detector and a gamma camera for energies from 511 keV to 1.3 MeV. Results: All three patients exhibited identical spectral images, and further analysis showed that the observed spectra are the result of 154Eu emissions. Conclusion: Depending on the detection thresholds and windows used by local and federal authorities, the remaining activity of 154Eu retained in patients who received 153Sm-EDTMP could be sufficient enough to increase the count rates above background levels and activate the sensors. At Roger Maris Cancer Center, patients are now informed of the potential consequences of 153Sm-EDTMP therapy prior to initiating treatment. In addition, patients treated with 153Sm-EDTMP at Roger Maris Cancer Center

  4. Asynchronous Checkpoint Migration with MRNet in the Scalable Checkpoint / Restart Library

    Energy Technology Data Exchange (ETDEWEB)

    Mohror, K; Moody, A; de Supinski, B R

    2012-03-20

    Applications running on today's supercomputers tolerate failures by periodically saving their state in checkpoint files on stable storage, such as a parallel file system. Although this approach is simple, the overhead of writing the checkpoints can be prohibitive, especially for large-scale jobs. In this paper, we present initial results of an enhancement to our Scalable Checkpoint/Restart Library (SCR). We employ MRNet, a tree-based overlay network library, to transfer checkpoints from the compute nodes to the parallel file system asynchronously. This enhancement increases application efficiency by removing the need for an application to block while checkpoints are transferred to the parallel file system. We show that the integration of SCR with MRNet can reduce the time spent in I/O operations by as much as 15x. However, our experiments exposed new scalability issues with our initial implementation. We discuss the sources of the scalability problems and our plans to address them.

  5. Checkpointing for a hybrid computing node

    Science.gov (United States)

    Cher, Chen-Yong

    2016-03-08

    According to an aspect, a method for checkpointing in a hybrid computing node includes executing a task in a processing accelerator of the hybrid computing node. A checkpoint is created in a local memory of the processing accelerator. The checkpoint includes state data to restart execution of the task in the processing accelerator upon a restart operation. Execution of the task is resumed in the processing accelerator after creating the checkpoint. The state data of the checkpoint are transferred from the processing accelerator to a main processor of the hybrid computing node while the processing accelerator is executing the task.

  6. Network support for system initiated checkpoints

    Science.gov (United States)

    Chen, Dong; Heidelberger, Philip

    2013-01-29

    A system, method and computer program product for supporting system initiated checkpoints in parallel computing systems. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity.

  7. Multiple functions of the S-phase checkpoint mediator.

    Science.gov (United States)

    Tanaka, Katsunori

    2010-01-01

    There is mounting evidence that replication defects are the major source of spontaneous genomic instability in cells, and that S-phase checkpoints are the principal defense against such instability. The S-phase checkpoint mediator protein Mrc1/Claspin mediates the checkpoint response to replication stress by facilitating phosphorylation of effector kinase by a sensor kinase. In this review, the multiple functions and the regulation of the S-phase checkpoint mediator are discussed.

  8. Detailed Modeling and Evaluation of a Scalable Multilevel Checkpointing System

    Energy Technology Data Exchange (ETDEWEB)

    Mohror, Kathryn [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Moody, Adam [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Bronevetsky, Greg [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); de Supinski, Bronis R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2014-09-01

    High-performance computing (HPC) systems are growing more powerful by utilizing more components. As the system mean time before failure correspondingly drops, applications must checkpoint frequently to make progress. But, at scale, the cost of checkpointing becomes prohibitive. A solution to this problem is multilevel checkpointing, which employs multiple types of checkpoints in a single run. Moreover, lightweight checkpoints can handle the most common failure modes, while more expensive checkpoints can handle severe failures. We designed a multilevel checkpointing library, the Scalable Checkpoint/Restart (SCR) library, that writes lightweight checkpoints to node-local storage in addition to the parallel file system. We present probabilistic Markov models of SCR's performance. We show that on future large-scale systems, SCR can lead to a gain in machine efficiency of up to 35 percent, and reduce the load on the parallel file system by a factor of two. In addition, we predict that checkpoint scavenging, or only writing checkpoints to the parallel file system on application termination, can reduce the load on the parallel file system by 20 × on today's systems and still maintain high application efficiency.

  9. Efficient Incremental Checkpointing of Java Programs

    DEFF Research Database (Denmark)

    Lawall, Julia Laetitia; Muller, Gilles

    2000-01-01

    This paper investigates the optimization of language-level checkpointing of Java programs. First, we describe how to systematically associate incremental checkpoints with Java classes. While being safe, the genericness of this solution induces substantial execution overhead. Second, to solve...

  10. Keeping checkpoint/restart viable for exascale systems.

    Energy Technology Data Exchange (ETDEWEB)

    Riesen, Rolf E.; Bridges, Patrick G. (IBM Research, Ireland, Mulhuddart, Dublin); Stearley, Jon R.; Laros, James H., III; Oldfield, Ron A.; Arnold, Dorian (University of New Mexico, Albuquerque, NM); Pedretti, Kevin Thomas Tauke; Ferreira, Kurt Brian; Brightwell, Ronald Brian

    2011-09-01

    Next-generation exascale systems, those capable of performing a quintillion (10{sup 18}) operations per second, are expected to be delivered in the next 8-10 years. These systems, which will be 1,000 times faster than current systems, will be of unprecedented scale. As these systems continue to grow in size, faults will become increasingly common, even over the course of small calculations. Therefore, issues such as fault tolerance and reliability will limit application scalability. Current techniques to ensure progress across faults like checkpoint/restart, the dominant fault tolerance mechanism for the last 25 years, are increasingly problematic at the scales of future systems due to their excessive overheads. In this work, we evaluate a number of techniques to decrease the overhead of checkpoint/restart and keep this method viable for future exascale systems. More specifically, this work evaluates state-machine replication to dramatically increase the checkpoint interval (the time between successive checkpoint) and hash-based, probabilistic incremental checkpointing using graphics processing units to decrease the checkpoint commit time (the time to save one checkpoint). Using a combination of empirical analysis, modeling, and simulation, we study the costs and benefits of these approaches on a wide range of parameters. These results, which cover of number of high-performance computing capability workloads, different failure distributions, hardware mean time to failures, and I/O bandwidths, show the potential benefits of these techniques for meeting the reliability demands of future exascale platforms.

  11. Advances of Immune Checkpoint Inhibitors in Tumor Immunotherapy

    Science.gov (United States)

    Guo, Qiao

    2018-01-01

    Immune checkpoints are cell surface molecules that can fine-tune the immune responses, they are crucial for modulating the duration and amplitude of immune reactions while maintaining self-tolerance in order to minimize autoimmune responses. Numerous studies have demonstrated that tumors cells can directly express immune-checkpoint molecules, or induce many inhibitory molecules expression in the tumor microenvironment to inhibit the anti-tumor immunity. Releasing these brakes has emerged as an exciting strategy to cure cancer. In the past few years, clinical trials with therapeutic antibodies targeting to the checkpoint molecules CTLA-4 and PD-1 have rekindled the hope for cancer immunotherapy. In contrast to the conventional treatment, checkpoint inhibitors induce broad and durable antitumor responses. In the future, treatment may involve combination therapy to target different checkpoint molecules and stages of the adaptive immune responses. In this review, we summarized the recent advances of the study and development of other checkpoint molecules in tumor immunotherapy.

  12. Checkpointing and Recovery in Distributed and Database Systems

    Science.gov (United States)

    Wu, Jiang

    2011-01-01

    A transaction-consistent global checkpoint of a database records a state of the database which reflects the effect of only completed transactions and not the results of any partially executed transactions. This thesis establishes the necessary and sufficient conditions for a checkpoint of a data item (or the checkpoints of a set of data items) to…

  13. Phosphorylation of Minichromosome Maintenance 3 (MCM3) by Checkpoint Kinase 1 (Chk1) Negatively Regulates DNA Replication and Checkpoint Activation.

    Science.gov (United States)

    Han, Xiangzi; Mayca Pozo, Franklin; Wisotsky, Jacob N; Wang, Benlian; Jacobberger, James W; Zhang, Youwei

    2015-05-08

    Mechanisms controlling DNA replication and replication checkpoint are critical for the maintenance of genome stability and the prevention or treatment of human cancers. Checkpoint kinase 1 (Chk1) is a key effector protein kinase that regulates the DNA damage response and replication checkpoint. The heterohexameric minichromosome maintenance (MCM) complex is the core component of mammalian DNA helicase and has been implicated in replication checkpoint activation. Here we report that Chk1 phosphorylates the MCM3 subunit of the MCM complex at Ser-205 under normal growth conditions. Mutating the Ser-205 of MCM3 to Ala increased the length of DNA replication track and shortened the S phase duration, indicating that Ser-205 phosphorylation negatively controls normal DNA replication. Upon replicative stress treatment, the inhibitory phosphorylation of MCM3 at Ser-205 was reduced, and this reduction was accompanied with the generation of single strand DNA, the key platform for ataxia telangiectasia mutated and Rad3-related (ATR) activation. As a result, the replication checkpoint is activated. Together, these data provide significant insights into the regulation of both normal DNA replication and replication checkpoint activation through the novel phosphorylation of MCM3 by Chk1. © 2015 by The American Society for Biochemistry and Molecular Biology, Inc.

  14. Transparent checkpointing and process migration in a distributed system

    OpenAIRE

    2004-01-01

    A distributed system for creating a checkpoint for a plurality of processes running on the distributed system. The distributed system includes a plurality of compute nodes with an operating system executing on each compute node. A checkpoint library resides at the user level on each of the compute nodes, and the checkpoint library is transparent to the operating system residing on the same compute node and to the other compute nodes. Each checkpoint library uses a windowed messaging logging p...

  15. Role of the Checkpoint Clamp in DNA Damage Response

    Directory of Open Access Journals (Sweden)

    Mihoko Kai

    2013-01-01

    Full Text Available DNA damage occurs during DNA replication, spontaneous chemical reactions, and assaults by external or metabolism-derived agents. Therefore, all living cells must constantly contend with DNA damage. Cells protect themselves from these genotoxic stresses by activating the DNA damage checkpoint and DNA repair pathways. Coordination of these pathways requires tight regulation in order to prevent genomic instability. The checkpoint clamp complex consists of Rad9, Rad1 and Hus1 proteins, and is often called the 9-1-1 complex. This PCNA (proliferating cell nuclear antigen-like donut-shaped protein complex is a checkpoint sensor protein that is recruited to DNA damage sites during the early stage of the response, and is required for checkpoint activation. As PCNA is required for multiple pathways of DNA metabolism, the checkpoint clamp has also been implicated in direct roles in DNA repair, as well as in coordination of the pathways. Here we discuss roles of the checkpoint clamp in DNA damage response (DDR.

  16. Checkpoint independence of most DNA replication origins in fission yeast.

    Science.gov (United States)

    Mickle, Katie L; Ramanathan, Sunita; Rosebrock, Adam; Oliva, Anna; Chaudari, Amna; Yompakdee, Chulee; Scott, Donna; Leatherwood, Janet; Huberman, Joel A

    2007-12-19

    In budding yeast, the replication checkpoint slows progress through S phase by inhibiting replication origin firing. In mammals, the replication checkpoint inhibits both origin firing and replication fork movement. To find out which strategy is employed in the fission yeast, Schizosaccharomyces pombe, we used microarrays to investigate the use of origins by wild-type and checkpoint-mutant strains in the presence of hydroxyurea (HU), which limits the pool of deoxyribonucleoside triphosphates (dNTPs) and activates the replication checkpoint. The checkpoint-mutant cells carried deletions either of rad3 (which encodes the fission yeast homologue of ATR) or cds1 (which encodes the fission yeast homologue of Chk2). Our microarray results proved to be largely consistent with those independently obtained and recently published by three other laboratories. However, we were able to reconcile differences between the previous studies regarding the extent to which fission yeast replication origins are affected by the replication checkpoint. We found (consistent with the three previous studies after appropriate interpretation) that, in surprising contrast to budding yeast, most fission yeast origins, including both early- and late-firing origins, are not significantly affected by checkpoint mutations during replication in the presence of HU. A few origins (approximately 3%) behaved like those in budding yeast: they replicated earlier in the checkpoint mutants than in wild type. These were located primarily in the heterochromatic subtelomeric regions of chromosomes 1 and 2. Indeed, the subtelomeric regions defined by the strongest checkpoint restraint correspond precisely to previously mapped subtelomeric heterochromatin. This observation implies that subtelomeric heterochromatin in fission yeast differs from heterochromatin at centromeres, in the mating type region, and in ribosomal DNA, since these regions replicated at least as efficiently in wild-type cells as in checkpoint

  17. Checkpoint independence of most DNA replication origins in fission yeast

    Science.gov (United States)

    Mickle, Katie L; Ramanathan, Sunita; Rosebrock, Adam; Oliva, Anna; Chaudari, Amna; Yompakdee, Chulee; Scott, Donna; Leatherwood, Janet; Huberman, Joel A

    2007-01-01

    Background In budding yeast, the replication checkpoint slows progress through S phase by inhibiting replication origin firing. In mammals, the replication checkpoint inhibits both origin firing and replication fork movement. To find out which strategy is employed in the fission yeast, Schizosaccharomyces pombe, we used microarrays to investigate the use of origins by wild-type and checkpoint-mutant strains in the presence of hydroxyurea (HU), which limits the pool of deoxyribonucleoside triphosphates (dNTPs) and activates the replication checkpoint. The checkpoint-mutant cells carried deletions either of rad3 (which encodes the fission yeast homologue of ATR) or cds1 (which encodes the fission yeast homologue of Chk2). Results Our microarray results proved to be largely consistent with those independently obtained and recently published by three other laboratories. However, we were able to reconcile differences between the previous studies regarding the extent to which fission yeast replication origins are affected by the replication checkpoint. We found (consistent with the three previous studies after appropriate interpretation) that, in surprising contrast to budding yeast, most fission yeast origins, including both early- and late-firing origins, are not significantly affected by checkpoint mutations during replication in the presence of HU. A few origins (~3%) behaved like those in budding yeast: they replicated earlier in the checkpoint mutants than in wild type. These were located primarily in the heterochromatic subtelomeric regions of chromosomes 1 and 2. Indeed, the subtelomeric regions defined by the strongest checkpoint restraint correspond precisely to previously mapped subtelomeric heterochromatin. This observation implies that subtelomeric heterochromatin in fission yeast differs from heterochromatin at centromeres, in the mating type region, and in ribosomal DNA, since these regions replicated at least as efficiently in wild-type cells as in

  18. Checkpoint independence of most DNA replication origins in fission yeast

    Directory of Open Access Journals (Sweden)

    Scott Donna

    2007-12-01

    Full Text Available Abstract Background In budding yeast, the replication checkpoint slows progress through S phase by inhibiting replication origin firing. In mammals, the replication checkpoint inhibits both origin firing and replication fork movement. To find out which strategy is employed in the fission yeast, Schizosaccharomyces pombe, we used microarrays to investigate the use of origins by wild-type and checkpoint-mutant strains in the presence of hydroxyurea (HU, which limits the pool of deoxyribonucleoside triphosphates (dNTPs and activates the replication checkpoint. The checkpoint-mutant cells carried deletions either of rad3 (which encodes the fission yeast homologue of ATR or cds1 (which encodes the fission yeast homologue of Chk2. Results Our microarray results proved to be largely consistent with those independently obtained and recently published by three other laboratories. However, we were able to reconcile differences between the previous studies regarding the extent to which fission yeast replication origins are affected by the replication checkpoint. We found (consistent with the three previous studies after appropriate interpretation that, in surprising contrast to budding yeast, most fission yeast origins, including both early- and late-firing origins, are not significantly affected by checkpoint mutations during replication in the presence of HU. A few origins (~3% behaved like those in budding yeast: they replicated earlier in the checkpoint mutants than in wild type. These were located primarily in the heterochromatic subtelomeric regions of chromosomes 1 and 2. Indeed, the subtelomeric regions defined by the strongest checkpoint restraint correspond precisely to previously mapped subtelomeric heterochromatin. This observation implies that subtelomeric heterochromatin in fission yeast differs from heterochromatin at centromeres, in the mating type region, and in ribosomal DNA, since these regions replicated at least as efficiently in wild

  19. Enhancing Immune Checkpoint Inhibitor Therapy in Kidney Cancer

    Science.gov (United States)

    2017-10-01

    AWARD NUMBER: W81XWH-15-1-0141 TITLE: Enhancing Immune Checkpoint Inhibitor therapy in Kidney Cancer PRINCIPAL INVESTIGATOR: Hans-Joerg Hammers...SUBTITLE Enhancing Immune Checkpoint Inhibitor therapy in Kidney Cancer 5a. CONTRACT NUMBER 5b. GRANT NUMBER W81XWH- 15-1-0141 5c. PROGRAM ELEMENT NUMBER...immune checkpoint inhibition in kidney cancer . The work is designed to test different strategies to induce or enhance the abscopal in a kidney cancer

  20. Template based parallel checkpointing in a massively parallel computer system

    Science.gov (United States)

    Archer, Charles Jens [Rochester, MN; Inglett, Todd Alan [Rochester, MN

    2009-01-13

    A method and apparatus for a template based parallel checkpoint save for a massively parallel super computer system using a parallel variation of the rsync protocol, and network broadcast. In preferred embodiments, the checkpoint data for each node is compared to a template checkpoint file that resides in the storage and that was previously produced. Embodiments herein greatly decrease the amount of data that must be transmitted and stored for faster checkpointing and increased efficiency of the computer system. Embodiments are directed to a parallel computer system with nodes arranged in a cluster with a high speed interconnect that can perform broadcast communication. The checkpoint contains a set of actual small data blocks with their corresponding checksums from all nodes in the system. The data blocks may be compressed using conventional non-lossy data compression algorithms to further reduce the overall checkpoint size.

  1. Hypoxia‐induced alterations of G2 checkpoint regulators

    OpenAIRE

    Hasvold, Grete; Lund-Andersen, Christin; Lando, Malin; Patzke, Sebastian; Hauge, Sissel; Suo, ZhenHe; Lyng, Heidi; Syljuåsen, Randi G.

    2016-01-01

    Hypoxia promotes an aggressive tumor phenotype with increased genomic instability, partially due to downregulation of DNA repair pathways. However, genome stability is also surveilled by cell cycle checkpoints. An important issue is therefore whether hypoxia also can influence the DNA damage‐induced cell cycle checkpoints. Here, we show that hypoxia (24 h 0.2% O2) alters the expression of several G2 checkpoint regulators, as examined by microarray gene expression analysis and immunoblotting o...

  2. Berkeley lab checkpoint/restart (BLCR) for Linux clusters

    International Nuclear Information System (INIS)

    Hargrove, Paul H; Duell, Jason C

    2006-01-01

    This article describes the motivation, design and implementation of Berkeley Lab Checkpoint/Restart (BLCR), a system-level checkpoint/restart implementation for Linux clusters that targets the space of typical High Performance Computing applications, including MPI. Application-level solutions, including both checkpointing and fault-tolerant algorithms, are recognized as more time and space efficient than system-level checkpoints, which cannot make use of any application-specific knowledge. However, system-level checkpointing allows for preemption, making it suitable for responding to ''fault precursors'' (for instance, elevated error rates from ECC memory or network CRCs, or elevated temperature from sensors). Preemption can also increase the efficiency of batch scheduling; for instance reducing idle cycles (by allowing for shutdown without any queue draining period or reallocation of resources to eliminate idle nodes when better fitting jobs are queued), and reducing the average queued time (by limiting large jobs to running during off-peak hours, without the need to limit the length of such jobs). Each of these potential uses makes BLCR a valuable tool for efficient resource management in Linux clusters

  3. Prevention of DNA Rereplication Through a Meiotic Recombination Checkpoint Response

    Directory of Open Access Journals (Sweden)

    Nicole A. Najor

    2016-12-01

    Full Text Available In the budding yeast Saccharomyces cerevisiae, unnatural stabilization of the cyclin-dependent kinase inhibitor Sic1 during meiosis can trigger extra rounds of DNA replication. When programmed DNA double-strand breaks (DSBs are generated but not repaired due to absence of DMC1, a pathway involving the checkpoint gene RAD17 prevents this DNA rereplication. Further genetic analysis has now revealed that prevention of DNA rereplication also requires MEC1, which encodes a protein kinase that serves as a central checkpoint regulator in several pathways including the meiotic recombination checkpoint response. Downstream of MEC1, MEK1 is required through its function to inhibit repair between sister chromatids. By contrast, meiotic recombination checkpoint effectors that regulate gene expression and cyclin-dependent kinase activity are not necessary. Phosphorylation of histone H2A, which is catalyzed by Mec1 and the related Tel1 protein kinase in response to DSBs, and can help coordinate activation of the Rad53 checkpoint protein kinase in the mitotic cell cycle, is required for the full checkpoint response. Phosphorylation sites that are targeted by Rad53 in a mitotic S phase checkpoint response are also involved, based on the behavior of cells containing mutations in the DBF4 and SLD3 DNA replication genes. However, RAD53 does not appear to be required, nor does RAD9, which encodes a mediator of Rad53, consistent with their lack of function in the recombination checkpoint pathway that prevents meiotic progression. While this response is similar to a checkpoint mechanism that inhibits initiation of DNA replication in the mitotic cell cycle, the evidence points to a new variation on DNA replication control.

  4. "Isogaba Maware": quality control of genome DNA by checkpoints.

    Science.gov (United States)

    Kitazono, A; Matsumoto, T

    1998-05-01

    Checkpoints maintain the interdependency of cell cycle events by permitting the onset of an event only after the completion of the preceding event. The DNA replication checkpoint induces a cell cycle arrest until the completion of the DNA replication. Similarly, the DNA damage checkpoint arrests cell cycle progression if DNA repair is incomplete. A number of genes that play a role in the two checkpoints have been identified through genetic studies in yeasts, and their homologues have been found in fly, mouse, and human. They form signaling cascades activated by a DNA replication block or DNA damage and subsequently generate the negative constraints on cell cycle regulators. The failure of these signaling cascades results in producing offspring that carry mutations or that lack a portion of the genome. In humans, defects in the checkpoints are often associated with cancer-prone diseases. Focusing mainly on the studies in budding and fission yeasts, we summarize the recent progress.

  5. Newly Emerging Immune Checkpoints: Promises for Future Cancer Therapy

    Directory of Open Access Journals (Sweden)

    Robert J. Torphy

    2017-12-01

    Full Text Available Cancer immunotherapy has been a great breakthrough, with immune checkpoint inhibitors leading the way. Despite the clinical effectiveness of certain immune checkpoint inhibitors, the overall response rate remains low, and the effectiveness of immunotherapies for many tumors has been disappointing. There is substantial interest in looking for additional immune checkpoint molecules that may act as therapeutic targets for cancer. Recent advances during the last decade have identified several novel immune checkpoint targets, including lymphocyte activation gene-3 (LAG-3, B and T lymphocyte attenuator (BTLA, programmed death-1 homolog (PD-1H, T-cell immunoglobulin and immunoreceptor tyrosine-based inhibitory motif domain (TIM-3/carcinoembryonic antigen cell adhesion molecule 1 (CEACAM1, and the poliovirus receptor (PVR-like receptors. The investigations into these molecules have generated promising results in preclinical studies. Herein, we will summarize our current progress and understanding of these newly-characterized immune checkpoints and their potential application in cancer immunotherapy.

  6. Radiotherapy and immune checkpoint blockades: a snapshot in 2016

    Energy Technology Data Exchange (ETDEWEB)

    Koo, Tae Yool [Dept. of Radiation Oncology, Hallym University Chuncheon Sacred Heart Hospital, Chuncheon (Korea, Republic of); Kim, In Ah [Dept. of Radiation Oncology, Seoul National University College of Medicine, Seoul (Korea, Republic of)

    2016-12-15

    Immune checkpoint blockades including monoclonal antibodies (mAbs) of cytotoxic T-lymphocyte antigen-4 (CTLA-4), programmed death-1 (PD-1), and programmed death-ligand 1 (PD-L1) have been emerged as a promising anticancer therapy. Several immune checkpoint blockades have been approved by US Food and Drug Administration (FDA), and have shown notable success in clinical trials for patients with advanced melanoma and non-small cell lung cancer. Radiotherapy is a promising combination partner of immune checkpoint blockades due to its potent pro-immune effect. This review will cover the current issue and the future perspectives for combined with radiotherapy and immune checkpoint blockades based upon the available preclinical and clinical data.

  7. TSA Security Checkpoint Wait Times – API (PMIS)

    Data.gov (United States)

    Department of Homeland Security — TSA operational data including: Airport wait time (hourly) data Airport throughput (hourly) data Prohibited item (hourly) data Monthly Objectives Report (MOR) data...

  8. The DNA replication checkpoint directly regulates MBF-dependent G1/S transcription.

    Science.gov (United States)

    Dutta, Chaitali; Patel, Prasanta K; Rosebrock, Adam; Oliva, Anna; Leatherwood, Janet; Rhind, Nicholas

    2008-10-01

    The DNA replication checkpoint transcriptionally upregulates genes that allow cells to adapt to and survive replication stress. Our results show that, in the fission yeast Schizosaccharomyces pombe, the replication checkpoint regulates the entire G(1)/S transcriptional program by directly regulating MBF, the G(1)/S transcription factor. Instead of initiating a checkpoint-specific transcriptional program, the replication checkpoint targets MBF to maintain the normal G(1)/S transcriptional program during replication stress. We propose a mechanism for this regulation, based on in vitro phosphorylation of the Cdc10 subunit of MBF by the Cds1 replication-checkpoint kinase. Replacement of two potential phosphorylation sites with phosphomimetic amino acids suffices to promote the checkpoint transcriptional program, suggesting that Cds1 phosphorylation directly regulates MBF-dependent transcription. The conservation of MBF between fission and budding yeast, and recent results implicating MBF as a target of the budding yeast replication checkpoint, suggests that checkpoint regulation of the MBF transcription factor is a conserved strategy for coping with replication stress. Furthermore, the structural and regulatory similarity between MBF and E2F, the metazoan G(1)/S transcription factor, suggests that this checkpoint mechanism may be broadly conserved among eukaryotes.

  9. The DNA Replication Checkpoint Directly Regulates MBF-Dependent G1/S Transcription▿

    Science.gov (United States)

    Dutta, Chaitali; Patel, Prasanta K.; Rosebrock, Adam; Oliva, Anna; Leatherwood, Janet; Rhind, Nicholas

    2008-01-01

    The DNA replication checkpoint transcriptionally upregulates genes that allow cells to adapt to and survive replication stress. Our results show that, in the fission yeast Schizosaccharomyces pombe, the replication checkpoint regulates the entire G1/S transcriptional program by directly regulating MBF, the G1/S transcription factor. Instead of initiating a checkpoint-specific transcriptional program, the replication checkpoint targets MBF to maintain the normal G1/S transcriptional program during replication stress. We propose a mechanism for this regulation, based on in vitro phosphorylation of the Cdc10 subunit of MBF by the Cds1 replication-checkpoint kinase. Replacement of two potential phosphorylation sites with phosphomimetic amino acids suffices to promote the checkpoint transcriptional program, suggesting that Cds1 phosphorylation directly regulates MBF-dependent transcription. The conservation of MBF between fission and budding yeast, and recent results implicating MBF as a target of the budding yeast replication checkpoint, suggests that checkpoint regulation of the MBF transcription factor is a conserved strategy for coping with replication stress. Furthermore, the structural and regulatory similarity between MBF and E2F, the metazoan G1/S transcription factor, suggests that this checkpoint mechanism may be broadly conserved among eukaryotes. PMID:18662996

  10. Molecular Mechanisms of DNA Replication Checkpoint Activation

    Directory of Open Access Journals (Sweden)

    Bénédicte Recolin

    2014-03-01

    Full Text Available The major challenge of the cell cycle is to deliver an intact, and fully duplicated, genetic material to the daughter cells. To this end, progression of DNA synthesis is monitored by a feedback mechanism known as replication checkpoint that is untimely linked to DNA replication. This signaling pathway ensures coordination of DNA synthesis with cell cycle progression. Failure to activate this checkpoint in response to perturbation of DNA synthesis (replication stress results in forced cell division leading to chromosome fragmentation, aneuploidy, and genomic instability. In this review, we will describe current knowledge of the molecular determinants of the DNA replication checkpoint in eukaryotic cells and discuss a model of activation of this signaling pathway crucial for maintenance of genomic stability.

  11. Immune mediated neuropathy following checkpoint immunotherapy.

    Science.gov (United States)

    Gu, Yufan; Menzies, Alexander M; Long, Georgina V; Fernando, S L; Herkes, G

    2017-11-01

    Checkpoint immunotherapy has revolutionised cancer therapy and is now standard treatment for many malignancies including metastatic melanoma. Acute inflammatory neuropathies, often labelled as Guillain-Barre syndrome, are an uncommon but potentially severe complication of checkpoint immunotherapy with individual cases described but never characterised as a group. We describe a case of acute sensorimotor and autonomic neuropathy following a single dose of combination ipilimumab and nivolumab for metastatic melanoma. A literature search was performed, identifying 14 other cases of acute neuropathy following checkpoint immunotherapy, with the clinical, electrophysiological and laboratory features summarised. Most cases described an acute sensorimotor neuropathy (92%) with hyporeflexia (92%) that could occur from induction up till many weeks after the final dose of therapy. In contrast to Guillain-Barre syndrome, the cerebrospinal fluid (CSF) analysis often shows a lymphocytic picture (50%) and the electrophysiology showed an axonal pattern (55%). Treatment was variable and often in combination. 11 cases received steroid therapy with only 1 death within this group, whereas of the 4 patients who did not receive steroid therapy there were 3 deaths. In conclusion checkpoint immunotherapy - induced acute neuropathies are distinct from and progress differently to Guillain-Barre syndrome. As with other immunotherapy related adverse events corticosteroid therapy should be initiated in addition to usual therapy. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. The DNA Replication Checkpoint Directly Regulates MBF-Dependent G1/S Transcription▿

    OpenAIRE

    Dutta, Chaitali; Patel, Prasanta K.; Rosebrock, Adam; Oliva, Anna; Leatherwood, Janet; Rhind, Nicholas

    2008-01-01

    The DNA replication checkpoint transcriptionally upregulates genes that allow cells to adapt to and survive replication stress. Our results show that, in the fission yeast Schizosaccharomyces pombe, the replication checkpoint regulates the entire G1/S transcriptional program by directly regulating MBF, the G1/S transcription factor. Instead of initiating a checkpoint-specific transcriptional program, the replication checkpoint targets MBF to maintain the normal G1/S transcriptional program du...

  13. Orchestration of DNA Damage Checkpoint Dynamics across the Human Cell Cycle.

    Science.gov (United States)

    Chao, Hui Xiao; Poovey, Cere E; Privette, Ashley A; Grant, Gavin D; Chao, Hui Yan; Cook, Jeanette G; Purvis, Jeremy E

    2017-11-22

    Although molecular mechanisms that prompt cell-cycle arrest in response to DNA damage have been elucidated, the systems-level properties of DNA damage checkpoints are not understood. Here, using time-lapse microscopy and simulations that model the cell cycle as a series of Poisson processes, we characterize DNA damage checkpoints in individual, asynchronously proliferating cells. We demonstrate that, within early G1 and G2, checkpoints are stringent: DNA damage triggers an abrupt, all-or-none cell-cycle arrest. The duration of this arrest correlates with the severity of DNA damage. After the cell passes commitment points within G1 and G2, checkpoint stringency is relaxed. By contrast, all of S phase is comparatively insensitive to DNA damage. This checkpoint is graded: instead of halting the cell cycle, increasing DNA damage leads to slower S phase progression. In sum, we show that a cell's response to DNA damage depends on its exact cell-cycle position and that checkpoints are phase-dependent, stringent or relaxed, and graded or all-or-none. Copyright © 2017 Elsevier Inc. All rights reserved.

  14. Checkpoint independence of most DNA replication origins in fission yeast

    OpenAIRE

    Mickle, Katie L; Ramanathan, Sunita; Rosebrock, Adam; Oliva, Anna; Chaudari, Amna; Yompakdee, Chulee; Scott, Donna; Leatherwood, Janet; Huberman, Joel A

    2007-01-01

    Abstract Background In budding yeast, the replication checkpoint slows progress through S phase by inhibiting replication origin firing. In mammals, the replication checkpoint inhibits both origin firing and replication fork movement. To find out which strategy is employed in the fission yeast, Schizosaccharomyces pombe, we used microarrays to investigate the use of origins by wild-type and checkpoint-mutant strains in the presence of hydroxyurea (HU), which limits the pool of deoxyribonucleo...

  15. Checkpointing for graceful degradation in distributed embedded systems

    Science.gov (United States)

    Sababha, Belal Hussein

    Graceful degradation is an approach to developing dependable safety-critical embedded applications, where redundant active or standby resources are used to cope with faults through a system reconfiguration at run-time. Compared to traditional hardware and software redundancy, it is a promising technique that may achieve dependability with a significant reduction in cost, size, weight, and power requirements. Reconfiguration at run-time necessitates using proper checkpointing protocols to support state reservation to ensure correct task restarts after a system reconfiguration. One of the most common checkpointing protocols are communication induced checkpointing (CIC) protocols, which are well developed and understood for large parallel and information systems, but not much has been done for resource limited embedded systems. This work implements and evaluates some of the most common CIC protocols in a periodic resource constrained distributed embedded system for graceful degradation purposes. A test-bed has been developed and used for the evaluation of the various protocols. The implemented protocols are thoroughly studied and performances are contrasted. Specifically the periodicity property and how it benefits checkpointing in embedded systems is investigated. This work introduces a unique effort of CIC protocol implementation and evaluation in the field of distributed embedded systems. Other than providing a test-bed for graceful degradation support, this work shows that some checkpointing protocols that are not efficient in large information systems and supercomputers perform well in embedded systems. We show that a simple index-based CIC protocol, such as the BCS protocol, is more appropriate in embedded system applications compared to other protocols that piggyback a significant amount of information to reduce the number of forced checkpoints. Finally, this work proposes a whole graceful degradation approach to achieve fault tolerance in resource constrained

  16. Combination approaches with immune checkpoint blockade in cancer therapy

    Directory of Open Access Journals (Sweden)

    Maarten Swart

    2016-11-01

    Full Text Available In healthy individuals, immune checkpoint molecules prevent autoimmune responses and limit immune cell-mediated tissue damage. Tumors frequently exploit these molecules to evade eradication by the immune system. Over the past years, immune checkpoint blockade of cytotoxic T lymphocyte antigen-4 (CTLA-4 and programmed death-1 (PD-1 emerged as promising strategies to activate anti-tumor cytotoxic T cell responses. Although complete regression and long-term survival is achieved in some patients, not all patients respond. This review describes promising, novel combination approaches involving immune checkpoint blockade, aimed at increasing response-rates to the single treatments.

  17. Space Reclamation for Uncoordinated Checkpointing in Message-Passing Systems. Ph.D. Thesis

    Science.gov (United States)

    Wang, Yi-Min

    1993-01-01

    Checkpointing and rollback recovery are techniques that can provide efficient recovery from transient process failures. In a message-passing system, the rollback of a message sender may cause the rollback of the corresponding receiver, and the system needs to roll back to a consistent set of checkpoints called recovery line. If the processes are allowed to take uncoordinated checkpoints, the above rollback propagation may result in the domino effect which prevents recovery line progression. Traditionally, only obsolete checkpoints before the global recovery line can be discarded, and the necessary and sufficient condition for identifying all garbage checkpoints has remained an open problem. A necessary and sufficient condition for achieving optimal garbage collection is derived and it is proved that the number of useful checkpoints is bounded by N(N+1)/2, where N is the number of processes. The approach is based on the maximum-sized antichain model of consistent global checkpoints and the technique of recovery line transformation and decomposition. It is also shown that, for systems requiring message logging to record in-transit messages, the same approach can be used to achieve optimal message log reclamation. As a final topic, a unifying framework is described by considering checkpoint coordination and exploiting piecewise determinism as mechanisms for bounding rollback propagation, and the applicability of the optimal garbage collection algorithm to domino-free recovery protocols is demonstrated.

  18. Sobriety checkpoints in Thailand: a review of effectiveness and developments over time.

    Science.gov (United States)

    Ditsuwan, Vallop; Veerman, J Lennert; Bertram, Melanie; Vos, Theo

    2015-03-01

    This review describes the legal basis for and implementation of sobriety checkpoints in Thailand and identifies factors that influenced their historical development and effectiveness. The first alcohol and traffic injury control law in Thailand was implemented in 1934. The 0.05 g/100 mL blood alcohol concentration limit was set in 1994. Currently, 3 types of sobriety checkpoints are used: general police checkpoints, selective breath testing, and special event sobriety checkpoints. The authors found few reports on the strategies, frequencies, and outcomes for any of these types of checkpoints, despite Thailand having devoted many resources to their implementation. In Thailand and other low-middle income countries, it is necessary to address the country-specific barriers to successful enforcement (including political and logistical issues, lack of equipment, and absence of other supportive alcohol harm reduction measures) before sobriety checkpoints can be expected to be as effective as reported in high-income countries. © 2011 APJPH.

  19. Detection of Total Knee Arthroplasties at Airport Security Checkpoints: How Do Updated Security Measures Affect Patients?

    Science.gov (United States)

    Issa, Kimona; Pierce, Todd P; Gwam, Chukwuweieke; Goljan, Peter; Festa, Anthony; Scillia, Anthony J; Mont, Michael A

    2017-07-01

    Airport security measures continue to be updated with the incorporation of the new body scanners and automatic target recognition software. The purpose of this study was analyze the incidence of: (1) triggering the security alarm; (2) extra security searches; (3) perceived inconvenience; and (4) presence of other surgical hardware in those who underwent total knee arthroplasty (TKA) and passed through airport security. A questionnaire was given to 125 consecutive patients with a TKA. Those who passed through airport security after January 2014 were considered for inclusion. A questionnaire was administered that addressed the number of encounters with airport security, metal detector activation, additional screening procedures, and perceived inconvenience. Out of the 125 patients, 53 met inclusion criteria. Out of the 53 patients, 20 (38%) reported that their prosthesis triggered a metal detector. Out of the 20 patients, 8 (40%) who reported triggering of metal detectors also reported the presence of surgical hardware elsewhere in the body. Eighteen of the 53 patients (34%) believed having a TKA was inconvenient for airplane travel. Compared with the historical cohort, alarms were triggered in 70 of 97 patients ( p  = 0.0001) and 50 of 97 reported inconvenience when traveling ( n  = 50 of 97 patients; p  = 0.04). The incidences of those who underwent TKA triggering alarms and perceiving inconvenience when passing through airport security have decreased from previously published studies. This is most likely due to the recent updates and modifications to screening. As these security measures are modified and implant designs continue to evolve, this is an area of investigation that should continue. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  20. ATM and checkpoint responses to DNA double strand breaks

    International Nuclear Information System (INIS)

    Khanna, K.K.

    2003-01-01

    DNA damage checkpoints can be classified into G1/S, intra-S and G2/M checkpoints, so named according to the cell cycle transitions that they regulate. DNA damage incurred during the G1 or G2 phase of the cell cycle leads to growth arrest at the G1/S and G2/M phase boundaries, respectively, whereas genotoxic stress during S phase results in the transient suppression of DNA synthesis. In mammals, ATM (ataxia-telangiectasia mutated) is a protein kinase that controls all checkpoint responses to DNA damage. ATM is a versatile kinase which uses various means to regulate a given checkpoint pathway. It has been shown to act upon several proteins within the same pathway, many times controlling several different modifications of the same protein or using several different targets to arrive at the same end point. Some of the ATM targets act as adaptors by recruiting additional substrates for ATM. ATM controls two types of responses in G1. The p53-dependent responses inhibit Cyclin/Cdk activity by transcriptional induction of p21, whereas p53-independent responses inhibit CDKs through degradation of Cdc25A to maintain CdK2 inhibitory phosphorylation. In regulating p53, ATM directly phosphorylates p53 on Ser15, which likely causes p53 transcriptional activation, concurrently activating other kinases that phosphorylate p53 at other sites such as Ser20, which reduces the ability of MDM2 to bind p53, thus promoting its stability. ATM further ensures p53 stability by phosphorylating MDM2. At least six ATM targets, namely CHK2, CHK1, NBS1, BRCA1, SMC1 and FANCD2, have been implicated in the control of S-phase checkpoint. Cdc25A is the downstream effector of CHK1 and CHK2, though the underlying mechanism for control of intra S-phase checkpoint by other targets remain obscure. G2 checkpoint prevents mitotic entry solely through inhibitory phosphorylation of Cdc2/Cdk1. Several ATM targets including CHK1, CHK2, BRCA1, MDC1 and p53BP1 have been implicated in the control of G2/M

  1. Detection of total hip arthroplasties at airport security checkpoints - how do updated security measures affect patients?

    Science.gov (United States)

    Issa, Kimona; Pierce, Todd P; Gwam, Chukwuweieke; Festa, Anthony; Scillia, Anthony J; Mont, Michael A

    2018-03-01

    There have been historical reports on the experiences of patients with total hip arthroplasty (THA) passing through standard metal detectors at airports. The purpose of this study was to analyse those who had recently passed through airport security and the incidence of: (i) triggering of the alarm; (ii) extra security searches; and (iii) perceived inconvenience. A questionnaire was given to 125 patients with a THA during a follow-up appointment. Those who had passed through airport security after January 2014 met inclusion criteria. A survey was administered that addressed the number of encounters with airport security, frequency of metal detector activation, additional screening procedures utilised, whether security officials required prosthesis documentation, and perceived inconvenience. 51 patients met inclusion criteria. 10 patients (20%) reported triggered security scanners. 4 of the 10 patients stated they had surgical hardware elsewhere in the body. 13 of the 51 patients (25%) believed that having their THA increased the inconvenience of traveling. This is different from the historical cohort with standard metal detectors which patients reported a greater incidence of alarm triggering (n = 120 of 143; p = 0.0001) and perceived inconvenience (n = 99 of 143; p = 0.0001). The percentage of patients who have THA triggering security alarms has decreased. Furthermore, the number of patients who feel that their prosthesis caused traveling inconvenience has decreased. We feel that this decrease in alarms triggered and improved perceptions about inconvenience are related to the increased usage of new technology.

  2. Action-oriented use of ergonomic checkpoints for healthy work design in different settings.

    Science.gov (United States)

    Kogi, Kazutaka

    2007-12-01

    Recent experiences in the action-oriented use of ergonomic checkpoints in different work settings are reviewed. The purpose is to know what features are useful for healthy work design adjusted to each local situation. Based on the review results, common features of ergonomic checkpoints used in participatory training programs for improving workplace conditions in small enterprises, construction sites, home work and agriculture in industrially developing countries in Asia are discussed. These checkpoints generally compile practical improvement options in a broad range of technical areas, such as materials handling, workstation design, physical environment and work organization. Usually, "action checklists" comprising the tiles of the checkpoints are used together. A clear focus is placed on readily applicable low-cost options. Three common features of these various checkpoints appear to be important. First, the checkpoints represent typical good practices in multiple areas. Second, each how-to section of these checkpoints presents simple improvements reflecting basic ergonomic principles. Examples of these principles include easy reach, fewer and faster transport, elbow-level work, coded displays, isolated or screened hazards and shared teamwork. Third, the illustrated checkpoints accompanied by corresponding checklists are used as group work tools in short-term training courses. Many practical improvements achieved are displayed in websites for inter-country work improvement networks. It is suggested to promote the use of locally adjusted checkpoints in various forms of participatory action-oriented training in small-scale workplaces and in agriculture particularly in industrially developing countries.

  3. Checkpoint responses to replication stalling: inducing tolerance and preventing mutagenesis

    Energy Technology Data Exchange (ETDEWEB)

    Kai, Mihoko; Wang, Teresa S.-F

    2003-11-27

    Replication mutants often exhibit a mutator phenotype characterized by point mutations, single base frameshifts, and the deletion or duplication of sequences flanked by homologous repeats. Mutation in genes encoding checkpoint proteins can significantly affect the mutator phenotype. Here, we use fission yeast (Schizosaccharomyces pombe) as a model system to discuss the checkpoint responses to replication perturbations induced by replication mutants. Checkpoint activation induced by a DNA polymerase mutant, aside from delay of mitotic entry, up-regulates the translesion polymerase DinB (Pol{kappa}). Checkpoint Rad9-Rad1-Hus1 (9-1-1) complex, which is loaded onto chromatin by the Rad17-Rfc2-5 checkpoint complex in response to replication perturbation, recruits DinB onto chromatin to generate the point mutations and single nucleotide frameshifts in the replication mutator. This chain of events reveals a novel checkpoint-induced tolerance mechanism that allows cells to cope with replication perturbation, presumably to make possible restarting stalled replication forks. Fission yeast Cds1 kinase plays an essential role in maintaining DNA replication fork stability in the face of DNA damage and replication fork stalling. Cds1 kinase is known to regulate three proteins that are implicated in maintaining replication fork stability: Mus81-Eme1, a hetero-dimeric structure-specific endonuclease complex; Rqh1, a RecQ-family helicase involved in suppressing inappropriate recombination during replication; and Rad60, a protein required for recombinational repair during replication. These Cds1-regulated proteins are thought to cooperatively prevent mutagenesis and maintain replication fork stability in cells under replication stress. These checkpoint-regulated processes allow cells to survive replication perturbation by preventing stalled replication forks from degenerating into deleterious DNA structures resulting in genomic instability and cancer development.

  4. Checkpoint responses to replication stalling: inducing tolerance and preventing mutagenesis

    International Nuclear Information System (INIS)

    Kai, Mihoko; Wang, Teresa S.-F.

    2003-01-01

    Replication mutants often exhibit a mutator phenotype characterized by point mutations, single base frameshifts, and the deletion or duplication of sequences flanked by homologous repeats. Mutation in genes encoding checkpoint proteins can significantly affect the mutator phenotype. Here, we use fission yeast (Schizosaccharomyces pombe) as a model system to discuss the checkpoint responses to replication perturbations induced by replication mutants. Checkpoint activation induced by a DNA polymerase mutant, aside from delay of mitotic entry, up-regulates the translesion polymerase DinB (Polκ). Checkpoint Rad9-Rad1-Hus1 (9-1-1) complex, which is loaded onto chromatin by the Rad17-Rfc2-5 checkpoint complex in response to replication perturbation, recruits DinB onto chromatin to generate the point mutations and single nucleotide frameshifts in the replication mutator. This chain of events reveals a novel checkpoint-induced tolerance mechanism that allows cells to cope with replication perturbation, presumably to make possible restarting stalled replication forks. Fission yeast Cds1 kinase plays an essential role in maintaining DNA replication fork stability in the face of DNA damage and replication fork stalling. Cds1 kinase is known to regulate three proteins that are implicated in maintaining replication fork stability: Mus81-Eme1, a hetero-dimeric structure-specific endonuclease complex; Rqh1, a RecQ-family helicase involved in suppressing inappropriate recombination during replication; and Rad60, a protein required for recombinational repair during replication. These Cds1-regulated proteins are thought to cooperatively prevent mutagenesis and maintain replication fork stability in cells under replication stress. These checkpoint-regulated processes allow cells to survive replication perturbation by preventing stalled replication forks from degenerating into deleterious DNA structures resulting in genomic instability and cancer development

  5. Development of cell-cycle checkpoint therapy for solid tumors.

    Science.gov (United States)

    Tamura, Kenji

    2015-12-01

    Cellular proliferation is tightly controlled by several cell-cycle checkpoint proteins. In cancer, the genes encoding these proteins are often disrupted and cause unrestrained cancer growth. The proteins are over-expressed in many malignancies; thus, they are potential targets for anti-cancer therapies. These proteins include cyclin-dependent kinase, checkpoint kinase, WEE1 kinase, aurora kinase and polo-like kinase. Cyclin-dependent kinase inhibitors are the most advanced cell-cycle checkpoint therapeutics available. For instance, palbociclib (PD0332991) is a first-in-class, oral, highly selective inhibitor of CDK4/6 and, in combination with letrozole (Phase II; PALOMA-1) or with fulvestrant (Phase III; PALOMA-3), it has significantly prolonged progression-free survival, in patients with metastatic estrogen receptor-positive, HER2-negative breast cancer, in comparison with that observed in patients using letrozole, or fulvestrant alone, respectively. In this review, we provide an overview of the current compounds available for cell-cycle checkpoint protein-directed therapy for solid tumors. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  6. A checkpoint compression study for high-performance computing systems

    Energy Technology Data Exchange (ETDEWEB)

    Ibtesham, Dewan [Univ. of New Mexico, Albuquerque, NM (United States). Dept. of Computer Science; Ferreira, Kurt B. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States). Scalable System Software Dept.; Arnold, Dorian [Univ. of New Mexico, Albuquerque, NM (United States). Dept. of Computer Science

    2015-02-17

    As high-performance computing systems continue to increase in size and complexity, higher failure rates and increased overheads for checkpoint/restart (CR) protocols have raised concerns about the practical viability of CR protocols for future systems. Previously, compression has proven to be a viable approach for reducing checkpoint data volumes and, thereby, reducing CR protocol overhead leading to improved application performance. In this article, we further explore compression-based CR optimization by exploring its baseline performance and scaling properties, evaluating whether improved compression algorithms might lead to even better application performance and comparing checkpoint compression against and alongside other software- and hardware-based optimizations. Our results highlights are: (1) compression is a very viable CR optimization; (2) generic, text-based compression algorithms appear to perform near optimally for checkpoint data compression and faster compression algorithms will not lead to better application performance; (3) compression-based optimizations fare well against and alongside other software-based optimizations; and (4) while hardware-based optimizations outperform software-based ones, they are not as cost effective.

  7. An ATM-independent S-phase checkpoint response involves CHK1 pathway

    Science.gov (United States)

    Zhou, Xiang-Yang; Wang, Xiang; Hu, Baocheng; Guan, Jun; Iliakis, George; Wang, Ya

    2002-01-01

    After exposure to genotoxic stress, proliferating cells actively slow down the DNA replication through a S-phase checkpoint to provide time for repair. We report that in addition to the ataxia-telangiectasia mutated (ATM)-dependent pathway that controls the fast response, there is an ATM-independent pathway that controls the slow response to regulate the S-phase checkpoint after ionizing radiation in mammalian cells. The slow response of S-phase checkpoint, which is resistant to wortmannin, sensitive to caffeine and UCN-01, and related to cyclin-dependent kinase phosphorylation, is much stronger in CHK1 overexpressed cells, and it could be abolished by Chk1 antisense oligonucleotides. These results provide evidence that the ATM-independent slow response of S-phase checkpoint involves CHK1 pathway.

  8. An origin-deficient yeast artificial chromosome triggers a cell cycle checkpoint.

    Science.gov (United States)

    van Brabant, A J; Buchanan, C D; Charboneau, E; Fangman, W L; Brewer, B J

    2001-04-01

    Checkpoint controls coordinate entry into mitosis with the completion of DNA replication. Depletion of nucleotide precursors by treatment with the drug hydroxyurea triggers such a checkpoint response. However, it is not clear whether the signal for this hydroxyurea-induced checkpoint pathway is the presence of unreplicated DNA, or rather the persistence of single-stranded or damaged DNA. In a yeast artificial chromosome (YAC) we have engineered an approximately 170 kb region lacking efficient replication origins that allows us to explore the specific effects of unreplicated DNA on cell cycle progression. Replication of this YAC extends the length of S phase and causes cells to engage an S/M checkpoint. In the absence of Rad9 the YAC becomes unstable, undergoing deletions within the origin-free region.

  9. Anaphase onset before complete DNA replication with intact checkpoint responses

    DEFF Research Database (Denmark)

    Torres-Rosell, Jordi; De Piccoli, Giacomo; Cordon-Preciado, Violeta

    2007-01-01

    Cellular checkpoints prevent mitosis in the presence of stalled replication forks. Whether checkpoints also ensure the completion of DNA replication before mitosis is unknown. Here, we show that in yeast smc5-smc6 mutants, which are related to cohesin and condensin, replication is delayed, most...

  10. A New Adaptive Checkpointing Strategy for Mobile Computing

    Institute of Scientific and Technical Information of China (English)

    MENChaoguang; ZUODecheng; YANGXiaozong

    2005-01-01

    Adaptive checkpointing strategy is an efficient recovery scheme, which is suitable for mobile computing system. However, all existing adaptive checkpointing schemes are not correct to recover system when failure occurs in some special period. In this paper, the issues that will lead to system inconsistency are first discussed and then a new adaptive strategy that can recover system to correct consistent state is proposed. Our algorithm improves system recovery performance because only failure process needs rollback through logging.

  11. Implication of the G2 checkpoint in the maintenance of genome integrity

    International Nuclear Information System (INIS)

    Piette, J.; Munoz, P.

    2000-01-01

    Checkpoints are surveillance mechanisms that block transitions, for instance in response to DNA damage. We summarize here here recent progress in the molecular characterization of the G 2 checkpoint which controls the entry into mitosis, and review new evidence which implicates de-regulated expression of checkpoint proteins and proteins involved in DNA damage repair in cancer development. These now exists good evidence that individuals who inherited mutations in genes involved in G 2 checkpoint and DNA damage repair are predisposed to the development of various types of cancer, their cells having a strong tendency to accumulate additional mutations. However, the occurrence of mutations of most of these genes in sporadic tumors has yet to be analysed more accurately. (authors)

  12. Detection of total hip prostheses at airport security checkpoints: how has heightened security affected patients?

    Science.gov (United States)

    Johnson, Aaron J; Naziri, Qais; Hooper, Hasan A; Mont, Michael A

    2012-04-04

    The sensitivity of airport security screening measures has increased substantially during the past decade, but few reports have examined how this affects patients who have undergone hip arthroplasty. The purpose of this study was to determine the experiences of patients who had hip prostheses and who passed through airport security screenings. A consecutive series of 250 patients who presented to the office of a high-volume surgeon were asked whether they had had a hip prosthesis for at least one year and, if so, whether they had flown on a commercial airline within the past year. Patients who responded affirmatively to both questions were asked to complete a written survey that included questions about which joint(s) had been replaced, the number of encounters with airport security, the frequency and location of metal detector activation, any additional screening procedures that were utilized, whether security officials requested documentation regarding the prosthesis, the degree of inconvenience, and other relevant information. Of the 143 patients with hip replacements who traveled by air, 120 (84%) reported triggering the alarm and required wanding with a handheld detector. Twenty-five of these patients reported subsequently having to undergo further inspection, including additional wanding, being patted down, and in two cases having to undress in a private room to show the incision. Ninety-nine (69%) of the 143 patients reported that the prosthetic joint caused an inconvenience while traveling. This study provides interesting and critical information that allows physicians to understand the real-world implications of implanted orthopaedic devices for patients who are traveling where there has been heightened security since September 11, 2001. Patients should be counseled that they should expect delays and be prepared for such inconveniences, but that these are often only momentary. This information could relieve some anxiety and concerns that patients may have

  13. Checkpoint inhibitors in advanced melanoma: effect on the field of immunotherapy.

    Science.gov (United States)

    O'reilly, Aine; Larkin, James

    2017-07-01

    The success of the immune checkpoint inhibitors in melanoma has reinvigorated the field of immunotherapy. Immune checkpoint inhibitors are now the standard of care in multiple cancer types including lung cancer, head and neck cancer, urothelial cancer and renal cell cancer. The field of immunotherapy is currently expanding rapidly and will be a focus of research and development for decades to come. Areas covered: This review covers the early development of immune checkpoint inhibitors and the changes that occurred in the drug development paradigm to facilitate the development of immunotherapy. The review will summarise the areas into which immune checkpoint inhibitors have been adopted and will review the data that supported this. Furthermore, we will discuss future developments in immunotherapy and the current landscape regarding maximising the potential of immunotherapy in clinical practice. Expert commentary: In the author's opinion, the potential of immunotherapy is vast. To date immune checkpoint inhibition has already delivered durable responses in a proportion of patients with cancer types which were previously universally lethal. The future of immunotherapy will rely upon the intelligent application of translational research to clinical practice, such that immunotherapy can be effective for a wider population and maintain its current growth.

  14. Asynchronous Two-Level Checkpointing Scheme for Large-Scale Adjoints in the Spectral-Element Solver Nek5000

    Energy Technology Data Exchange (ETDEWEB)

    Schanen, Michel; Marin, Oana; Zhang, Hong; Anitescu, Mihai

    2016-01-01

    Adjoints are an important computational tool for large-scale sensitivity evaluation, uncertainty quantification, and derivative-based optimization. An essential component of their performance is the storage/recomputation balance in which efficient checkpointing methods play a key role. We introduce a novel asynchronous two-level adjoint checkpointing scheme for multistep numerical time discretizations targeted at large-scale numerical simulations. The checkpointing scheme combines bandwidth-limited disk checkpointing and binomial memory checkpointing. Based on assumptions about the target petascale systems, which we later demonstrate to be realistic on the IBM Blue Gene/Q system Mira, we create a model of the expected performance of our checkpointing approach and validate it using the highly scalable Navier-Stokes spectralelement solver Nek5000 on small to moderate subsystems of the Mira supercomputer. In turn, this allows us to predict optimal algorithmic choices when using all of Mira. We also demonstrate that two-level checkpointing is significantly superior to single-level checkpointing when adjoining a large number of time integration steps. To our knowledge, this is the first time two-level checkpointing had been designed, implemented, tuned, and demonstrated on fluid dynamics codes at large scale of 50k+ cores.

  15. Immune-Checkpoint Blockade and Active Immunotherapy for Glioma

    International Nuclear Information System (INIS)

    Ahn, Brian J.; Pollack, Ian F.; Okada, Hideho

    2013-01-01

    Cancer immunotherapy has made tremendous progress, including promising results in patients with malignant gliomas. Nonetheless, the immunological microenvironment of the brain and tumors arising therein is still believed to be suboptimal for sufficient antitumor immune responses for a variety of reasons, including the operation of “immune-checkpoint” mechanisms. While these mechanisms prevent autoimmunity in physiological conditions, malignant tumors, including brain tumors, actively employ these mechanisms to evade from immunological attacks. Development of agents designed to unblock these checkpoint steps is currently one of the most active areas of cancer research. In this review, we summarize recent progresses in the field of brain tumor immunology with particular foci in the area of immune-checkpoint mechanisms and development of active immunotherapy strategies. In the last decade, a number of specific monoclonal antibodies designed to block immune-checkpoint mechanisms have been developed and show efficacy in other cancers, such as melanoma. On the other hand, active immunotherapy approaches, such as vaccines, have shown encouraging outcomes. We believe that development of effective immunotherapy approaches should ultimately integrate those checkpoint-blockade agents to enhance the efficacy of therapeutic approaches. With these agents available, it is going to be quite an exciting time in the field. The eventual success of immunotherapies for brain tumors will be dependent upon not only an in-depth understanding of immunology behind the brain and brain tumors, but also collaboration and teamwork for the development of novel trials that address multiple layers of immunological challenges in gliomas

  16. Immune-Checkpoint Blockade and Active Immunotherapy for Glioma

    Energy Technology Data Exchange (ETDEWEB)

    Ahn, Brian J. [Department of Immunology, University of Pittsburgh School of Medicine, Pittsburgh, PA 15213 (United States); Brain Tumor Program, University of Pittsburgh Cancer Institute, Pittsburgh, PA 15213 (United States); Pollack, Ian F. [Brain Tumor Program, University of Pittsburgh Cancer Institute, Pittsburgh, PA 15213 (United States); Department of Neurological Surgery, University of Pittsburgh School of Medicine, Pittsburgh, PA 15213 (United States); Okada, Hideho, E-mail: okadah@upmc.edu [Department of Immunology, University of Pittsburgh School of Medicine, Pittsburgh, PA 15213 (United States); Brain Tumor Program, University of Pittsburgh Cancer Institute, Pittsburgh, PA 15213 (United States); Department of Neurological Surgery, University of Pittsburgh School of Medicine, Pittsburgh, PA 15213 (United States); Department of Surgery, University of Pittsburgh School of Medicine, Pittsburgh, PA 15213 (United States)

    2013-11-01

    Cancer immunotherapy has made tremendous progress, including promising results in patients with malignant gliomas. Nonetheless, the immunological microenvironment of the brain and tumors arising therein is still believed to be suboptimal for sufficient antitumor immune responses for a variety of reasons, including the operation of “immune-checkpoint” mechanisms. While these mechanisms prevent autoimmunity in physiological conditions, malignant tumors, including brain tumors, actively employ these mechanisms to evade from immunological attacks. Development of agents designed to unblock these checkpoint steps is currently one of the most active areas of cancer research. In this review, we summarize recent progresses in the field of brain tumor immunology with particular foci in the area of immune-checkpoint mechanisms and development of active immunotherapy strategies. In the last decade, a number of specific monoclonal antibodies designed to block immune-checkpoint mechanisms have been developed and show efficacy in other cancers, such as melanoma. On the other hand, active immunotherapy approaches, such as vaccines, have shown encouraging outcomes. We believe that development of effective immunotherapy approaches should ultimately integrate those checkpoint-blockade agents to enhance the efficacy of therapeutic approaches. With these agents available, it is going to be quite an exciting time in the field. The eventual success of immunotherapies for brain tumors will be dependent upon not only an in-depth understanding of immunology behind the brain and brain tumors, but also collaboration and teamwork for the development of novel trials that address multiple layers of immunological challenges in gliomas.

  17. Immune checkpoint inhibitors for nonsmall cell lung cancer treatment

    Directory of Open Access Journals (Sweden)

    Yuh-Min Chen

    2017-01-01

    Full Text Available Immune checkpoint inhibition with blocking antibodies that target cytotoxic T-lymphocyte antigen-4 (CTLA-4 and the programmed cell death protein 1 (PD-1 pathway [PD-1/programmed death-ligand 1 (PD-L1] have demonstrated promise in a variety of malignancies. While ipilimumab has been approved as a CTLA-4 blocking antibody by the US Food and Drug Administration for the treatment of advanced melanoma, it is still not approved for lung cancer treatment. In contrast, nivolumab and pembrolizumab, both PD-1 blocking antibodies, have been approved for second-line treatment of nonsmall cell lung cancer in 2015 because of their high potency and long-lasting effects in some patient subgroups. Other PD-1 and PD-L1 monoclonal antibodies are also in active development phase. Treatment with such immune checkpoint inhibitors is associated with a unique pattern of immune-related adverse events or side effects. Combination approaches involving CTLA-4 and PD-1/PD-L1 blockade or checkpoint inhibitors with chemotherapy or radiotherapy are being investigated to determine whether they may enhance the efficacy of treatment. Despite many challenges ahead, immunotherapy with checkpoint inhibitors has already become a new and important treatment modality for lung cancer in the last decade following the discovery of targeted therapy.

  18. The pachytene checkpoint and its relationship to evolutionary patterns of polyploidization and hybrid sterility.

    Science.gov (United States)

    Li, X C; Barringer, B C; Barbash, D A

    2009-01-01

    Sterility is a commonly observed phenotype in interspecific hybrids. Sterility may result from chromosomal or genic incompatibilities, and much progress has been made toward understanding the genetic basis of hybrid sterility in various taxa. The underlying mechanisms causing hybrid sterility, however, are less well known. The pachytene checkpoint is a meiotic surveillance system that many organisms use to detect aberrant meiotic products, in order to prevent the production of defective gametes. We suggest that activation of the pachytene checkpoint may be an important mechanism contributing to two types of hybrid sterility. First, the pachytene checkpoint may form the mechanistic basis of some gene-based hybrid sterility phenotypes. Second, the pachytene checkpoint may be an important mechanism that mediates chromosomal-based hybrid sterility phenotypes involving gametes with non-haploid (either non-reduced or aneuploid) chromosome sets. Studies in several species suggest that the strength of the pachytene checkpoint is sexually dimorphic, observations that warrant future investigation into whether such variation may contribute to differences in patterns of sterility between male and female interspecific hybrids. In addition, plants seem to lack the pachytene checkpoint, which correlates with increased production of unreduced gametes and a higher incidence of polyploid species in plants versus animals. Although the pachytene checkpoint occurs in many animals and in fungi, at least some of the genes that execute the pachytene checkpoint are different among organisms. This finding suggests that the penetrance of the pachytene checkpoint, and even its presence or absence can evolve rapidly. The surprising degree of evolutionary flexibility in this meiotic surveillance system may contribute to the observed variation in patterns of hybrid sterility and in rates of polyploidization.

  19. Immune-checkpoint inhibitors in the era of precision medicine: What radiologists should know

    Energy Technology Data Exchange (ETDEWEB)

    Braschi-Amirfarzan, Marta; Tirumani, Sree Harsha; Hodi, Frank Stephan Jr; Nishno, Mizuki [Dept. of Radiology, Brigham and Women' s Hospital and Dana Farber Cancer Institute, Boston (United States)

    2017-01-15

    Over the past five years immune-checkpoint inhibitors have dramatically changed the therapeutic landscape of advanced solid and hematologic malignancies. The currently approved immune-checkpoint inhibitors include antibodies to cytotoxic T-lymphocyte antigen-4, programmed cell death (PD-1), and programmed cell death ligand (PD-L1 and PD-L2). Response to immune-checkpoint inhibitors is evaluated on imaging using the immune-related response criteria. Activation of immune system results in a unique toxicity profile termed immune-related adverse events. This article will review the molecular mechanism, clinical applications, imaging of immune-related response patterns and adverse events associated with immune-checkpoint inhibitors.

  20. Immune-checkpoint inhibitors in the era of precision medicine: What radiologists should know

    International Nuclear Information System (INIS)

    Braschi-Amirfarzan, Marta; Tirumani, Sree Harsha; Hodi, Frank Stephan Jr; Nishno, Mizuki

    2017-01-01

    Over the past five years immune-checkpoint inhibitors have dramatically changed the therapeutic landscape of advanced solid and hematologic malignancies. The currently approved immune-checkpoint inhibitors include antibodies to cytotoxic T-lymphocyte antigen-4, programmed cell death (PD-1), and programmed cell death ligand (PD-L1 and PD-L2). Response to immune-checkpoint inhibitors is evaluated on imaging using the immune-related response criteria. Activation of immune system results in a unique toxicity profile termed immune-related adverse events. This article will review the molecular mechanism, clinical applications, imaging of immune-related response patterns and adverse events associated with immune-checkpoint inhibitors

  1. The spindle assembly checkpoint: More than just keeping track of the spindle.

    OpenAIRE

    Lawrence, KS; Engebrecht, J

    2015-01-01

    Genome stability is essential for cell proliferation and survival. Consequently, genome integrity is monitored by two major checkpoints, the DNA damage response (DDR) and the spindle assembly checkpoint (SAC). The DDR monitors DNA lesions in G1, S, and G2 stages of the cell cycle and the SAC ensures proper chromosome segregation in M phase. There have been extensive studies characterizing the roles of these checkpoints in response to the processes for which they are named; however, emerging e...

  2. The CD47-SIRPα signaling axis as an innate immune checkpoint in cancer.

    Science.gov (United States)

    Matlung, Hanke L; Szilagyi, Katka; Barclay, Neil A; van den Berg, Timo K

    2017-03-01

    Immune checkpoint inhibitors, including those targeting CTLA-4/B7 and the PD-1/PD-L1 inhibitory pathways, are now available for clinical use in cancer patients, with other interesting checkpoint inhibitors being currently in development. Most of these have the purpose to promote adaptive T cell-mediated immunity against cancer. Here, we review another checkpoint acting to potentiate the activity of innate immune cells towards cancer. This innate immune checkpoint is composed of what has become known as the 'don't-eat me' signal CD47, which is a protein broadly expressed on normal cells and often overexpressed on cancer cells, and its counter-receptor, the myeloid inhibitory immunoreceptor SIRPα. Blocking CD47-SIRPα interactions has been shown to promote the destruction of cancer cells by phagocytes, including macrophages and neutrophils. Furthermore, there is growing evidence that targeting of the CD47-SIRPα axis may also promote antigen-presenting cell function and thereby stimulate adaptive T cell-mediated anti-cancer immunity. The development of CD47-SIRPα checkpoint inhibitors and the potential side effects that these may have are discussed. Collectively, this identifies the CD47-SIRPα axis as a promising innate immune checkpoint in cancer, and with data of the first clinical studies with CD47-SIRPα checkpoint inhibitors expected within the coming years, this is an exciting and rapidly developing field. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  3. Top3 processes recombination intermediates and modulates checkpoint activity after DNA damage

    DEFF Research Database (Denmark)

    Mankouri, Hocine W; Hickson, Ian D

    2006-01-01

    Mutation of TOP3 in Saccharomyces cerevisiae causes poor growth, hyperrecombination, and a failure to fully activate DNA damage checkpoints in S phase. Here, we report that overexpression of a dominant-negative allele of TOP3, TOP3(Y356F), which lacks the catalytic (decatenation) activity of Top3......, the catalytic activity of Top3 is not required for DNA damage checkpoint activation, but it is required for normal S-phase progression after DNA damage. We also present evidence that the checkpoint-mediated cell cycle delay and persistence of X-shaped DNA molecules resulting from overexpression of TOP3(Y356F......) are downstream of Rad51 function. We propose that Top3 functions in S phase to both process homologous recombination intermediates and modulate checkpoint activity....

  4. Myasthenia triggered by immune checkpoint inhibitors: New case and literature review.

    Science.gov (United States)

    Gonzalez, Natalia L; Puwanant, Araya; Lu, Angela; Marks, Stanley M; Živković, Saša A

    2017-03-01

    Immune checkpoint molecules are potent regulators of immunologic homeostasis that prevent the development of autoimmunity while maintaining self-tolerance. Inhibitors of immune checkpoint molecules are used as immunotherapy in the treatment of melanoma and different types of refractory cancer, and can trigger various autoimmune complications including myositis and myasthenia gravis. We describe a case of generalized myasthenia gravis induced by pembrolizumab and review 11 other cases. Five patients also had elevated serum CK levels ranging from 1200 to 8729 IU/L, and biopsy showed myositis in one. Severity was highly variable as symptoms normalized spontaneously in one patient, but three others developed myasthenic crisis (including two with fatal outcomes). Steroids have been recommended as a preferred treatment of autoimmune complications of immune-checkpoint inhibitors. Myasthenia gravis should be considered when weakness, diplopia or bulbar symptoms are seen after treatment with immune checkpoint inhibitors, and additional studies are needed to characterize association with hyperCKemia. Copyright © 2017 Elsevier B.V. All rights reserved.

  5. Immune checkpoint inhibitors for metastatic bladder cancer.

    Science.gov (United States)

    Massari, Francesco; Di Nunno, Vincenzo; Cubelli, Marta; Santoni, Matteo; Fiorentino, Michelangelo; Montironi, Rodolfo; Cheng, Liang; Lopez-Beltran, Anto; Battelli, Nicola; Ardizzoni, Andrea

    2018-03-01

    Chemotherapy has represented the standard therapy for unresectable or metastatic urothelial carcinoma for more than 20 years. The growing knowledge of the interaction between tumour and immune system has led to the advent of new classes of drugs, the immune-checkpoints inhibitors, which are intended to change the current scenario. To date, immunotherapy is able to improve the overall responses and survival. Moreover, thanks to its safety profile immune-checkpoint inhibitors could be proposed also to patients unfit for standard chemotherapy. No doubts that these agents have started a revolution expected for years, but despite this encouraging results it appears clear that not all subjects respond to these agents and requiring the development of reliable predictive response factors able to isolate patients who can more benefit from these treatments as well as new strategies aimed to improve immunotherapy clinical outcome. In this review we describe the active or ongoing clinical trials involving Programmed Death Ligand 1 (PD-L1), Programmed Death receptor 1 (PD-1) and Cytotoxic-T Lymphocyte Antigen 4 (CTLA 4) inhibitors in urothelial carcinoma focusing our attention on the developing new immune-agents and combination strategies with immune-checkpoint inhibitors. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Checkpoint inhibitors in endometrial cancer: preclinical rationale and clinical activity.

    Science.gov (United States)

    Mittica, Gloria; Ghisoni, Eleonora; Giannone, Gaia; Aglietta, Massimo; Genta, Sofia; Valabrega, Giorgio

    2017-10-27

    Treatment of advanced and recurrent endometrial cancer (EC) is still an unmet need for oncologists and gynecologic oncologists. The Cancer Genome Atlas Research Network (TCGA) recently provided a new genomic classification, dividing EC in four subgroups. Two types of EC, the polymerase epsilon (POLE)-ultra-mutated and the microsatellite instability-hyper-mutated (MSI-H), are characterized by a high mutation rate providing the rationale for a potential activity of checkpoint inhibitors. We analyzed all available evidence supporting the role of tumor microenvironment (TME) in EC development and the therapeutic implications offered by immune checkpoint inhibitors in this setting. We performed a review on Pubmed with Mesh keywords 'endometrial cancer' and the name of each checkpoint inhibitor discussed in the article. The same search was operated on clinicaltrial.gov to identify ongoing clinical trials exploring PD-1/PD-L1 and CTLA-4 axis in EC, particularly focusing on POLE-ultra-muted and MSI-H cancer types. POLE-ultra-mutated and MSI-H ECs showed an active TME expressing high number of neo-antigens and an elevated amount of tumor infiltrating lymphocytes (TILs). Preliminary results from a phase-1 clinical trial (KEYNOTE-028) demonstrated antitumor activity of Pembrolizumab in EC. Moreover, both Pembrolizumab and Nivolumab reported durable clinical responses in POLE-ultra-mutated patients. Immune checkpoint inhibitors are an attractive option in POLE-ultra-mutated and MSI-H ECs. Future investigations in these subgroups include combinations of checkpoints inhibitors with chemotherapy and small tyrosine kinase inhibitors (TKIs) to enhance a more robust intra-tumoral immune response.

  7. The point of no return: The poly(A)-associated elongation checkpoint.

    Science.gov (United States)

    Tellier, Michael; Ferrer-Vicens, Ivan; Murphy, Shona

    2016-01-01

    Cyclin-dependent kinases play critical roles in transcription by RNA polymerase II (pol II) and processing of the transcripts. For example, CDK9 regulates transcription of protein-coding genes, splicing, and 3' end formation of the transcripts. Accordingly, CDK9 inhibitors have a drastic effect on the production of mRNA in human cells. Recent analyses indicate that CDK9 regulates transcription at the early-elongation checkpoint of the vast majority of pol II-transcribed genes. Our recent discovery of an additional CDK9-regulated elongation checkpoint close to poly(A) sites adds a new layer to the control of transcription by this critical cellular kinase. This novel poly(A)-associated checkpoint has the potential to powerfully regulate gene expression just before a functional polyadenylated mRNA is produced: the point of no return. However, many questions remain to be answered before the role of this checkpoint becomes clear. Here we speculate on the possible biological significance of this novel mechanism of gene regulation and the players that may be involved.

  8. The point of no return: The poly(A)-associated elongation checkpoint

    Science.gov (United States)

    Tellier, Michael; Ferrer-Vicens, Ivan; Murphy, Shona

    2016-01-01

    abstract Cyclin-dependent kinases play critical roles in transcription by RNA polymerase II (pol II) and processing of the transcripts. For example, CDK9 regulates transcription of protein-coding genes, splicing, and 3′ end formation of the transcripts. Accordingly, CDK9 inhibitors have a drastic effect on the production of mRNA in human cells. Recent analyses indicate that CDK9 regulates transcription at the early-elongation checkpoint of the vast majority of pol II-transcribed genes. Our recent discovery of an additional CDK9-regulated elongation checkpoint close to poly(A) sites adds a new layer to the control of transcription by this critical cellular kinase. This novel poly(A)-associated checkpoint has the potential to powerfully regulate gene expression just before a functional polyadenylated mRNA is produced: the point of no return. However, many questions remain to be answered before the role of this checkpoint becomes clear. Here we speculate on the possible biological significance of this novel mechanism of gene regulation and the players that may be involved. PMID:26853452

  9. A genetic screen identifies BRCA2 and PALB2 as key regulators of G2 checkpoint maintenance

    DEFF Research Database (Denmark)

    Menzel, Tobias; Nähse-Kumpf, Viola; Kousholt, Arne Nedergaard

    2011-01-01

    To identify key connections between DNA-damage repair and checkpoint pathways, we performed RNA interference screens for regulators of the ionizing radiation-induced G2 checkpoint, and we identified the breast cancer gene BRCA2. The checkpoint was also abrogated following depletion of PALB2......, an interaction partner of BRCA2. BRCA2 and PALB2 depletion led to premature checkpoint abrogation and earlier activation of the AURORA A-PLK1 checkpoint-recovery pathway. These results indicate that the breast cancer tumour suppressors and homologous recombination repair proteins BRCA2 and PALB2 are main...

  10. Cell size checkpoint control by the retinoblastoma tumor suppressor pathway.

    Science.gov (United States)

    Fang, Su-Chiung; de los Reyes, Chris; Umen, James G

    2006-10-13

    Size control is essential for all proliferating cells, and is thought to be regulated by checkpoints that couple cell size to cell cycle progression. The aberrant cell-size phenotypes caused by mutations in the retinoblastoma (RB) tumor suppressor pathway are consistent with a role in size checkpoint control, but indirect effects on size caused by altered cell cycle kinetics are difficult to rule out. The multiple fission cell cycle of the unicellular alga Chlamydomonas reinhardtii uncouples growth from division, allowing direct assessment of the relationship between size phenotypes and checkpoint function. Mutations in the C. reinhardtii RB homolog encoded by MAT3 cause supernumerous cell divisions and small cells, suggesting a role for MAT3 in size control. We identified suppressors of an mat3 null allele that had recessive mutations in DP1 or dominant mutations in E2F1, loci encoding homologs of a heterodimeric transcription factor that is targeted by RB-related proteins. Significantly, we determined that the dp1 and e2f1 phenotypes were caused by defects in size checkpoint control and were not due to a lengthened cell cycle. Despite their cell division defects, mat3, dp1, and e2f1 mutants showed almost no changes in periodic transcription of genes induced during S phase and mitosis, many of which are conserved targets of the RB pathway. Conversely, we found that regulation of cell size was unaffected when S phase and mitotic transcription were inhibited. Our data provide direct evidence that the RB pathway mediates cell size checkpoint control and suggest that such control is not directly coupled to the magnitude of periodic cell cycle transcription.

  11. The Dynamical Mechanisms of the Cell Cycle Size Checkpoint

    International Nuclear Information System (INIS)

    Feng Shi-Fu; Yang Ling; Yan Jie; Liu Zeng-Rong

    2012-01-01

    Cell division must be tightly coupled to cell growth in order to maintain cell size, whereas the mechanisms of how initialization of mitosis is regulated by cell size remain to be elucidated. We develop a mathematical model of the cell cycle, which incorporates cell growth to investigate the dynamical properties of the size checkpoint in embryos of Xenopus laevis. We show that the size checkpoint is naturally raised from a saddle-node bifurcation, and in a mutant case, the cell loses its size control ability due to the loss of this saddle-node point

  12. Bir1 Deletion Causes Malfunction of the Spindle Assembly Checkpoint and Apoptosis in Yeast

    International Nuclear Information System (INIS)

    Ren, Qun; Liou, Liang-Chun; Gao, Qiuqiang; Bao, Xiaoming; Zhang, Zhaojie

    2012-01-01

    Cell division in yeast is a highly regulated and well studied event. Various checkpoints are placed throughout the cell cycle to ensure faithful segregation of sister chromatids. Unexpected events, such as DNA damage or oxidative stress, cause the activation of checkpoint(s) and cell cycle arrest. Malfunction of the checkpoints may induce cell death. We previously showed that under oxidative stress, the budding yeast cohesin Mcd1, a homolog of human Rad21, was cleaved by the caspase-like protease Esp1. The cleaved Mcd1 C-terminal fragment was then translocated to mitochondria, causing apoptotic cell death. In the present study, we demonstrated that Bir1 plays an important role in spindle assembly checkpoint and cell death. Similar to H 2 O 2 treatment, deletion of BIR1 using a BIR1-degron strain caused degradation of the securin Pds1, which binds and inactivates Esp1 until metaphase-anaphase transition in a normal cell cycle. BIR1 deletion caused an increase level of ROS and mis-location of Bub1, a major protein for spindle assembly checkpoint. In wild type, Bub1 was located at the kinetochores, but was primarily in the cytoplasm in bir1 deletion strain. When BIR1 was deleted, addition of nocodazole was unable to retain the Bub1 localization on kinetochores, further suggesting that Bir1 is required to activate and maintain the spindle assembly checkpoint. Our study suggests that the BIR1 function in cell cycle regulation works in concert with its anti-apoptosis function.

  13. CHECKPOINT INHIBITOR IMMUNE THERAPY: Systemic Indications and Ophthalmic Side Effects.

    Science.gov (United States)

    Dalvin, Lauren A; Shields, Carol L; Orloff, Marlana; Sato, Takami; Shields, Jerry A

    2018-06-01

    To review immune checkpoint inhibitor indications and ophthalmic side effects. A literature review was performed using a PubMed search for publications between 1990 and 2017. Immune checkpoint inhibitors are designed to treat system malignancies by targeting one of three ligands, leading to T-cell activation for attack against malignant cells. These ligands (and targeted drug) include cytotoxic T-lymphocyte antigen-4 (CTLA-4, ipilimumab), programmed death protein 1 (PD-1, pembrolizumab, nivolumab), and programmed death ligand-1 (PD-L1, atezolizumab, avelumab, durvalumab). These medications upregulate the immune system and cause autoimmune-like side effects. Ophthalmic side effects most frequently manifest as uveitis (1%) and dry eye (1-24%). Other side effects include myasthenia gravis (n = 19 reports), inflammatory orbitopathy (n = 11), keratitis (n = 3), cranial nerve palsy (n = 3), optic neuropathy (n = 2), serous retinal detachment (n = 2), extraocular muscle myopathy (n = 1), atypical chorioretinal lesions (n = 1), immune retinopathy (n = 1), and neuroretinitis (n = 1). Most inflammatory side effects are managed with topical or periocular corticosteroids, but advanced cases require systemic corticosteroids and cessation of checkpoint inhibitor therapy. Checkpoint inhibitors enhance the immune system by releasing inhibition on T cells, with risk of autoimmune-like side effects. Ophthalmologists should include immune-related adverse events in their differential when examining cancer patients with new ocular symptoms.

  14. Developmental checkpoints and feedback circuits time insect maturation

    DEFF Research Database (Denmark)

    Rewitz, Kim Furbo; Yamanaka, Naoki; O'Connor, Michael B.

    2013-01-01

    as external cues, to time production and release of ecdysone. Based on results discussed here, we suggest that developmental progression to adulthood is controlled by checkpoints that regulate the genetic timing program enabling it to adapt to different environmental conditions. These checkpoints utilize...... a number of signaling pathways to modulate ecdysone production in the prothoracic gland. Release of ecdysone activates an autonomous cascade of both feedforward and feedback signals that determine the duration of the ecdysone pulse at each developmental transitions. Conservation of the genetic mechanisms...... that coordinate the juvenile-adult transition suggests that insights from the fruit fly Drosophila will provide a framework for future investigation of developmental timing in metazoans....

  15. Conformation-specific anti-Mad2 monoclonal antibodies for the dissection of checkpoint signaling

    DEFF Research Database (Denmark)

    Sedgwick, Garry G; Larsen, Marie Sofie Yoo; Lischetti, Tiziana

    2016-01-01

    The spindle assembly checkpoint (SAC) ensures accurate chromosome segregation during mitosis by delaying the activation of the anaphase-promoting complex/cyclosome (APC/C) in response to unattached kinetochores. The Mad2 protein is essential for a functional checkpoint because it binds directly t...

  16. From sniffer dogs to emerging sniffer devices for airport security: an opportunity to rethink privacy implications?

    Science.gov (United States)

    Bonfanti, Matteo E

    2014-09-01

    Dogs are known for their incredible ability to detect odours, extracting them from a "complex" environment and recognising them. This makes sniffer dogs precious assets in a broad variety of security applications. However, their use is subject to some intrinsic restrictions. Dogs can only be trained to a limited set of applications, get tired after a relatively short period, and thus require a high turnover. This has sparked a drive over the past decade to develop artificial sniffer devices-generally known as "chemical sniffers" or "electronic noses"-able to complement and possibly replace dogs for some security applications. Such devices have been already deployed, or are intended to be deployed, at borders, airports and other critical installation security checkpoints. Similarly to dogs, they are adopted for detecting residual traces that indicate either the presence of, or recent contact with, substances like drugs and explosives. It goes without saying that, as with sniffer dogs, the use of artificial sniffer devices raises many sensitive issues. Adopting an ethical and legal perspective, the present paper discusses the privacy and data protection implications of the possible deployment of a hand-held body scanning sniffer for screening passengers at EU airport security checkpoints.

  17. The amount of DNA damage needed to activate the radiation-induced G2 checkpoint varies between single cells

    International Nuclear Information System (INIS)

    Tkacz-Stachowska, Kinga; Lund-Andersen, Christin; Velissarou, Angeliki; Myklebust, June H.; Stokke, Trond; Syljuåsen, Randi G.

    2011-01-01

    Background and purpose: The radiation-induced G2 checkpoint helps facilitate DNA repair before cell division. However, recent work has revealed that human cells often escape the G2 checkpoint with unrepaired DNA breaks. The purpose was to explore whether G2 checkpoint activation occurs according to a threshold level of DNA damage. Materials and methods: G2 checkpoint activation was assayed at 75–90 min and 24–48 h after X-ray irradiation of BJ diploid fibroblasts and U2OS osteosarcoma cells. Multiparameter flow cytometry with pacific blue barcoding, and flow cytometry-based sorting of phospho-H3 positive cells to microscope slides, were used to examine the DNA damage marker γ-H2AX in individual mitotic cells that had escaped the G2 checkpoint. Results: For all radiation doses and times tested, the number of γ-H2AX foci varied between individual mitotic cells. At 75 min the median levels of γ-H2AX in mitotic cells increased with higher radiation doses. At 24–48 h, following a prolonged G2 checkpoint, cells were more resistant to checkpoint re-activation by a second dose of radiation. Conclusion: Our results suggest that different amounts of DNA damage are needed to activate the G2 checkpoint in individual cells. Such single cell variation in checkpoint activation may potentially contribute to radiation-induced genomic instability.

  18. Targeting the Checkpoint to Kill Cancer Cells

    Czech Academy of Sciences Publication Activity Database

    Benada, Jan; Macůrek, Libor

    2015-01-01

    Roč. 6, č. 3 (2015), s. 1912-1937 ISSN 2218-273X R&D Projects: GA ČR(CZ) GA14-34264S Institutional support: RVO:68378050 Keywords : checkpoint * DNA damage response * cancer Subject RIV: EB - Genetics ; Molecular Biology

  19. Emodnet Med Sea Check-Point - Indicators for decision- maker

    Science.gov (United States)

    Besnard, Sophie; Claverie, Vincent; Blanc, Frédérique

    2015-04-01

    The Emodnet Checkpoint projects aim is to assess the cost-effectiveness, reliability and utility of the existing monitoring at the sea basin level. This involves the development of monitoring system indicators and a GIS Platform to perform the assessment and make it available. Assessment or production of Check-Point information is made by developing targeted products based on the monitoring data and determining whether the products are meeting the needs of industry and public authorities. Check-point users are the research community, the 'institutional' policy makers for IMP and MSFD implementation, the 'intermediate users', i.e., users capable to understand basic raw data but that benefit from seeing the Checkpoint targeted products and the assessment of the fitness for purpose. We define assessment criteria aimed to characterize/depict the input datasets in terms of 3 territories capable to show performance and gaps of the present monitoring system, appropriateness, availability and fitness for purpose. • Appropriateness: What is made available to users? What motivate/decide them to select this observation rather than this one. • Availability: How this is made available to the user? Place to understand the readiness and service performance of the EU infrastructure • Fitness for use / fitness for purpose: Ability for non-expert user to appreciate the data exploitability (feedback on efficiency & reliability of marine data) For each territory (appropriateness, Availability and Fitness for purpose / for use), we define several indicators. For example, for Availability we define Visibility, Accessibility and Performance. And Visibility is itself defined by "Easily found" and "EU service". So these indicators can be classified according to their territory and sub-territory as seen above, but also according to the complexity to build them. Indicators are built from raw descriptors in 3 stages:  Stage 1: to give a neutral and basic status directly computed from

  20. Spindle assembly checkpoint acquisition at the mid-blastula transition.

    Directory of Open Access Journals (Sweden)

    Maomao Zhang

    Full Text Available The spindle assembly checkpoint (SAC maintains the fidelity of chromosome segregation during mitosis. Nonpathogenic cells lacking the SAC are typically only found in cleavage stage metazoan embryos, which do not acquire functional checkpoints until the mid-blastula transition (MBT. It is unclear how proper SAC function is acquired at the MBT, though several models exist. First, SAC acquisition could rely on transcriptional activity, which increases dramatically at the MBT. Embryogenesis prior to the MBT relies primarily on maternally loaded transcripts, and if SAC signaling components are not maternally supplied, the SAC would depend on zygotic transcription at the MBT. Second, checkpoint acquisition could depend on the Chk1 kinase, which is activated at the MBT to elongate cell cycles and is required for the SAC in somatic cells. Third, SAC function could depend on a threshold nuclear to cytoplasmic (N:C ratio, which increases during pre-MBT cleavage cycles and dictates several MBT events like zygotic transcription and cell cycle remodeling. Finally, the SAC could by regulated by a timer mechanism that coincides with other MBT events but is independent of them. Using zebrafish embryos we show that SAC acquisition at the MBT is independent of zygotic transcription, indicating that the checkpoint program is maternally supplied. Additionally, by precociously lengthening cleavage cycles with exogenous Chk1 activity, we show that cell cycle lengthening and Chk1 activity are not sufficient for SAC acquisition. Furthermore, we find that SAC acquisition can be uncoupled from the N:C ratio. Together, our findings indicate that SAC acquisition is regulated by a maternally programmed developmental timer.

  1. Analysis of Drug Development Paradigms for Immune Checkpoint Inhibitors.

    Science.gov (United States)

    Jardim, Denis L; de Melo Gagliato, Débora; Giles, Francis J; Kurzrock, Razelle

    2018-04-15

    Immune checkpoint inhibitors have unique toxicities and response kinetics compared with cytotoxic and gene-targeted anticancer agents. We investigated the impact of innovative/accelerated immunotherapy drug development/approval models on the accuracy of safety and efficacy assessments by searching the FDA website. Initial phase I trials for each agent were reviewed and safety and efficacy data compared with that found in later trials leading to regulatory approvals of the same agents. As of June 2017, the FDA approved six checkpoint inhibitors for a variety of cancer types. All checkpoint inhibitors received a priority review status and access to at least two additional FDA special access programs, more often breakthrough therapy designation and accelerated approval. Median clinical development time (investigational new drug application to approval) was 60.77 months [avelumab had the shortest timeline (52.33 months)]. Response rates during early phase I trials (median = 16%) are higher than for phase I trials of other agents (with the exception of gene-targeted agents tested with a biomarker). Doses approved were usually not identical to doses recommended on phase I trials. Approximately 50% of types of immune-related and 43% of types of clinically relevant toxicities from later trials were identified in early-phase trials. Even so, treatment-related mortality remains exceedingly low in later studies (0.33% of patients). In conclusion, efficacy and safety of immune checkpoint inhibitors appear to be reasonably predicted from the dose-finding portion of phase I trials, indicating that the fast-track development of these agents is safe and justified. Clin Cancer Res; 24(8); 1785-94. ©2017 AACR . ©2017 American Association for Cancer Research.

  2. Smurf2 as a novel mitotic regulator: From the spindle assembly checkpoint to tumorigenesis

    Directory of Open Access Journals (Sweden)

    Moore Finola E

    2009-07-01

    Full Text Available Abstract The execution of the mitotic program with high fidelity is dependent upon precise spatiotemporal regulation of posttranslational protein modifications. For example, the timely polyubiquitination of critical mitotic regulators by Anaphase Promoting Complex/Cyclosome (APC/C is essential for the metaphase to anaphase transition and mitotic exit. The spindle assembly checkpoint prevents unscheduled activity of APC/C-Cdc20 in early mitosis, allowing bipolar attachment of kinetochores to mitotic spindle and facilitating equal segregation of sister chromatids. The critical effector of the spindle checkpoint, Mitotic arrest deficient 2 (Mad2, is recruited to unattached kinetochores forming a complex with other regulatory proteins to efficiently and cooperatively inhibit APC/C-Cdc20. A weakened and/or dysfunctional spindle checkpoint has been linked to the development of genomic instability in both cell culture and animal models, and evidence suggests that aberrant regulation of the spindle checkpoint plays a critical role in human carcinogenesis. Recent studies have illuminated a network of both degradative and non-degradative ubiquitination events that regulate the metaphase to anaphase transition and mitotic exit. Within this context, our recent work showed that the HECT (Homologous to E6-AP C-terminus-family E3 ligase Smurf2 (Smad specific ubiquitin regulatory factor 2, known as a negative regulator of transforming growth factor-beta (TGF-β signaling, is required for a functional spindle checkpoint by promoting the functional localization and stability of Mad2. Here we discuss putative models explaining the role of Smurf2 as a new regulator in the spindle checkpoint. The dynamic mitotic localization of Smurf2 to the centrosome and other critical mitotic structures provides implications about mitotic checkpoint control dependent on various ubiquitination events. Finally, deregulated Smurf2 activity may contribute to carcinogenesis by

  3. Localization of spindle checkpoint proteins in cells undergoing mitosis with unreplicated genomes.

    Science.gov (United States)

    Johnson, Mary Kathrine; Cooksey, Amanda M; Wise, Dwayne A

    2008-11-01

    CHO cells can be arrested with hydoxyurea at the beginning of the DNA synthesis phase of the cell cycle. Subsequent treatment with the xanthine, caffeine, induces cells to bypass the S-phase checkpoint and enter unscheduled mitosis [Schlegel and Pardee,1986, Science 232:1264-1266]. These treated cells build a normal spindle and distribute kinetochores, unattached to chromosomes, to their daughter cells [Brinkley et al.,1988, Nature 336:251-254; Zinkowski et al.,1991, J Cell Biol 113:1091-1110; Wise and Brinkley,1997, Cell Motil Cytoskeleton 36:291-302; Balczon et al.,2003, Chromosoma 112:96-102]. To investigate how these cells distribute kinetochores to daughter cells, we analyzed the spindle checkpoint components, Mad2, CENP-E, and the 3F3 phosphoepitope, using immunofluorescence and digital microscopy. Even though the kinetochores were unpaired and DNA was fragmented, the tension, alignment, and motor components of the checkpoint were found to be present and localized as predicted in prometaphase and metaphase. This unusual mitosis proves that a cell can successfully localize checkpoint proteins and divide even when kinetochores are unpaired and fragmented. (c) 2008 Wiley-Liss, Inc.

  4. The anaphase inhibitor of Saccharomyces cerevisiae Pds1p is a target of the DNA damage checkpoint pathway

    International Nuclear Information System (INIS)

    Cohen-Fix, O.; Koshland, D.

    1997-01-01

    Inhibition of DNA replication and physical DNA damage induce checkpoint responses that arrest cell cycle progression at two different stages. In Saccharomyces cerevisiae, the execution of both checkpoint responses requires the Mec1 and Rad53 proteins. This observation led to the suggestion that these checkpoint responses are mediated through a common signal transduction pathway. However, because the checkpoint-induced arrests occur at different cell cycle stages, the downstream effectors mediating these arrests are likely to be distinct. We have previously shown that the S. cerevisiae protein Pds1p is an anaphase inhibitor and is essential for cell cycle arrest in mitosis in the presence DNA damage. Herein we show that DNA damage, but not inhibition of DNA replication, induces the phosphorylation of Pds1p. Analyses of Pds1p phosphorylation in different checkpoint mutants reveal that in the presence of DNA damage, Pds1p is phosphorylated in a Mec1p- and Rad9p-dependent hut Rad53p-independent manner. Our data place Pds1p and Rad53p on parallel branches of the DNA damage checkpoint pathway. We suggest that Pds1p is a downstream target of the DNA damage checkpoint pathway and that it is involved in implementing the DNA damage checkpoint arrest specifically in mitosis

  5. Immune Checkpoint Inhibitors in the Treatment of Patients with Neuroendocrine Neoplasia.

    Science.gov (United States)

    Weber, Matthias M; Fottner, Christian

    2018-01-01

    Well-differentiated neuroendocrine neoplasms (NENs) are usually controlled by antiproliferative, local ablative and/or radionuclide therapies, whereas poorly differentiated NENs generally require cytotoxic chemotherapy. However, treatment options for patients with advanced/metastatic high-grade NENs remain limited. Review of the literature and international congress abstracts on the efficacy and safety of immunotherapy by checkpoint inhibition in advanced/metastatic NENs. Evidence points to an important role of immune phenomena in the pathogenesis and treatment of neuroendocrine tumors (NETs). Programmed cell death 1 (PD-1) protein and its ligand are mainly expressed in poorly differentiated NENs. Microsatellite instability and high mutational load are more pronounced in high-grade NENs and may predict response to immunotherapy. Clinical experience of immune checkpoint blockade mainly exists for Merkel cell carcinoma, a high-grade cutaneous neuroendocrine carcinoma (NEC), which has led to approval of the anti-PD-1 antibody avelumab. In addition, there is anecdotal evidence for the efficacy of checkpoint inhibitors in large-cell lung NECs, ovarian NECs and others, including gastroenteropancreatic NENs. Currently, phase II studies investigate PDR001, pembrolizumab, combined durvalumab and tremelimumab, and avelumab treatment in patients with advanced/metastatic NENs. Immune checkpoint inhibitors are a promising therapeutic option, especially in progressive NECs or high-grade NETs with high tumor burden, microsatellite instability, and/or mutational load. © 2018 S. Karger GmbH, Freiburg.

  6. Dpb11/TopBP1 plays distinct roles in DNA replication, checkpoint response and homologous recombination

    DEFF Research Database (Denmark)

    Germann, Susanne Manuela; Østergaard, Vibe Hallundbæk; Haas, Caroline

    2011-01-01

    DPB11/TopBP1 is an essential evolutionarily conserved gene involved in initiation of DNA replication and checkpoint signaling. Here, we show that Saccharomyces cerevisiae Dpb11 forms nuclear foci that localize to sites of DNA damage in G1, S and G2 phase, a recruitment that is conserved for its...... and Tel1, and of the checkpoint mediator Rad9. In a site-directed mutagenesis screen, we identify a separation-of-function mutant, dpb11-PF, that is sensitive to DSB-inducing agents yet remains proficient for DNA replication and the S-phase checkpoint at the permissive temperature. The dpb11-PF mutant...... homologue TopBP1 in Gallus gallus. Damage-induced Dpb11 foci are distinct from Sld3 replication initiation foci. Further, Dpb11 foci are dependent on the checkpoint proteins Mec3 (9-1-1 complex) and Rad24, and require the C-terminal domain of Dpb11. Dpb11 foci are independent of the checkpoint kinases Mec1...

  7. RNA interference regulates the cell cycle checkpoint through the RNA export factor, Ptr1, in fission yeast

    Energy Technology Data Exchange (ETDEWEB)

    Iida, Tetsushi, E-mail: tiida@nig.ac.jp [Division of Cytogenetics, National Institute of Genetics, Mishima, 1111 Yata, Mishima 411-8540 (Japan); The Graduate University for Advanced Studies, Sokendai, Mishima, 1111 Yata, Mishima 411-8540 (Japan); Precursory Research for Embryonic Science and Technology (PRESTO), Japan Science and Technology Agency (JST), 4-1-8, Honcho, Kawaguchi-shi, Saitama 332-0012 (Japan); Iida, Naoko [Division of Mutagenesis, National Institute of Genetics, Mishima, 1111 Yata, Mishima 411-8540 (Japan); Tsutsui, Yasuhiro [Department of Life Science, Graduate School of Bioscience and Biotechnology, Tokyo Institute of Technology, Nagatsuda-cho, Midori-ku, Yokohama 226-8501 (Japan); Yamao, Fumiaki [Division of Mutagenesis, National Institute of Genetics, Mishima, 1111 Yata, Mishima 411-8540 (Japan); The Graduate University for Advanced Studies, Sokendai, Mishima, 1111 Yata, Mishima 411-8540 (Japan); Kobayashi, Takehiko [Division of Cytogenetics, National Institute of Genetics, Mishima, 1111 Yata, Mishima 411-8540 (Japan); The Graduate University for Advanced Studies, Sokendai, Mishima, 1111 Yata, Mishima 411-8540 (Japan)

    2012-10-12

    Highlights: Black-Right-Pointing-Pointer RNAi is linked to the cell cycle checkpoint in fission yeast. Black-Right-Pointing-Pointer Ptr1 co-purifies with Ago1. Black-Right-Pointing-Pointer The ptr1-1 mutation impairs the checkpoint but does not affect gene silencing. Black-Right-Pointing-Pointer ago1{sup +} and ptr1{sup +} regulate the cell cycle checkpoint via the same pathway. Black-Right-Pointing-Pointer Mutations in ago1{sup +} and ptr1{sup +} lead to the nuclear accumulation of poly(A){sup +} RNAs. -- Abstract: Ago1, an effector protein of RNA interference (RNAi), regulates heterochromatin silencing and cell cycle arrest in fission yeast. However, the mechanism by which Ago1 controls cell cycle checkpoint following hydroxyurea (HU) treatment has not been elucidated. In this study, we show that Ago1 and other RNAi factors control cell cycle checkpoint following HU treatment via a mechanism independent of silencing. While silencing requires dcr1{sup +}, the overexpression of ago1{sup +} alleviated the cell cycle defect in dcr1{Delta}. Ago1 interacted with the mRNA export factor, Ptr1. The ptr1-1 mutation impaired cell cycle checkpoint but gene silencing was unaffected. Genetic analysis revealed that the regulation of cell cycle checkpoint by ago1{sup +} is dependent on ptr1{sup +}. Nuclear accumulation of poly(A){sup +} RNAs was detected in mutants of ago1{sup +} and ptr1{sup +}, suggesting there is a functional link between the cell cycle checkpoint and RNAi-mediated RNA quality control.

  8. Beyond CTLA-4 and PD-1, the Generation Z of Negative Checkpoint Regulators.

    Science.gov (United States)

    Le Mercier, Isabelle; Lines, J Louise; Noelle, Randolph J

    2015-01-01

    In the last two years, clinical trials with blocking antibodies to the negative checkpoint regulators CTLA-4 and PD-1 have rekindled the hope for cancer immunotherapy. Multiple negative checkpoint regulators protect the host against autoimmune reactions but also restrict the ability of T cells to effectively attack tumors. Releasing these brakes has emerged as an exciting strategy for cancer treatment. Conversely, these pathways can be manipulated to achieve durable tolerance for treatment of autoimmune diseases and transplantation. In the future, treatment may involve combination therapy to target multiple cell types and stages of the adaptive immune responses. In this review, we describe the current knowledge on the recently discovered negative checkpoint regulators, future targets for immunotherapy.

  9. Blocking CHK1 Expression Induces Apoptosis and Abrogates the G2 Checkpoint Mechanism

    Directory of Open Access Journals (Sweden)

    Yan Luo

    2001-01-01

    Full Text Available Checkpoint kinase 1 (Chki is a checkpoint gene that is activated after DNA damage. It phosphorylates and inactivates the Cdc2 activating phosphatase Cdc25C. This in turn inactivates Cdc2, which leads to G2/M arrest. We report that blocking Chki expression by antisense or ribozymes in mammalian cells induces apoptosis and interferes with the G2/M arrest induced by adriamycin. The Chki inhibitor UCN-01 also blocks the G2 arrest after DNA damage and renders cells more susceptible to adriamycin. These results indicate that Chki is an essential gene for the checkpoint mechanism during normal cell proliferation as well as in the DNA damage response.

  10. Extending the Binomial Checkpointing Technique for Resilience

    Energy Technology Data Exchange (ETDEWEB)

    Walther, Andrea; Narayanan, Sri Hari Krishna

    2016-10-10

    In terms of computing time, adjoint methods offer a very attractive alternative to compute gradient information, re- quired, e.g., for optimization purposes. However, together with this very favorable temporal complexity result comes a memory requirement that is in essence proportional with the operation count of the underlying function, e.g., if algo- rithmic differentiation is used to provide the adjoints. For this reason, checkpointing approaches in many variants have become popular. This paper analyzes an extension of the so-called binomial approach to cover also possible failures of the computing systems. Such a measure of precaution is of special interest for massive parallel simulations and adjoint calculations where the mean time between failure of the large scale computing system is smaller than the time needed to complete the calculation of the adjoint information. We de- scribe the extensions of standard checkpointing approaches required for such resilience, provide a corresponding imple- mentation and discuss numerical results.

  11. PD-1 Checkpoint Inhibitor Associated Autoimmune Encephalitis

    Directory of Open Access Journals (Sweden)

    Stephanie Schneider

    2017-05-01

    Full Text Available Objective: To report first-hand narrative experience of autoimmune encephalitis and to briefly review currently available evidence of autoimmune encephalitis in cancer patients treated with immune checkpoint inhibitors. Setting: A case study is presented on the management of a patient who developed autoimmune encephalitis during nivolumab monotherapy occurring after 28 weeks on anti-PD-1 monotherapy (nivolumab 3 mg/kg every 2 weeks for non-small cell lung cancer. Results: No substantial improvement was observed by antiepileptic treatment. After administration of 80 mg methylprednisolone, neurologic symptoms disappeared within 24 h and the patient fully recovered. Conclusions: Immune checkpoint inhibitor treatment can lead to autoimmune encephalitis. Clinical trial data indicate a frequency of autoimmune encephalitis of ≥0.1 to <1% with a higher probability during combined or sequential anti-CTLA-4/anti-PD-1 therapy than during anti-PD-1 or anti-PD-L1 monotherapy. Further collection of evidence and translational research is warranted.

  12. Beyond CTLA-4 and PD-1, the generation Z of negative checkpoint regulators.

    Directory of Open Access Journals (Sweden)

    Isabelle eLe Mercier

    2015-08-01

    Full Text Available In the last two years, clinical trials with blocking antibodies to the negative checkpoint regulators CTLA-4 and PD-1 have rekindled the hope for cancer immunotherapy. Multiple negative checkpoint regulators protect the host against autoimmune reactions but also restrict the ability of T cells to effectively attack tumors. Releasing these brakes has emerged as an exciting strategy for cancer treatment. Conversely, these pathways can be manipulated to achieve durable tolerance for treatment of autoimmune diseases and transplantation. In the future, treatment may involve combination therapy to target multiple cell types and stages of the adaptive immune responses. In this review, we describe the current knowledge on the recently discovered negative checkpoint regulators, future targets for immunotherapy.

  13. NEK11: linking CHK1 and CDC25A in DNA damage checkpoint signaling

    DEFF Research Database (Denmark)

    Sørensen, Claus Storgaard; Melixetian, Marina; Klein, Ditte Kjaersgaard

    2010-01-01

    The DNA damage induced G(2)/M checkpoint is an important guardian of the genome that prevents cell division when DNA lesions are present. The checkpoint prevents cells from entering mitosis by degrading CDC25A, a key CDK activator. CDC25A proteolysis is controlled by direct phosphorylation events...... is required for beta-TrCP mediated CDC25A polyubiquitylation and degradation. The activity of NEK11 is in turn controlled by CHK1 that activates NEK11 via phosphorylation on serine 273. Since inhibition of NEK11 activity forces checkpoint-arrested cells into mitosis and cell death, NEK11 is, like CHK1...

  14. The emerging role of immune checkpoint based approaches in AML and MDS.

    Science.gov (United States)

    Boddu, Prajwal; Kantarjian, Hagop; Garcia-Manero, Guillermo; Allison, James; Sharma, Padmanee; Daver, Naval

    2018-04-01

    The development of immune checkpoint inhibitors represents a major breakthrough in the field of cancer therapeutics. Pursuant to their success in melanoma and numerous solid tumor malignancies, these agents are being investigated in hematological malignancies including acute myelogenous leukemia (AML) and myelodysplastic syndromes (MDS). Although AML/MDS have traditionally been considered to be less immunogenic than solid tumor malignancies, recent pre-clinical models suggest a therapeutic role for immune checkpoint inhibition in these diseases. CTLA-4 inhibition may be especially effective in treating late post-allogeneic stem cell transplant relapse of AML in patients with limited or no graft versus host disease. Immune checkpoint inhibition, specifically PD-1 inhibition, demonstrated limited single agent efficacy in patients with relapsed AML and with MDS post-hypomethylating therapy. Rationally designed combinations of PD-1 inhibitors with standard anti-leukemic therapy are needed. Hypomethylating agents such as azacitidine, up-regulate PD-1, PD-L1, and PD-L2 in patients with AML/MDS and up-regulation of these genes was associated with the emergence of resistance. The combination of azacitidine and PD-1/PD-L1 inhibition may be a potential mechanism to prevent or overcome resistance to 5-azacitidine. A number of such combinations are being evaluated in clinical trials with early encouraging results. Immune checkpoint inhibition is also an attractive option to improve relapse-free survival or eliminate minimal residual disease post induction and consolidation by enhancing T-cell surveillance in patients with high-risk AML. The ongoing clinical trials with checkpoint inhibitors in AML/MDS will improve our understanding of the immunobiology of these diseases and guide us to the most appropriate application of these agents in the therapy of AML/MDS.

  15. A novel ATM-dependent checkpoint defect distinct from loss of function mutation promotes genomic instability in melanoma.

    Science.gov (United States)

    Spoerri, Loredana; Brooks, Kelly; Chia, KeeMing; Grossman, Gavriel; Ellis, Jonathan J; Dahmer-Heath, Mareike; Škalamera, Dubravka; Pavey, Sandra; Burmeister, Bryan; Gabrielli, Brian

    2016-05-01

    Melanomas have high levels of genomic instability that can contribute to poor disease prognosis. Here, we report a novel defect of the ATM-dependent cell cycle checkpoint in melanoma cell lines that promotes genomic instability. In defective cells, ATM signalling to CHK2 is intact, but the cells are unable to maintain the cell cycle arrest due to elevated PLK1 driving recovery from the arrest. Reducing PLK1 activity recovered the ATM-dependent checkpoint arrest, and over-expressing PLK1 was sufficient to overcome the checkpoint arrest and increase genomic instability. Loss of the ATM-dependent checkpoint did not affect sensitivity to ionizing radiation demonstrating that this defect is distinct from ATM loss of function mutations. The checkpoint defective melanoma cell lines over-express PLK1, and a significant proportion of melanomas have high levels of PLK1 over-expression suggesting this defect is a common feature of melanomas. The inability of ATM to impose a cell cycle arrest in response to DNA damage increases genomic instability. This work also suggests that the ATM-dependent checkpoint arrest is likely to be defective in a higher proportion of cancers than previously expected. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  16. PD-1 checkpoint inhibition: Toxicities and management.

    Science.gov (United States)

    Hahn, Andrew W; Gill, David M; Agarwal, Neeraj; Maughan, Benjamin L

    2017-12-01

    With the recent approval of 5 PD-1/PD-L1 inhibitors for a number of malignancies, PD-1 axis inhibition is drastically changing the treatment landscape of immunotherapy in cancer. As PD-1/PD-L1 are involved in peripheral immune tolerance, inhibition of this immune checkpoint has led to novel immune-related adverse events including colitis, hepatitis, pneumonitis, rash, and endocrinopathies among many others. In this seminar, we will analyze the incidence of immune-related adverse events for nivolumab, pembrolizumab, atezolizumab, durvalumab, and avelumab. Then, we will discuss the specific management of the most common immune-mediated adverse events including colitis, hepatitis, pneumonitis, rash, endocrinopathies, nephritis, and neurologic toxicities. Immune-related adverse events are frequently treated with immunosuppressive medication such as steroids and mycofenolate mofetil. There are specific immune-related adverse events which are frequently seen by the treating oncologist from checkpoint inhibitors. It is essential to understand the recommended treatment options to minimize toxicity and mortality from this important class of anti-neoplastic therapies. Copyright © 2017 Elsevier Inc. All rights reserved.

  17. Covering Resilience: A Recent Development for Binomial Checkpointing

    Energy Technology Data Exchange (ETDEWEB)

    Walther, Andrea; Narayanan, Sri Hari Krishna

    2016-09-12

    In terms of computing time, adjoint methods offer a very attractive alternative to compute gradient information, required, e.g., for optimization purposes. However, together with this very favorable temporal complexity result comes a memory requirement that is in essence proportional with the operation count of the underlying function, e.g., if algorithmic differentiation is used to provide the adjoints. For this reason, checkpointing approaches in many variants have become popular. This paper analyzes an extension of the so-called binomial approach to cover also possible failures of the computing systems. Such a measure of precaution is of special interest for massive parallel simulations and adjoint calculations where the mean time between failure of the large scale computing system is smaller than the time needed to complete the calculation of the adjoint information. We describe the extensions of standard checkpointing approaches required for such resilience, provide a corresponding implementation and discuss first numerical results.

  18. Lyn tyrosine kinase promotes silencing of ATM-dependent checkpoint signaling during recovery from DNA double-strand breaks

    International Nuclear Information System (INIS)

    Fukumoto, Yasunori; Kuki, Kazumasa; Morii, Mariko; Miura, Takahito; Honda, Takuya; Ishibashi, Kenichi; Hasegawa, Hitomi; Kubota, Sho; Ide, Yudai; Yamaguchi, Noritaka; Nakayama, Yuji; Yamaguchi, Naoto

    2014-01-01

    Highlights: • Inhibition of Src family kinases decreased γ-H2AX signal. • Inhibition of Src family increased ATM-dependent phosphorylation of Chk2 and Kap1. • shRNA-mediated knockdown of Lyn increased phosphorylation of Kap1 by ATM. • Ectopic expression of Src family kinase suppressed ATM-mediated Kap1 phosphorylation. • Src is involved in upstream signaling for inactivation of ATM signaling. - Abstract: DNA damage activates the DNA damage checkpoint and the DNA repair machinery. After initial activation of DNA damage responses, cells recover to their original states through completion of DNA repair and termination of checkpoint signaling. Currently, little is known about the process by which cells recover from the DNA damage checkpoint, a process called checkpoint recovery. Here, we show that Src family kinases promote inactivation of ataxia telangiectasia mutated (ATM)-dependent checkpoint signaling during recovery from DNA double-strand breaks. Inhibition of Src activity increased ATM-dependent phosphorylation of Chk2 and Kap1. Src inhibition increased ATM signaling both in G2 phase and during asynchronous growth. shRNA knockdown of Lyn increased ATM signaling. Src-dependent nuclear tyrosine phosphorylation suppressed ATM-mediated Kap1 phosphorylation. These results suggest that Src family kinases are involved in upstream signaling that leads to inactivation of the ATM-dependent DNA damage checkpoint

  19. Participation of SRM5/CDC28, SRM8/NET1 and SRM12/HF11 genes in activation of checkpoints of Yeast Saccharomyces Cerevisiae

    International Nuclear Information System (INIS)

    Kadyshevskaya, E.Yu.; Koltovaya, N.A.

    2007-01-01

    It is known that there are about twenty checkpoint genes in yeast Saccharomyces cerevisiae. We study participation of SRM genes selected as genes affecting genetic stability and radiosensitivity. It has been shown that srm5/cdc28-srm, srm8/net1-srm, srm12/hfil-srm mutations prevent checkpoint activation by DNA damage, particularly G0/S-checkpoint (srm5, srm8), G1/S-checkpoint (srm5, srm8, srm12), S-checkpoint (srm5, srm12) and G2-checkpoint (srm5). These data indicate, at least in budding yeast, CDC28/SRM5, HF11/ADA1/SRM12 and NET1/SRM8 genes mediate cellular response induced by DNA damage including checkpoint control

  20. Casein kinase II is required for the spindle assembly checkpoint by regulating Mad2p in fission yeast

    Energy Technology Data Exchange (ETDEWEB)

    Shimada, Midori [Department of Biochemistry and Cell Biology, Graduate School of Medicine, Nagoya City University, 1 Kawasumi, Mizuho-cho, Mizuho-ku, Nagoya 467-8601 (Japan); Yamamoto, Ayumu [Department of Chemistry, Shizuoka University, 836 Ohya, Suruga-ku, Sizuoka 422-8529 (Japan); Murakami-Tonami, Yuko; Nakanishi, Makoto; Yoshida, Takashi [Department of Biochemistry and Cell Biology, Graduate School of Medicine, Nagoya City University, 1 Kawasumi, Mizuho-cho, Mizuho-ku, Nagoya 467-8601 (Japan); Aiba, Hirofumi [Laboratory of Molecular Microbiology, School of Agriculture, Nagoya University, Chikusa-ku, Nagoya 464-8601 (Japan); Murakami, Hiroshi, E-mail: hmura@med.nagoya-cu.ac.jp [Department of Biochemistry and Cell Biology, Graduate School of Medicine, Nagoya City University, 1 Kawasumi, Mizuho-cho, Mizuho-ku, Nagoya 467-8601 (Japan)

    2009-10-23

    The spindle checkpoint is a surveillance mechanism that ensures the fidelity of chromosome segregation in mitosis. Here we show that fission yeast casein kinase II (CK2) is required for this checkpoint function. In the CK2 mutants mitosis occurs in the presence of a spindle defect, and the spindle checkpoint protein Mad2p fails to localize to unattached kinetochores. The CK2 mutants are sensitive to the microtubule depolymerising drug thiabendazole, which is counteracted by ectopic expression of mad2{sup +}. The level of Mad2p is low in the CK2 mutants. These results suggest that CK2 has a role in the spindle checkpoint by regulating Mad2p.

  1. Casein kinase II is required for the spindle assembly checkpoint by regulating Mad2p in fission yeast

    International Nuclear Information System (INIS)

    Shimada, Midori; Yamamoto, Ayumu; Murakami-Tonami, Yuko; Nakanishi, Makoto; Yoshida, Takashi; Aiba, Hirofumi; Murakami, Hiroshi

    2009-01-01

    The spindle checkpoint is a surveillance mechanism that ensures the fidelity of chromosome segregation in mitosis. Here we show that fission yeast casein kinase II (CK2) is required for this checkpoint function. In the CK2 mutants mitosis occurs in the presence of a spindle defect, and the spindle checkpoint protein Mad2p fails to localize to unattached kinetochores. The CK2 mutants are sensitive to the microtubule depolymerising drug thiabendazole, which is counteracted by ectopic expression of mad2 + . The level of Mad2p is low in the CK2 mutants. These results suggest that CK2 has a role in the spindle checkpoint by regulating Mad2p.

  2. Nek2A destruction marks APC/C activation at the prophase-to-prometaphase transition by spindle-checkpoint-restricted Cdc20.

    Science.gov (United States)

    Boekhout, Michiel; Wolthuis, Rob

    2015-04-15

    Nek2 isoform A (Nek2A) is a presumed substrate of the anaphase-promoting complex/cyclosome containing Cdc20 (APC/C(Cdc20)). Nek2A, like cyclin A, is degraded in mitosis while the spindle checkpoint is active. Cyclin A prevents spindle checkpoint proteins from binding to Cdc20 and is recruited to the APC/C in prometaphase. We found that Nek2A and cyclin A avoid being stabilized by the spindle checkpoint in different ways. First, enhancing mitotic checkpoint complex (MCC) formation by nocodazole treatment inhibited the degradation of geminin and cyclin A, whereas Nek2A disappeared at a normal rate. Second, depleting Cdc20 effectively stabilized cyclin A but not Nek2A. Nevertheless, Nek2A destruction crucially depended on Cdc20 binding to the APC/C. Third, in contrast to cyclin A, Nek2A was recruited to the APC/C before the start of mitosis. Interestingly, the spindle checkpoint very effectively stabilized an APC/C-binding mutant of Nek2A, which required the Nek2A KEN box. Apparently, in cells, the spindle checkpoint primarily prevents Cdc20 from binding destruction motifs. Nek2A disappearance marks the prophase-to-prometaphase transition, when Cdc20, regardless of the spindle checkpoint, activates the APC/C. However, Mad2 depletion accelerated Nek2A destruction, showing that spindle checkpoint release further increases APC/C(Cdc20) catalytic activity. © 2015. Published by The Company of Biologists Ltd.

  3. Cyclin F suppresses B-Myb activity to promote cell cycle checkpoint control

    DEFF Research Database (Denmark)

    Klein, Ditte Kjærsgaard; Hoffmann, Saskia; Ahlskog, Johanna K

    2015-01-01

    an important role in checkpoint control following ionizing radiation. Cyclin F-depleted cells initiate checkpoint signalling after ionizing radiation, but fail to maintain G2 phase arrest and progress into mitosis prematurely. Importantly, cyclin F suppresses the B-Myb-driven transcriptional programme...... that promotes accumulation of crucial mitosis-promoting proteins. Cyclin F interacts with B-Myb via the cyclin box domain. This interaction is important to suppress cyclin A-mediated phosphorylation of B-Myb, a key step in B-Myb activation. In summary, we uncover a regulatory mechanism linking the F-box protein...

  4. Immune checkpoint blockade therapy: The 2014 Tang prize in biopharmaceutical science

    Directory of Open Access Journals (Sweden)

    Ya-Shan Chen

    2015-02-01

    Full Text Available The first Tang Prize for Biopharmaceutical Science has been awarded to Prof. James P. Allison and Prof. Tasuku Honjo for their contributions leading to an entirely new way to treat cancer by blocking the molecules cytotoxic T lymphocyte-associated antigen 4 (CTLA-4 and programmed cell death protein 1 (PD-1 that turn off immune response. The treatment, called "immune checkpoint blockade therapy," has opened a new therapeutic era. Here the discoveries of the immune checkpoints and how they contribute to the maintenance of self-tolerance, as well as how to protect tissues from the excess immune responses causing damage are reviewed. The efforts made by Prof. Allison and Prof. Honjo for developing the most promising approaches to activate therapeutic antitumor immunity are also summarized. Since these certain immune checkpoint pathways appear to be one of the major mechanisms resulting in immune escape of tumors, the presence of anti-CTLA-4 and/or anti-PD-1 should contribute to removal of the inhibition signals for T cell activation. Subsequently, it will enhance specific T cell activation and, therefore, strengthen antitumor immunity.

  5. Dynein Light Intermediate Chain 2 Facilitates the Metaphase to Anaphase Transition by Inactivating the Spindle Assembly Checkpoint.

    Directory of Open Access Journals (Sweden)

    Sagar P Mahale

    Full Text Available The multi-functional molecular motor cytoplasmic dynein performs diverse essential roles during mitosis. The mechanistic importance of the dynein Light Intermediate Chain homologs, LIC1 and LIC2 is unappreciated, especially in the context of mitosis. LIC1 and LIC2 are believed to exist in distinct cytoplasmic dynein complexes as obligate subunits. LIC1 had earlier been reported to be required for metaphase to anaphase progression by inactivating the kinetochore-microtubule attachment-sensing arm of the spindle assembly checkpoint (SAC. However, the functional importance of LIC2 during mitosis remains elusive. Here we report prominent novel roles for the LIC2 subunit of cytoplasmic dynein in regulating the spindle assembly checkpoint. LIC2 depletion in mammalian cells led to prolonged metaphase arrest in the presence of an active SAC and also to stretched kinetochores, thus implicating it in SAC inactivation. Quantitative fluorescence microscopy of SAC components revealed accumulation of both attachment- and tension-sensing checkpoint proteins at metaphase kinetochores upon LIC2 depletion. These observations support a stronger and more diverse role in checkpoint inactivation for LIC2 in comparison to its close homolog LIC1. Our study uncovers a novel functional hierarchy during mitotic checkpoint inactivation between the closely related but homologous LIC subunits of cytoplasmic dynein. These subtle functional distinctions between dynein subpopulations could be exploited to study specific aspects of the spindle assembly checkpoint, which is a key mediator of fidelity in eukaryotic cell division.

  6. Immunogenic Chemotherapy Sensitizes Renal Cancer to Immune Checkpoint Blockade Therapy in Preclinical Models.

    Science.gov (United States)

    Cui, Shujin

    2017-07-11

    BACKGROUND Renal cell carcinoma (RCC) is among the most common malignant cancers of males worldwide. For advanced RCC patients, there still is no effective therapy. Immune checkpoint blockade therapies have shown benefits for many cancers, but previous clinical trials of immune checkpoint blockade therapies in RCC patients achieved only modest results. MATERIAL AND METHODS We explored the effects of combining chemotherapy with immune checkpoint blockade therapy in RCC xenograft mouse models. We also studied the potential mechanisms by which chemotherapy might enhance the efficacy of immune checkpoint blockade therapy, both in vitro and in vivo. RESULTS Our results showed that many commonly used chemotherapy agents can induce immunogenic marker release in RCC cell lines. Importantly, the RCC xenograft mouse model mice who received the combination treatment of 5-fluorouracil (5-FU) and anti-programmed cell death-ligand 1 (PD-L1) antibodies (Abs) had longer survival times compared to those who received 5-FU or anti-PD-L1 Abs alone. Also, increased key cytokines that promote tumor immunity, such as IL-2, IFN-γ, and TNF-α, as well as tumor-infiltrating cytotoxic T cells, were also increased after the combination treatment. CONCLUSIONS We conclude that 5-FU can sensitize RCC to anti-PD-L1 treatment by releasing the immune suppression in the tumor microenvironment.

  7. Securing the Chernobyl exclusion zone against illegal movement of radioactive materials

    International Nuclear Information System (INIS)

    Bondarenko, O. O.; Proskura, M. I.; Duftschmid, K. E.; Kravchencko, N. E.

    2004-01-01

    . Within the framework of the IAEA Nuclear Security Program the technical cooperation project S trengthening Security of Nuclear Materials in Ukraine ( UKR/0/008) is aimed primarily to strengthen protection the entrance/exit checkpoints of the Chernobyl exclusion zone and adjacent State borders of Ukraine against illicit movement of radioactive materials (including nuclear materials). The particular situation of the exclusion zone presents a high risk of uncontrolled movement of radioactive materials from and into the exclusion zone. In view of the future construction of the S helter-2 a nd decommissioning of the three closed reactor blocks it is expected that the traffic through the exclusion zone will considerably increase in the next years and those large amounts of possibly contaminated metal scrap, construction material and equipment will leave the zone. There is also a risk of illegal movement of radioactive waste into the zone, possibly also through the international border, which could make the zone to an illegal dumping ground for radioactive waste. As practice shows theft of nuclear materials cannot be excluded. The general concept of the project is based on modernization of old and deployment of new vehicle (road and railway) and pedestrian monitoring equipment at all checkpoints of the exclusion zone including road checkpoints, train stations and river ports. A central station of data acquisition and management is to be located in Chernobyl. The equipment to be installed has to meet new technical requirements developed by IAEA. This includes, e.g. sensitivity of gamma and neutron detection, identification of innocent alarms caused by NORM materials or medical radioisotopes, accurate indication of the source position in the vehicle, and remote identification of license plate by advanced video systems. The implementation of the project and deployment of the equipment is expected to start in 2003 and should be completed in 2005. (Author)

  8. SPARC: Demonstrate burst-buffer-based checkpoint/restart on ATS-1.

    Energy Technology Data Exchange (ETDEWEB)

    Oldfield, Ron A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ulmer, Craig D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Widener, Patrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ward, H. Lee [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2018-01-01

    Recent high-performance computing (HPC) platforms such as the Trinity Advanced Technology System (ATS-1) feature burst buffer resources that can have a dramatic impact on an application’s I/O performance. While these non-volatile memory (NVM) resources provide a new tier in the storage hierarchy, developers must find the right way to incorporate the technology into their applications in order to reap the benefits. Similar to other laboratories, Sandia is actively investigating ways in which these resources can be incorporated into our existing libraries and workflows without burdening our application developers with excessive, platform-specific details. This FY18Q1 milestone summaries our progress in adapting the Sandia Parallel Aerodynamics and Reentry Code (SPARC) in Sandia’s ATDM program to leverage Trinity’s burst buffers for checkpoint/restart operations. We investigated four different approaches with varying tradeoffs in this work: (1) simply updating job script to use stage-in/stage out burst buffer directives, (2) modifying SPARC to use LANL’s hierarchical I/O (HIO) library to store/retrieve checkpoints, (3) updating Sandia’s IOSS library to incorporate the burst buffer in all meshing I/O operations, and (4) modifying SPARC to use our Kelpie distributed memory library to store/retrieve checkpoints. Team members were successful in generating initial implementation for all four approaches, but were unable to obtain performance numbers in time for this report (reasons: initial problem sizes were not large enough to stress I/O, and SPARC refactor will require changes to our code). When we presented our work to the SPARC team, they expressed the most interest in the second and third approaches. The HIO work was favored because it is lightweight, unobtrusive, and should be portable to ATS-2. The IOSS work is seen as a long-term solution, and is favored because all I/O work (including checkpoints) can be deferred to a single library.

  9. The Pch2 AAA+ ATPase promotes phosphorylation of the Hop1 meiotic checkpoint adaptor in response to synaptonemal complex defects.

    Science.gov (United States)

    Herruzo, Esther; Ontoso, David; González-Arranz, Sara; Cavero, Santiago; Lechuga, Ana; San-Segundo, Pedro A

    2016-09-19

    Meiotic cells possess surveillance mechanisms that monitor critical events such as recombination and chromosome synapsis. Meiotic defects resulting from the absence of the synaptonemal complex component Zip1 activate a meiosis-specific checkpoint network resulting in delayed or arrested meiotic progression. Pch2 is an evolutionarily conserved AAA+ ATPase required for the checkpoint-induced meiotic block in the zip1 mutant, where Pch2 is only detectable at the ribosomal DNA array (nucleolus). We describe here that high levels of the Hop1 protein, a checkpoint adaptor that localizes to chromosome axes, suppress the checkpoint defect of a zip1 pch2 mutant restoring Mek1 activity and meiotic cell cycle delay. We demonstrate that the critical role of Pch2 in this synapsis checkpoint is to sustain Mec1-dependent phosphorylation of Hop1 at threonine 318. We also show that the ATPase activity of Pch2 is essential for its checkpoint function and that ATP binding to Pch2 is required for its localization. Previous work has shown that Pch2 negatively regulates Hop1 chromosome abundance during unchallenged meiosis. Based on our results, we propose that, under checkpoint-inducing conditions, Pch2 also possesses a positive action on Hop1 promoting its phosphorylation and its proper distribution on unsynapsed chromosome axes. © The Author(s) 2016. Published by Oxford University Press on behalf of Nucleic Acids Research.

  10. The final checkpoint. Cancer as an adaptive evolutionary mechanism

    Directory of Open Access Journals (Sweden)

    Rumena Petkova

    2016-05-01

    Full Text Available The mechanisms for identification of DNA damage and repair usually manage DNA damage very efficiently. If damaged cells manage to bypass the checkpoints where the integrity of the genome is assessed and the decisions whether to proceed with the cell cycle are made, they may evade the imperative to stop dividing and to die. As a result, cancer may develop. Warding off the potential sequence-altering effects of DNA damage during the life of the individual or the existence span of the species is controlled by a set of larger checkpoints acting on a progressively increasing scale, from systematic removal of damaged cells from the proliferative pool by means of repair of DNA damage/programmed cell death through ageing to, finally, cancer. They serve different purposes and act at different levels of the life cycle, safeguarding the integrity of the genetic backup of the individual, the genetic diversity of the population, and, finally, the survival of the species and of life on Earth. In the light of the theory that cancer is the final checkpoint or the nature's manner to prevent complex organisms from living forever at the expense of genetic stagnation, the eventual failure of modern anti-cancer treatments is only to be expected. Nevertheless, the medicine of today and the near future has enough potential to slow down the progression to terminal cancer so that the life expectancy and the quality of life of cancer-affected individuals may be comparable to those of healthy aged individuals.

  11. Caffeine stabilizes Cdc25 independently of Rad3 in S chizosaccharomyces pombe contributing to checkpoint override

    Science.gov (United States)

    Alao, John P; Sjölander, Johanna J; Baar, Juliane; Özbaki-Yagan, Nejla; Kakoschky, Bianca; Sunnerhagen, Per

    2014-01-01

    Cdc25 is required for Cdc2 dephosphorylation and is thus essential for cell cycle progression. Checkpoint activation requires dual inhibition of Cdc25 and Cdc2 in a Rad3-dependent manner. Caffeine is believed to override activation of the replication and DNA damage checkpoints by inhibiting Rad3-related proteins in both S chizosaccharomyces pombe and mammalian cells. In this study, we have investigated the impact of caffeine on Cdc25 stability, cell cycle progression and checkpoint override. Caffeine induced Cdc25 accumulation in S . pombe independently of Rad3. Caffeine delayed cell cycle progression under normal conditions but advanced mitosis in cells treated with replication inhibitors and DNA-damaging agents. In the absence of Cdc25, caffeine inhibited cell cycle progression even in the presence of hydroxyurea or phleomycin. Caffeine induces Cdc25 accumulation in S . pombe by suppressing its degradation independently of Rad3. The induction of Cdc25 accumulation was not associated with accelerated progression through mitosis, but rather with delayed progression through cytokinesis. Caffeine-induced Cdc25 accumulation appears to underlie its ability to override cell cycle checkpoints. The impact of Cdc25 accumulation on cell cycle progression is attenuated by Srk1 and Mad2. Together our findings suggest that caffeine overrides checkpoint enforcement by inducing the inappropriate nuclear localization of Cdc25. PMID:24666325

  12. Cenp-meta is required for sustained spindle checkpoint

    Directory of Open Access Journals (Sweden)

    Thomas Rubin

    2014-05-01

    Full Text Available Cenp-E is a kinesin-like motor protein required for efficient end-on attachment of kinetochores to the spindle microtubules. Cenp-E immunodepletion in Xenopus mitotic extracts results in the loss of mitotic arrest and massive chromosome missegregation, whereas its depletion in mammalian cells leads to chromosome segregation defects despite the presence of a functional spindle assembly checkpoint (SAC. Cenp-meta has previously been reported to be the Drosophila homolog of vertebrate Cenp-E. In this study, we show that cenp-metaΔ mutant neuroblasts arrest in mitosis when treated with colchicine. cenp-metaΔ mutant cells display a mitotic delay. Yet, despite the persistence of the two checkpoint proteins Mad2 and BubR1 on unattached kinetochores, these cells eventually enter anaphase and give rise to highly aneuploid daughter cells. Indeed, we find that cenp-metaΔ mutant cells display a slow but continuous degradation of cyclin B, which eventually triggers the mitotic exit observed. Thus, our data provide evidence for a role of Cenp-meta in sustaining the SAC response.

  13. Caenorhabditis elegans histone methyltransferase MET-2 shields the male X chromosome from checkpoint machinery and mediates meiotic sex chromosome inactivation.

    Directory of Open Access Journals (Sweden)

    Paula M Checchi

    2011-09-01

    Full Text Available Meiosis is a specialized form of cellular division that results in the precise halving of the genome to produce gametes for sexual reproduction. Checkpoints function during meiosis to detect errors and subsequently to activate a signaling cascade that prevents the formation of aneuploid gametes. Indeed, asynapsis of a homologous chromosome pair elicits a checkpoint response that can in turn trigger germline apoptosis. In a heterogametic germ line, however, sex chromosomes proceed through meiosis with unsynapsed regions and are not recognized by checkpoint machinery. We conducted a directed RNAi screen in Caenorhabditis elegans to identify regulatory factors that prevent recognition of heteromorphic sex chromosomes as unpaired and uncovered a role for the SET domain histone H3 lysine 9 histone methyltransferase (HMTase MET-2 and two additional HMTases in shielding the male X from checkpoint machinery. We found that MET-2 also mediates the transcriptional silencing program of meiotic sex chromosome inactivation (MSCI but not meiotic silencing of unsynapsed chromatin (MSUC, suggesting that these processes are distinct. Further, MSCI and checkpoint shielding can be uncoupled, as double-strand breaks targeted to an unpaired, transcriptionally silenced extra-chromosomal array induce checkpoint activation in germ lines depleted for met-2. In summary, our data uncover a mechanism by which repressive chromatin architecture enables checkpoint proteins to distinguish between the partnerless male X chromosome and asynapsed chromosomes thereby shielding the lone X from inappropriate activation of an apoptotic program.

  14. CDC28, NETI, and HFII are required for checkpoints in Saccharomyces cerevisiae

    International Nuclear Information System (INIS)

    Koltovaya, N.A.; Kadyshevskaya, E.Yu.; Roshina, M.P.; Devin, A.B.

    2009-01-01

    The involvement of SRM genes selected as genes affecting genetic stability and radiosensitivity in a cell cycle arrest under the action of damaging agents was studied. It was shown that the srm5/cdc28-srm, srm8/netI-srm, and srmI2/hfiI-srm mutations prevent checkpoint activation by DNA damage, particularly the G 0 /S (srm5, srm8), G 1 /S (srm5, srm8, srm12), S (srm8, srm12) and S/G 2 (srm5) checkpoints. It seems that in budding yeast the CDC28, HFII/ADAI, and NETI genes mediate cellular response induced by DNA damage with checkpoint control. The well-known checkpoint-genes RAD9, RAD17, RAD24, and RAD53, and the genes CDC28, and NETI have been found to belong to one epistasis group named RAD9-group as regards cell sensitivity to γ radiation. An analysis of the radiosensitivity of double mutants has revealed that the mutation cdc-28-srm is hypostatic to each of mutations rad9Δ, and rad24Δ, and additive to rad17Δ. The mutation netI-srm is hypostatic to the mutations rad9Δ but additive to rad17Δ, rad24Δ, and rad53. The mutation hfiI-srm has an additive effect in compound with the mutations rad24Δ and rad9Δ. So, investigations of epistatic interactions have demonstrated a branched RAD9-dependent pathway. The analyzed genes can also participate in a minor mechanism involved in determining cell radiation sensitivity independently of the mentioned RAD9-dependent pathway

  15. Differential impact of diverse anticancer chemotherapeutics on the Cdc25A-degradation checkpoint pathway

    International Nuclear Information System (INIS)

    Agner, Jeppe; Falck, Jacob; Lukas, Jiri; Bartek, Jiri

    2005-01-01

    When exposed to DNA-damaging insults such as ionizing radiation (IR) or ultraviolet light (UV), mammalian cells activate checkpoint pathways to halt cell cycle progression or induce cell death. Here we examined the ability of five commonly used anticancer drugs with different mechanisms of action to activate the Chk1/Chk2-Cdc25A-CDK2/cyclin E cell cycle checkpoint pathway, previously shown to be induced by IR or UV. Whereas exposure of human cells to topoisomerase inhibitors camptothecin, etoposide, or adriamycin resulted in rapid (within 1 h) activation of the pathway including degradation of the Cdc25A phosphatase and inhibition of cyclin E/CDK2 kinase activity, taxol failed to activate this checkpoint even after a prolonged treatment. Unexpectedly, although the alkylating agent cisplatin also induced degradation of Cdc25A (albeit delayed, after 8-12 h), cyclin E/CDK2 activity was elevated and DNA synthesis continued, a phenomena that correlated with increased E2F1 protein levels and consequently enhanced expression of cyclin E. These results reveal a differential impact of various classes of anticancer chemotherapeutics on the Cdc25A-degradation pathway, and indicate that the kinetics of checkpoint induction, and the relative balance of key components within the DNA damage response network may dictate whether the treated cells arrest their cell cycle progression

  16. Multiple Duties for Spindle Assembly Checkpoint Kinases in Meiosis

    Science.gov (United States)

    Marston, Adele L.; Wassmann, Katja

    2017-01-01

    Cell division in mitosis and meiosis is governed by evolutionary highly conserved protein kinases and phosphatases, controlling the timely execution of key events such as nuclear envelope breakdown, spindle assembly, chromosome attachment to the spindle and chromosome segregation, and cell cycle exit. In mitosis, the spindle assembly checkpoint (SAC) controls the proper attachment to and alignment of chromosomes on the spindle. The SAC detects errors and induces a cell cycle arrest in metaphase, preventing chromatid separation. Once all chromosomes are properly attached, the SAC-dependent arrest is relieved and chromatids separate evenly into daughter cells. The signaling cascade leading to checkpoint arrest depends on several protein kinases that are conserved from yeast to man. In meiosis, haploid cells containing new genetic combinations are generated from a diploid cell through two specialized cell divisions. Though apparently less robust, SAC control also exists in meiosis. Recently, it has emerged that SAC kinases have additional roles in executing accurate chromosome segregation during the meiotic divisions. Here, we summarize the main differences between mitotic and meiotic cell divisions, and explain why meiotic divisions pose special challenges for correct chromosome segregation. The less-known meiotic roles of the SAC kinases are described, with a focus on two model systems: yeast and mouse oocytes. The meiotic roles of the canonical checkpoint kinases Bub1, Mps1, the pseudokinase BubR1 (Mad3), and Aurora B and C (Ipl1) will be discussed. Insights into the molecular signaling pathways that bring about the special chromosome segregation pattern during meiosis will help us understand why human oocytes are so frequently aneuploid. PMID:29322045

  17. Multiple Duties for Spindle Assembly Checkpoint Kinases in Meiosis

    Directory of Open Access Journals (Sweden)

    Adele L. Marston

    2017-12-01

    Full Text Available Cell division in mitosis and meiosis is governed by evolutionary highly conserved protein kinases and phosphatases, controlling the timely execution of key events such as nuclear envelope breakdown, spindle assembly, chromosome attachment to the spindle and chromosome segregation, and cell cycle exit. In mitosis, the spindle assembly checkpoint (SAC controls the proper attachment to and alignment of chromosomes on the spindle. The SAC detects errors and induces a cell cycle arrest in metaphase, preventing chromatid separation. Once all chromosomes are properly attached, the SAC-dependent arrest is relieved and chromatids separate evenly into daughter cells. The signaling cascade leading to checkpoint arrest depends on several protein kinases that are conserved from yeast to man. In meiosis, haploid cells containing new genetic combinations are generated from a diploid cell through two specialized cell divisions. Though apparently less robust, SAC control also exists in meiosis. Recently, it has emerged that SAC kinases have additional roles in executing accurate chromosome segregation during the meiotic divisions. Here, we summarize the main differences between mitotic and meiotic cell divisions, and explain why meiotic divisions pose special challenges for correct chromosome segregation. The less-known meiotic roles of the SAC kinases are described, with a focus on two model systems: yeast and mouse oocytes. The meiotic roles of the canonical checkpoint kinases Bub1, Mps1, the pseudokinase BubR1 (Mad3, and Aurora B and C (Ipl1 will be discussed. Insights into the molecular signaling pathways that bring about the special chromosome segregation pattern during meiosis will help us understand why human oocytes are so frequently aneuploid.

  18. Immuno-oncologic Approaches: CAR-T Cells and Checkpoint Inhibitors.

    Science.gov (United States)

    Gay, Francesca; D'Agostino, Mattia; Giaccone, Luisa; Genuardi, Mariella; Festuccia, Moreno; Boccadoro, Mario; Bruno, Benedetto

    2017-08-01

    Advances in understanding myeloma biology have shown that disease progression is not only the consequence of intrinsic tumor changes but also of interactions between the tumor and the microenvironment in which the cancer grows. The immune system is an important component of the tumor microenvironment in myeloma, and acting on the immune system is an appealing new treatment strategy. There are 2 ways to act toward immune cells and boost antitumor immunity: (1) to increase antitumor activity (acting on T and NK cytotoxic cells), and (2) to reduce immunosuppression (acting on myeloid-derived stem cells and T regulatory cells). Checkpoint inhibitors and adoptive cell therapy (ACT) are 2 of the main actors, together with monoclonal antibodies and immunomodulatory agents, in the immune-oncologic approach. The aim of checkpoint inhibitors is to release the brakes that block the action of the immune system against the tumor. Anti-programmed death-1 (PD-1) and PD-1-Ligand, as well as anti-CTLA4 and KIR are currently under evaluation, as single agents or in combination, with the best results achieved so far with combination of anti-PD-1 and immunomodulatory agents. The aim of ACT is to create an immune effector specific against the tumor. Preliminary results on chimeric antigen receptor (CAR) T cells, first against CD19, and more recently against B-cell maturation antigen, have shown to induce durable responses in heavily pretreated patients. This review focuses on the most recent clinical results available on the use of checkpoint inhibitors and CAR-T cells in myeloma, in the context of the new immune-oncologic approach. Copyright © 2017 Elsevier Inc. All rights reserved.

  19. Measures to detect and control radioactive contaminated metallurgical scrap at border checkpoints in Poland

    International Nuclear Information System (INIS)

    Smagala, G.

    1999-01-01

    The issue of radioactive contaminated metallurgical scrap has never received a high priority in Poland and in the international community. Since the dissolution of the former Soviet Union a higher attention has been given to the problem. Poland which is located between the West and East Europe has the obligation to develop and implement an effective prevention and detection system. The reasons to increase national control and detection system at the border checkpoints in Poland are to avoid the following risks: post Chernobyl contamination transports of commodities; transport of contaminated metal scrap; transfer of radioactive waste for their disposal or utilization; high risk of becoming a transit country of illicit trafficking of nuclear materials and radioactive sources. In order to avoid the above-mentioned risks, Poland initiated in 1990, a deployment of the portable radiation devices at the border checkpoints and, as of 1998, the number of installed instruments exceeded a hundred. This paper presents Poland's activities to detect contaminated scrap at its border checkpoints. (author)

  20. A tumor suppressor role of the Bub3 spindle checkpoint protein after apoptosis inhibition

    Science.gov (United States)

    Moutinho-Santos, Tatiana

    2013-01-01

    Most solid tumors contain aneuploid cells, indicating that the mitotic checkpoint is permissive to the proliferation of chromosomally aberrant cells. However, mutated or altered expression of mitotic checkpoint genes accounts for a minor proportion of human tumors. We describe a Drosophila melanogaster tumorigenesis model derived from knocking down spindle assembly checkpoint (SAC) genes and preventing apoptosis in wing imaginal discs. Bub3-deficient tumors that were also deficient in apoptosis displayed neoplastic growth, chromosomal aneuploidy, and high proliferative potential after transplantation into adult flies. Inducing aneuploidy by knocking down CENP-E and preventing apoptosis does not induce tumorigenesis, indicating that aneuploidy is not sufficient for hyperplasia. In this system, the aneuploidy caused by a deficient SAC is not driving tumorigenesis because preventing Bub3 from binding to the kinetochore does not cause hyperproliferation. Our data suggest that Bub3 has a nonkinetochore-dependent function that is consistent with its role as a tumor suppressor. PMID:23609535

  1. Cells bearing chromosome aberrations lacking one telomere are selectively blocked at the G2/M checkpoint

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, Pilar [Unitat de Biologia Cel.lular, Departament de Biologia Cel.lular, Fisiologia i Immunologia, Universitat Autonoma de Barcelona, 08193 Bellaterra (Spain); Barquinero, Joan Francesc [Unitat d' Antropologia Biologica, Departament de Biologia Animal, Biologia Vegetal i Ecologia, Universitat Autonoma de Barcelona, 08193 Bellaterra (Spain); Duran, Assumpta [Unitat de Biologia Cel.lular, Departament de Biologia Cel.lular, Fisiologia i Immunologia, Universitat Autonoma de Barcelona, 08193 Bellaterra (Spain); Caballin, Maria Rosa [Unitat d' Antropologia Biologica, Departament de Biologia Animal, Biologia Vegetal i Ecologia, Universitat Autonoma de Barcelona, 08193 Bellaterra (Spain); Ribas, Montserrat [Servei de Radiofisica i Radioproteccio de l' Hospital de la Santa Creu i Sant Pau, 08025 Barcelona (Spain); Barrios, Leonardo, E-mail: Lleonard.Barrios@uab.cat [Unitat de Biologia Cel.lular, Departament de Biologia Cel.lular, Fisiologia i Immunologia, Universitat Autonoma de Barcelona, 08193 Bellaterra (Spain)

    2009-11-02

    Cell cycle checkpoints are part of the cellular mechanisms to maintain genomic integrity. After ionizing radiation exposure, the cells can show delay or arrest in their progression through the cell cycle, as well as an activation of the DNA repair machinery in order to reduce the damage. The G2/M checkpoint prevents G2 cells entering mitosis until the DNA damage has been reduced. The present study evaluates which G0 radiation-induced chromosome aberrations are negatively selected in the G2/M checkpoint. For this purpose, peripheral blood samples were irradiated at 1 and 3 Gy of {gamma}-rays, and lymphocytes were cultured for 48 h. Calyculin-A and Colcemid were used to analyze, in the same slide, cells in G2 and M. Chromosome spreads were consecutively analyzed by solid stain, pancentromeric and pantelomeric FISH and mFISH. The results show that the frequency of incomplete chromosome elements, those lacking a telomeric signal at one end, decreases abruptly from G2 to M. This indicates that cells with incomplete chromosome elements can progress from G0 to G2, but at the G2/M checkpoint suffer a strong negative selection.

  2. Cells bearing chromosome aberrations lacking one telomere are selectively blocked at the G2/M checkpoint

    International Nuclear Information System (INIS)

    Rodriguez, Pilar; Barquinero, Joan Francesc; Duran, Assumpta; Caballin, Maria Rosa; Ribas, Montserrat; Barrios, Leonardo

    2009-01-01

    Cell cycle checkpoints are part of the cellular mechanisms to maintain genomic integrity. After ionizing radiation exposure, the cells can show delay or arrest in their progression through the cell cycle, as well as an activation of the DNA repair machinery in order to reduce the damage. The G2/M checkpoint prevents G2 cells entering mitosis until the DNA damage has been reduced. The present study evaluates which G0 radiation-induced chromosome aberrations are negatively selected in the G2/M checkpoint. For this purpose, peripheral blood samples were irradiated at 1 and 3 Gy of γ-rays, and lymphocytes were cultured for 48 h. Calyculin-A and Colcemid were used to analyze, in the same slide, cells in G2 and M. Chromosome spreads were consecutively analyzed by solid stain, pancentromeric and pantelomeric FISH and mFISH. The results show that the frequency of incomplete chromosome elements, those lacking a telomeric signal at one end, decreases abruptly from G2 to M. This indicates that cells with incomplete chromosome elements can progress from G0 to G2, but at the G2/M checkpoint suffer a strong negative selection.

  3. Considerations on Cyber Security Assessments of Korean Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, Jung-Woon; Song, Jae-Gu; Han, Kyung-Soo; Lee, Cheol Kwon; Kang, Mingyun

    2015-01-01

    Korea Institute of Nuclear Nonproliferation and Control (KINAC) has prepared the regulatory standard RS-015 based on RG 5.71. RS-015 defines the elements of a cyber security program to be established in nuclear facilities and describes the security control items and relevant requirements. Cyber security assessments are important initial activities in a cyber security program for NPPs. Cyber security assessments can be performed in the following key steps: 1) Formation of a cyber security assessment team (CSAT); 2) Identification of critical systems and critical digital assets (CDAs); 3) Plant compliance checks with the security control requirements in RS-015. Through the assessments, the current status of security controls applied to NPPs can be found out. The assessments provide baseline data for remedial activities. Additional analyses with the results from the assessments should be performed before the implementation of remedial security controls. The cyber security team at the Korea Atomic Energy Research Institute (KAERI) has studied how to perform cyber security assessments for NPPs based on the regulatory requirements. Recently, KAERI's cyber security team has performed pilot cyber security assessments of a Korean NPP. Based on this assessment experience, considerations and checkpoints which would be helpful for full-scale cyber security assessments of Korean NPPs and the implementation of remedial security controls are discussed in this paper. Cyber security assessment is one of important and immediate activities for NPP cyber security. The quality of the first assessment will be a barometer for NPP cyber security. Hence cyber security assessments of Korean NPPs should be performed elaborately

  4. Considerations on Cyber Security Assessments of Korean Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Han, Kyung-Soo; Lee, Cheol Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Kang, Mingyun [E-Gonggam Co. Ltd., Daejeon (Korea, Republic of)

    2015-10-15

    Korea Institute of Nuclear Nonproliferation and Control (KINAC) has prepared the regulatory standard RS-015 based on RG 5.71. RS-015 defines the elements of a cyber security program to be established in nuclear facilities and describes the security control items and relevant requirements. Cyber security assessments are important initial activities in a cyber security program for NPPs. Cyber security assessments can be performed in the following key steps: 1) Formation of a cyber security assessment team (CSAT); 2) Identification of critical systems and critical digital assets (CDAs); 3) Plant compliance checks with the security control requirements in RS-015. Through the assessments, the current status of security controls applied to NPPs can be found out. The assessments provide baseline data for remedial activities. Additional analyses with the results from the assessments should be performed before the implementation of remedial security controls. The cyber security team at the Korea Atomic Energy Research Institute (KAERI) has studied how to perform cyber security assessments for NPPs based on the regulatory requirements. Recently, KAERI's cyber security team has performed pilot cyber security assessments of a Korean NPP. Based on this assessment experience, considerations and checkpoints which would be helpful for full-scale cyber security assessments of Korean NPPs and the implementation of remedial security controls are discussed in this paper. Cyber security assessment is one of important and immediate activities for NPP cyber security. The quality of the first assessment will be a barometer for NPP cyber security. Hence cyber security assessments of Korean NPPs should be performed elaborately.

  5. Use of common time base for checkpointing and rollback recovery in a distributed system

    Science.gov (United States)

    Ramanathan, Parameswaran; Shin, Kang G.

    1993-01-01

    An approach to checkpointing and rollback recovery in a distributed computing system using a common time base is proposed. A common time base is established in the system using a hardware clock synchronization algorithm. This common time base is coupled with the idea of pseudo-recovery points to develop a checkpointing algorithm that has the following advantages: reduced wait for commitment for establishing recovery lines, fewer messages to be exchanged, and less memory requirement. These advantages are assessed quantitatively by developing a probabilistic model.

  6. Synthesis of Fault-Tolerant Embedded Systems with Checkpointing and Replication

    DEFF Research Database (Denmark)

    Izosimov, Viacheslav; Pop, Paul; Eles, Petru

    2006-01-01

    We present an approach to the synthesis of fault-tolerant hard real-time systems for safety-critical applications. We use checkpointing with rollback recovery and active replication for tolerating transient faults. Processes are statically scheduled and communications are performed using the time...

  7. Cell cycle checkpoints: reversible when possible, irreversible when needed

    NARCIS (Netherlands)

    Krenning, L.

    2015-01-01

    Cell cycle checkpoints are reversible in nature, and can prevent progression into the next cell cycle phase if needed. In the case of DNA damage, cells can prevent progression from G1 into S phase, and from G2 into mitosis in the presence of DNA double strand breaks. Following DNA repair, these

  8. Raman Spectroscopy for Homeland Security Applications

    Directory of Open Access Journals (Sweden)

    Gregory Mogilevsky

    2012-01-01

    Full Text Available Raman spectroscopy is an analytical technique with vast applications in the homeland security and defense arenas. The Raman effect is defined by the inelastic interaction of the incident laser with the analyte molecule’s vibrational modes, which can be exploited to detect and identify chemicals in various environments and for the detection of hazards in the field, at checkpoints, or in a forensic laboratory with no contact with the substance. A major source of error that overwhelms the Raman signal is fluorescence caused by the background and the sample matrix. Novel methods are being developed to enhance the Raman signal’s sensitivity and to reduce the effects of fluorescence by altering how the hazard material interacts with its environment and the incident laser. Basic Raman techniques applicable to homeland security applications include conventional (off-resonance Raman spectroscopy, surface-enhanced Raman spectroscopy (SERS, resonance Raman spectroscopy, and spatially or temporally offset Raman spectroscopy (SORS and TORS. Additional emerging Raman techniques, including remote Raman detection, Raman imaging, and Heterodyne imaging, are being developed to further enhance the Raman signal, mitigate fluorescence effects, and monitor hazards at a distance for use in homeland security and defense applications.

  9. Implementing forward recovery using checkpointing in distributed systems

    Science.gov (United States)

    Long, Junsheng; Fuchs, W. K.; Abraham, Jacob A.

    1991-01-01

    The paper describes the implementation of a forward recovery scheme using checkpoints and replicated tasks. The implementation is based on the concept of lookahead execution and rollback validation. In the experiment, two tasks are selected for the normal execution and one for rollback validation. It is shown that the recovery strategy has nearly error-free execution time and an average redundancy lower than TMR.

  10. Checkpoint inhibitors in breast cancer

    DEFF Research Database (Denmark)

    Polk, Anne; Svane, Inge-Marie; Andersson, Michael

    2018-01-01

    INTRODUCTION: An increasing number of compounds directed against immune checkpoints are currently under clinical development. In this review we summarize current research in breast cancer. MATERIAL AND METHODS: A computer-based literature search was carried out using PubMed and EMBASE; data...... reported at international meetings and clinicaltrials.gov were included as well. RESULTS: The obtained overall response rate of PD-1/PD-L1 monotherapy varied from 5 to 30% in heavily pretreated triple negative breast cancer (TNBC). The median duration of progression free survival and overall survival were...... and induce long standing anti-tumor immunity in a subgroup of breast cancer patients. However, the identification of predictive biomarkers is crucial for further development of this treatment modality....

  11. [Sea urchin embryo, DNA-damaged cell cycle checkpoint and the mechanisms initiating cancer development].

    Science.gov (United States)

    Bellé, Robert; Le Bouffant, Ronan; Morales, Julia; Cosson, Bertrand; Cormier, Patrick; Mulner-Lorillon, Odile

    2007-01-01

    Cell division is an essential process for heredity, maintenance and evolution of the whole living kingdom. Sea urchin early development represents an excellent experimental model for the analysis of cell cycle checkpoint mechanisms since embryonic cells contain a functional DNA-damage checkpoint and since the whole sea urchin genome is sequenced. The DNA-damaged checkpoint is responsible for an arrest in the cell cycle when DNA is damaged or incorrectly replicated, for activation of the DNA repair mechanism, and for commitment to cell death by apoptosis in the case of failure to repair. New insights in cancer biology lead to two fundamental concepts about the very first origin of cancerogenesis. Cancers result from dysfunction of DNA-damaged checkpoints and cancers appear as a result of normal stem cell (NCS) transformation into a cancer stem cell (CSC). The second aspect suggests a new definition of "cancer", since CSC can be detected well before any clinical evidence. Since early development starts from the zygote, which is a primary stem cell, sea urchin early development allows analysis of the early steps of the cancerization process. Although sea urchins do not develop cancers, the model is alternative and complementary to stem cells which are not easy to isolate, do not divide in a short time and do not divide synchronously. In the field of toxicology and incidence on human health, the sea urchin experimental model allows assessment of cancer risk from single or combined molecules long before any epidemiologic evidence is available. Sea urchin embryos were used to test the worldwide used pesticide Roundup that contains glyphosate as the active herbicide agent; it was shown to activate the DNA-damage checkpoint of the first cell cycle of development. The model therefore allows considerable increase in risk evaluation of new products in the field of cancer and offers a tool for the discovery of molecular markers for early diagnostic in cancer biology

  12. Cdk2 is required for p53-independent G2/M checkpoint control.

    Directory of Open Access Journals (Sweden)

    Jon H Chung

    2010-02-01

    Full Text Available The activation of phase-specific cyclin-dependent kinases (Cdks is associated with ordered cell cycle transitions. Among the mammalian Cdks, only Cdk1 is essential for somatic cell proliferation. Cdk1 can apparently substitute for Cdk2, Cdk4, and Cdk6, which are individually dispensable in mice. It is unclear if all functions of non-essential Cdks are fully redundant with Cdk1. Using a genetic approach, we show that Cdk2, the S-phase Cdk, uniquely controls the G(2/M checkpoint that prevents cells with damaged DNA from initiating mitosis. CDK2-nullizygous human cells exposed to ionizing radiation failed to exclude Cdk1 from the nucleus and exhibited a marked defect in G(2/M arrest that was unmasked by the disruption of P53. The DNA replication licensing protein Cdc6, which is normally stabilized by Cdk2, was physically associated with the checkpoint regulator ATR and was required for efficient ATR-Chk1-Cdc25A signaling. These findings demonstrate that Cdk2 maintains a balance of S-phase regulatory proteins and thereby coordinates subsequent p53-independent G(2/M checkpoint activation.

  13. Checkpoint-dependent RNR induction promotes fork restart after replicative stress.

    Science.gov (United States)

    Morafraile, Esther C; Diffley, John F X; Tercero, José Antonio; Segurado, Mónica

    2015-01-20

    The checkpoint kinase Rad53 is crucial to regulate DNA replication in the presence of replicative stress. Under conditions that interfere with the progression of replication forks, Rad53 prevents Exo1-dependent fork degradation. However, although EXO1 deletion avoids fork degradation in rad53 mutants, it does not suppress their sensitivity to the ribonucleotide reductase (RNR) inhibitor hydroxyurea (HU). In this case, the inability to restart stalled forks is likely to account for the lethality of rad53 mutant cells after replication blocks. Here we show that Rad53 regulates replication restart through the checkpoint-dependent transcriptional response, and more specifically, through RNR induction. Thus, in addition to preventing fork degradation, Rad53 prevents cell death in the presence of HU by regulating RNR-expression and localization. When RNR is induced in the absence of Exo1 and RNR negative regulators, cell viability of rad53 mutants treated with HU is increased and the ability of replication forks to restart after replicative stress is restored.

  14. Optimization of airport security lanes

    Science.gov (United States)

    Chen, Lin

    2018-05-01

    Current airport security management system is widely implemented all around the world to ensure the safety of passengers, but it might not be an optimum one. This paper aims to seek a better security system, which can maximize security while minimize inconvenience to passengers. Firstly, we apply Petri net model to analyze the steps where the main bottlenecks lie. Based on average tokens and time transition, the most time-consuming steps of security process can be found, including inspection of passengers' identification and documents, preparing belongings to be scanned and the process for retrieving belongings back. Then, we develop a queuing model to figure out factors affecting those time-consuming steps. As for future improvement, the effective measures which can be taken include transferring current system as single-queuing and multi-served, intelligently predicting the number of security checkpoints supposed to be opened, building up green biological convenient lanes. Furthermore, to test the theoretical results, we apply some data to stimulate the model. And the stimulation results are consistent with what we have got through modeling. Finally, we apply our queuing model to a multi-cultural background. The result suggests that by quantifying and modifying the variance in wait time, the model can be applied to individuals with various habits customs and habits. Generally speaking, our paper considers multiple affecting factors, employs several models and does plenty of calculations, which is practical and reliable for handling in reality. In addition, with more precise data available, we can further test and improve our models.

  15. Requirement for the Phospho-H2AX Binding Module of Crb2 in Double-Strand Break Targeting and Checkpoint Activation▿

    Science.gov (United States)

    Sanders, Steven L.; Arida, Ahmad R.; Phan, Funita P.

    2010-01-01

    Activation of DNA damage checkpoints requires the rapid accumulation of numerous factors to sites of genomic lesions, and deciphering the mechanisms of this targeting is central to our understanding of DNA damage response. Histone modification has recently emerged as a critical element for the correct localization of damage response proteins, and one key player in this context is the fission yeast checkpoint mediator Crb2. Accumulation of Crb2 at ionizing irradiation-induced double-strand breaks (DSBs) requires two distinct histone marks, dimethylated H4 lysine 20 (H4K20me2) and phosphorylated H2AX (pH2AX). A tandem tudor motif in Crb2 directly binds H4K20me2, and this interaction is required for DSB targeting and checkpoint activation. Similarly, pH2AX is required for Crb2 localization to DSBs and checkpoint control. Crb2 can directly bind pH2AX through a pair of C-terminal BRCT repeats, but the functional significance of this binding has been unclear. Here we demonstrate that loss of its pH2AX-binding activity severely impairs the ability of Crb2 to accumulate at ionizing irradiation-induced DSBs, compromises checkpoint signaling, and disrupts checkpoint-mediated cell cycle arrest. These impairments are similar to that reported for abolition of pH2AX or mutation of the H4K20me2-binding tudor motif of Crb2. Intriguingly, a combined ablation of its two histone modification binding modules yields a strikingly additive reduction in Crb2 activity. These observations argue that binding of the Crb2 BRCT repeats to pH2AX is critical for checkpoint activity and provide new insight into the mechanisms of chromatin-mediated genome stability. PMID:20679488

  16. Requirement for the phospho-H2AX binding module of Crb2 in double-strand break targeting and checkpoint activation.

    Science.gov (United States)

    Sanders, Steven L; Arida, Ahmad R; Phan, Funita P

    2010-10-01

    Activation of DNA damage checkpoints requires the rapid accumulation of numerous factors to sites of genomic lesions, and deciphering the mechanisms of this targeting is central to our understanding of DNA damage response. Histone modification has recently emerged as a critical element for the correct localization of damage response proteins, and one key player in this context is the fission yeast checkpoint mediator Crb2. Accumulation of Crb2 at ionizing irradiation-induced double-strand breaks (DSBs) requires two distinct histone marks, dimethylated H4 lysine 20 (H4K20me2) and phosphorylated H2AX (pH2AX). A tandem tudor motif in Crb2 directly binds H4K20me2, and this interaction is required for DSB targeting and checkpoint activation. Similarly, pH2AX is required for Crb2 localization to DSBs and checkpoint control. Crb2 can directly bind pH2AX through a pair of C-terminal BRCT repeats, but the functional significance of this binding has been unclear. Here we demonstrate that loss of its pH2AX-binding activity severely impairs the ability of Crb2 to accumulate at ionizing irradiation-induced DSBs, compromises checkpoint signaling, and disrupts checkpoint-mediated cell cycle arrest. These impairments are similar to that reported for abolition of pH2AX or mutation of the H4K20me2-binding tudor motif of Crb2. Intriguingly, a combined ablation of its two histone modification binding modules yields a strikingly additive reduction in Crb2 activity. These observations argue that binding of the Crb2 BRCT repeats to pH2AX is critical for checkpoint activity and provide new insight into the mechanisms of chromatin-mediated genome stability.

  17. Interprofessional Collaboration with Immune Checkpoint Inhibitor Therapy: the Roles of Gastroenterology, Endocrinology and Neurology.

    Science.gov (United States)

    Seery, Virginia

    2017-11-01

    To discuss immune checkpoint inhibitor therapy and identify opportunities for interprofessional collaboration in the management of toxicities in the areas of gastroenterology, endocrinology, and neurology. Published research and education articles in oncology, nursing, and various specialties. The use of immune checkpoint inhibitors is expanding; timely management of toxicity is critical for positive patient outcomes. There are many opportunities for interprofessional collaboration in the diagnosis and treatment of immune-related adverse events. Nurses play key roles in recognizing immune-related adverse events, providing patient education, and helping to facilitate interprofessional collaboration. Copyright © 2017 Elsevier Inc. All rights reserved.

  18. The subunits of the S-phase checkpoint complex Mrc1/Tof1/Csm3: dynamics and interdependence.

    Science.gov (United States)

    Uzunova, Sonya Dimitrova; Zarkov, Alexander Stefanov; Ivanova, Anna Marianova; Stoynov, Stoyno Stefanov; Nedelcheva-Veleva, Marina Nedelcheva

    2014-01-01

    The S-phase checkpoint aims to prevent cells from generation of extensive single-stranded DNA that predisposes to genome instability. The S. cerevisiae complex Tof1/Csm3/Mrc1 acts to restrain the replicative MCM helicase when DNA synthesis is prohibited. Keeping the replication machinery intact allows restart of the replication fork when the block is relieved. Although the subunits of the Tof1/Csm3/Mrc1 complex are well studied, the impact of every single subunit on the triple complex formation and function needs to be established. This work studies the cellular localization and the chromatin binding of GFP-tagged subunits when the complex is intact and when a subunit is missing. We demonstrate that the complex is formed in cell nucleus, not the cytoplasm, as Tof1, Csm3 and Mrc1 enter the nucleus independently from one another. Via in situ chromatin binding assay we show that a Tof1-Csm3 dimer formation and chromatin binding is required to ensure the attachment of Mrc1 to chromatin. Our study indicates that the translocation into the nucleus is not the process to regulate the timing of chromatin association of Mrc1. We also studied the nuclear behavior of Mrc1 subunit in the process of adaptation to the presence hydroxyurea. Our results indicate that after prolonged HU incubation, cells bypass the S-phase checkpoint and proceed throughout the cell cycle. This process is accompanied by Mrc1 chromatin detachment and Rad53 dephosphorylation. In S. cerevisiae the subunits of the S-phase checkpoint complex Mrc1/Tof1/Csm3 independently enter the cell nucleus, where a Tof1-Csm3 dimer is formed to ensure the chromatin binding of Mrc1 and favor DNA replication and S-phase checkpoint fork arrest. In the process of adaptation to the presence of hydroxyurea Mrc1 is detached from chromatin and Rad53 checkpoint activity is diminished in order to allow S-phase checkpoint escape and completion of the cell cycle.

  19. Targeting Tumor-Associated Macrophages as a Potential Strategy to Enhance the Response to Immune Checkpoint Inhibitors.

    Science.gov (United States)

    Cassetta, Luca; Kitamura, Takanori

    2018-01-01

    Inhibition of immune checkpoint pathways in CD8 + T cell is a promising therapeutic strategy for the treatment of solid tumors that has shown significant anti-tumor effects and is now approved by the FDA to treat patients with melanoma and lung cancer. However the response to this therapy is limited to a certain fraction of patients and tumor types, for reasons still unknown. To ensure success of this treatment, CD8 + T cells, the main target of the checkpoint inhibitors, should exert full cytotoxicity against tumor cells. However recent studies show that tumor-associated macrophages (TAM) can impede this process by different mechanisms. In this mini-review we will summarize recent studies showing the effect of TAM targeting on immune checkpoint inhibitors efficacy. We will also discuss on the limitations of the current strategies as well on the future scientific challenges for the progress of the tumor immunology field.

  20. EMODnet MedSea Checkpoint for sustainable Blue Growth

    Science.gov (United States)

    Moussat, Eric; Pinardi, Nadia; Manzella, Giuseppe; Blanc, Frederique

    2016-04-01

    The EMODNET checkpoint is a wide monitoring system assessment activity aiming to support the sustainable Blue Growth at the scale of the European Sea Basins by: 1) Clarifying the observation landscape of all compartments of the marine environment including Air, Water, Seabed, Biota and Human activities, pointing out to the existing programs, national, European and international 2) Evaluating fitness for use indicators that will show the accessibility and usability of observation and modeling data sets and their roles and synergies based upon selected applications by the European Marine Environment Strategy 3) Prioritizing the needs to optimize the overall monitoring Infrastructure (in situ and satellite data collection and assembling, data management and networking, modeling and forecasting, geo-infrastructure) and release recommendations for evolutions to better meet the application requirements in view of sustainable Blue Growth The assessment is designed for : - Institutional stakeholders for decision making on observation and monitoring systems - Data providers and producers to know how their data collected once for a given purpose could fit other user needs - End-users interested in a regional status and possible uses of existing monitoring data Selected end-user applications are of paramount importance for: (i) the blue economy sector (offshore industries, fisheries); (ii) marine environment variability and change (eutrophication, river inputs and ocean climate change impacts); (iii) emergency management (oil spills); and (iv) preservation of natural resources and biodiversity (Marine Protected Areas). End-user applications generate innovative products based on the existing observation landscape. The fitness for use assessment is made thanks to the comparison of the expected product specifications with the quality of the product derived from the selected data. This involves the development of checkpoint information and indicators based on Data quality and

  1. Immunotherapy targeting immune check-point(s) in brain metastases.

    Science.gov (United States)

    Di Giacomo, Anna Maria; Valente, Monica; Covre, Alessia; Danielli, Riccardo; Maio, Michele

    2017-08-01

    Immunotherapy with monoclonal antibodies (mAb) directed to different immune check-point(s) is showing a significant clinical impact in a growing number of human tumors of different histotype, both in terms of disease response and long-term survival patients. In this rapidly changing scenario, treatment of brain metastases remains an high unmeet medical need, and the efficacy of immunotherapy in these highly dismal clinical setting remains to be largely demonstrated. Nevertheless, up-coming observations are beginning to suggest a clinical potential of cancer immunotherapy also in brain metastases, regardless the underlying tumor histotype. These observations remain to be validated in larger clinical trials eventually designed also to address the efficacy of therapeutic mAb to immune check-point(s) within multimodality therapies for brain metastases. Noteworthy, the initial proofs of efficacy on immunotherapy in central nervous system metastases are already fostering clinical trials investigating its therapeutic potential also in primary brain tumors. We here review ongoing immunotherapeutic approaches to brain metastases and primary brain tumors, and the foreseeable strategies to overcome their main biologic hurdles and clinical challenges. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. The Geography of Deterrence: Exploring the Small Area Effects of Sobriety Checkpoints on Alcohol-Impaired Collision Rates within a City

    Science.gov (United States)

    Nunn, Samuel; Newby, William

    2011-01-01

    This article examines alcohol-impaired collision metrics around nine sobriety checkpoint locations in Indianapolis, Indiana, before and after implementation of 22 checkpoints, using a pre/post examination, a pre/post nonequivalent comparison group analysis, and an interrupted time series approach. Traffic safety officials used geographical…

  3. Parallelization and checkpointing of GPU applications through program transformation

    Energy Technology Data Exchange (ETDEWEB)

    Solano-Quinde, Lizandro Damian [Iowa State Univ., Ames, IA (United States)

    2012-01-01

    GPUs have emerged as a powerful tool for accelerating general-purpose applications. The availability of programming languages that makes writing general-purpose applications for running on GPUs tractable have consolidated GPUs as an alternative for accelerating general purpose applications. Among the areas that have benefited from GPU acceleration are: signal and image processing, computational fluid dynamics, quantum chemistry, and, in general, the High Performance Computing (HPC) Industry. In order to continue to exploit higher levels of parallelism with GPUs, multi-GPU systems are gaining popularity. In this context, single-GPU applications are parallelized for running in multi-GPU systems. Furthermore, multi-GPU systems help to solve the GPU memory limitation for applications with large application memory footprint. Parallelizing single-GPU applications has been approached by libraries that distribute the workload at runtime, however, they impose execution overhead and are not portable. On the other hand, on traditional CPU systems, parallelization has been approached through application transformation at pre-compile time, which enhances the application to distribute the workload at application level and does not have the issues of library-based approaches. Hence, a parallelization scheme for GPU systems based on application transformation is needed. Like any computing engine of today, reliability is also a concern in GPUs. GPUs are vulnerable to transient and permanent failures. Current checkpoint/restart techniques are not suitable for systems with GPUs. Checkpointing for GPU systems present new and interesting challenges, primarily due to the natural differences imposed by the hardware design, the memory subsystem architecture, the massive number of threads, and the limited amount of synchronization among threads. Therefore, a checkpoint/restart technique suitable for GPU systems is needed. The goal of this work is to exploit higher levels of parallelism and

  4. TAM receptor tyrosine kinases as emerging targets of innate immune checkpoint blockade for cancer therapy.

    Science.gov (United States)

    Akalu, Yemsratch T; Rothlin, Carla V; Ghosh, Sourav

    2017-03-01

    Cancer immunotherapy utilizing T-cell checkpoint inhibitors has shown tremendous clinical success. Yet, this mode of treatment is effective in only a subset of patients. Unresponsive patients tend to have non-T-cell-inflamed tumors that lack markers associated with the activation of adaptive anti-tumor immune responses. Notably, elimination of cancer cells by T cells is critically dependent on the optimal activity of innate immune cells. Therefore, identifying new targets that regulate innate immune cell function and promote the engagement of adaptive tumoricidal responses is likely to lead to the development of improved therapies against cancer. Here, we review the TAM receptor tyrosine kinases-TYRO3, AXL, and MERTK-as an emerging class of innate immune checkpoints that participate in key steps of anti-tumoral immunity. Namely, TAM-mediated efferocytosis, negative regulation of dendritic cell activity, and dysregulated production of chemokines collectively favor the escape of malignant cells. Hence, disabling TAM signaling may promote engagement of adaptive immunity and complement T-cell checkpoint blockade. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  5. Cloud object store for checkpoints of high performance computing applications using decoupling middleware

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2016-04-19

    Cloud object storage is enabled for checkpoints of high performance computing applications using a middleware process. A plurality of files, such as checkpoint files, generated by a plurality of processes in a parallel computing system are stored by obtaining said plurality of files from said parallel computing system; converting said plurality of files to objects using a log structured file system middleware process; and providing said objects for storage in a cloud object storage system. The plurality of processes may run, for example, on a plurality of compute nodes. The log structured file system middleware process may be embodied, for example, as a Parallel Log-Structured File System (PLFS). The log structured file system middleware process optionally executes on a burst buffer node.

  6. The fission yeast spindle orientation checkpoint: a model that generates tension?

    Science.gov (United States)

    Gachet, Yannick; Reyes, Céline; Goldstone, Sherilyn; Tournier, Sylvie

    2006-10-15

    In all eukaryotes, the alignment of the mitotic spindle with the axis of cell polarity is essential for accurate chromosome segregation as well as for the establishment of cell fate, and thus morphogenesis, during development. Studies in invertebrates, higher eukaryotes and yeast suggest that astral microtubules interact with the cell cortex to position the spindle. These microtubules are thought to impose pushing or pulling forces on the spindle poles to affect the rotation or movement of the spindle. In the fission yeast model, where cell division is symmetrical, spindle rotation is dependent on the interaction of astral microtubules with the cortical actin cytoskeleton. In these cells, a bub1-dependent mitotic checkpoint, the spindle orientation checkpoint (SOC), is activated when the spindles fail to align with the cell polarity axis. In this paper we review the mechanism that orientates the spindle during mitosis in fission yeast, and discuss the consequences of misorientation on metaphase progression. Copyright 2006 John Wiley & Sons, Ltd.

  7. Immune checkpoint inhibitors: the new frontier in non–small cell lung cancer treatment

    Directory of Open Access Journals (Sweden)

    El-Osta HE

    2016-08-01

    Full Text Available Hazem El-Osta, Kamran Shahid, Glenn M Mills, Prakash Peddi Department of Medicine, Division of Hematology-Oncology, Louisiana State University Health Sciences Center, Shreveport, LA, USA Abstract: Lung cancer is the major cause for cancer-related death in the US. Although advances in chemotherapy and targeted therapy have improved the outcome of metastatic non-small-cell lung cancer, its prognosis remains dismal. A deeper understanding of the complex interaction between the immune system and tumor microenvironment has identified immune checkpoint inhibitors as new avenue of immunotherapy. Rather than acting directly on the tumor, these therapies work by removing the inhibition exerted by tumor cell or other immune cells on the immune system, promoting antitumoral immune response. To date, two programmed death-1 inhibitors, namely nivolumab and pembrolizumab, have received the US Food and Drug Administration approval for the treatment of advanced non-small-cell lung cancer that failed platinum-based chemotherapy. This manuscript provides a brief overview of the pathophysiology of cancer immune evasion, summarizes pertinent data on completed and ongoing clinical trials involving checkpoint inhibitors, discusses the different strategies to optimize their function, and outlines various challenges that are faced in this promising yet evolving field. Keywords: checkpoint inhibitors, immunotherapy, nivolumab, non-small-cell lung cancer, pembrolizumab, programmed death-1, programmed death ligand-1

  8. Centromere replication timing determines different forms of genomic instability in Saccharomyces cerevisiae checkpoint mutants during replication stress.

    Science.gov (United States)

    Feng, Wenyi; Bachant, Jeff; Collingwood, David; Raghuraman, M K; Brewer, Bonita J

    2009-12-01

    Yeast replication checkpoint mutants lose viability following transient exposure to hydroxyurea, a replication-impeding drug. In an effort to understand the basis for this lethality, we discovered that different events are responsible for inviability in checkpoint-deficient cells harboring mutations in the mec1 and rad53 genes. By monitoring genomewide replication dynamics of cells exposed to hydroxyurea, we show that cells with a checkpoint deficient allele of RAD53, rad53K227A, fail to duplicate centromeres. Following removal of the drug, however, rad53K227A cells recover substantial DNA replication, including replication through centromeres. Despite this recovery, the rad53K227A mutant fails to achieve biorientation of sister centromeres during recovery from hydroxyurea, leading to secondary activation of the spindle assembly checkpoint (SAC), aneuploidy, and lethal chromosome segregation errors. We demonstrate that cell lethality from this segregation defect could be partially remedied by reinforcing bipolar attachment. In contrast, cells with the mec1-1 sml1-1 mutations suffer from severely impaired replication resumption upon removal of hydroxyurea. mec1-1 sml1-1 cells can, however, duplicate at least some of their centromeres and achieve bipolar attachment, leading to abortive segregation and fragmentation of incompletely replicated chromosomes. Our results highlight the importance of replicating yeast centromeres early and reveal different mechanisms of cell death due to differences in replication fork progression.

  9. Unique cytologic features of thyroiditis caused by immune checkpoint inhibitor therapy for malignant melanoma

    Directory of Open Access Journals (Sweden)

    Trevor E. Angell

    2018-03-01

    Full Text Available Blockade of immune checkpoint molecules to reverse cancer-induced immune suppression can improve anti-tumor immune responses in cancer patients. Monoclonal antibodies targeting two such molecules, Programmed cell death protein 1 (PD-1 and cytotoxic T-lymphocyte associated protein 4 (CTLA-4 have shown clinical benefit in the treatment of advanced malignancies, including metastatic melanoma. Adverse effects of these immune checkpoint inhibitors include immune-related adverse events (irAE, of which one of the most common is autoimmune thyroiditis. Though thyroiditis is increasingly recognized, there are no reports of the pathological findings that occur in immunotherapy-induced thyroiditis. We present a case of immunotherapy-induced thyroiditis demonstrating its unique cytopathologic features. A 51-year-old woman with metastatic melanoma was found to have a suppressed TSH and elevated free thyroxine concentration 14 days after starting treatment with nivolumab (PD-1 antagonist plus ipilimumab (CTLA-4 antagonist therapy. A thyroid biopsy was performed based on ultrasound findings and cytopathology revealed unique features including abundant clusters of necrotic cells, lymphocytes and CD163-positive histiocytes. This case reports cytopathologic features found in immune checkpoint inhibitor related thyroiditis. These appear to be unique findings and may help inform future research regarding the pathophysiology and mechanisms of this condition.

  10. A Comprehensive Review of US FDA-Approved Immune Checkpoint Inhibitors in Urothelial Carcinoma

    Directory of Open Access Journals (Sweden)

    Fu-Shun Hsu

    2017-01-01

    Full Text Available Few effective treatment options are available for patients with advanced or metastatic urothelial carcinoma (UC after unsuccessful first-line platinum-based chemotherapy. To date, immune checkpoint inhibitors are novel therapeutic agents for UC treatment. From May 2016 to May 2017, five anti-PD-1/PD-L1 monoclonal antibodies received accelerated or regular approval from the US Food and Drug Administration (FDA for the treatment of patients with locally advanced or metastatic UC. The present comprehensive review presents the background information of these five US FDA-approved anticancer agents to provide a basic but concise understanding of these agents for advanced studies. We summarize their immune checkpoint mechanisms, clinical efficacy, recommended usage protocols, adverse events, and the limitations of the PD-L1 biomarker assays.

  11. Central Tolerance Blockade to Augment Checkpoint Immunotherapy in Melanoma

    Science.gov (United States)

    2017-09-01

    expressed at higher levels in medullary thymic epithelial cells (mTECs) than in cortical thymic epithelial cells (cTECs), addition of anti-RANKL antibody...relative Aire expression by quantitative RT-PCR in cultured thymic tissue . 12-15 90% Subtask 3. Culture human thymus sections with OPG-Fc or vehicle...PCR in cultured thymic tissue . 15-18 90% ACURO approval 13-14 100% Major Task 1. Effect of concurrent anti-RANKL and checkpoint inhibitor

  12. Grp/DChk1 is required for G(2)-M checkpoint activation in Drosophila S2 cells, whereas Dmnk/DChk2 is dispensable

    NARCIS (Netherlands)

    de Vries, HI; Uyetake, L; Lemstra, W; Brunsting, JF; Su, TT; Kampinga, HH; Sibon, OCM

    2005-01-01

    Cell-cycle checkpoints are signal-transduction pathways required to maintain genomic stability in dividing cells. Previously, it was reported that two kinases essential for checkpoint signalling, Chk1 and Chk2 are structurally conserved. In contrast to yeast, Xenopus and mammals, the Chk1- and

  13. Comparative Analysis of Immune Checkpoint Molecules and Their Potential Role in the Transmissible Tasmanian Devil Facial Tumor Disease

    Directory of Open Access Journals (Sweden)

    Andrew S. Flies

    2017-05-01

    Full Text Available Immune checkpoint molecules function as a system of checks and balances that enhance or inhibit immune responses to infectious agents, foreign tissues, and cancerous cells. Immunotherapies that target immune checkpoint molecules, particularly the inhibitory molecules programmed cell death 1 and cytotoxic T-lymphocyte-associated protein 4 (CTLA-4, have revolutionized human oncology in recent years, yet little is known about these key immune signaling molecules in species other than primates and rodents. The Tasmanian devil facial tumor disease is caused by transmissible cancers that have resulted in a massive decline in the wild Tasmanian devil population. We have recently demonstrated that the inhibitory checkpoint molecule PD-L1 is upregulated on Tasmanian devil (Sarcophilus harrisii facial tumor cells in response to the interferon-gamma cytokine. As this could play a role in immune evasion by tumor cells, we performed a thorough comparative analysis of checkpoint molecule protein sequences among Tasmanian devils and eight other species. We report that many of the key signaling motifs and ligand-binding sites in the checkpoint molecules are highly conserved across the estimated 162 million years of evolution since the last common ancestor of placental and non-placental mammals. Specifically, we discovered that the CTLA-4 (MYPPPY ligand-binding motif and the CTLA-4 (GVYVKM inhibitory domain are completely conserved across all nine species used in our comparative analysis, suggesting that the function of CTLA-4 is likely conserved in these species. We also found that cysteine residues for intra- and intermolecular disulfide bonds were also highly conserved. For instance, all 20 cysteine residues involved in disulfide bonds in the human 4-1BB molecule were also present in devil 4-1BB. Although many key sequences were conserved, we have also identified immunoreceptor tyrosine-based inhibitory motifs (ITIMs and immunoreceptor tyrosine-based switch

  14. A phospho-proteomic screen identifies substrates of the checkpoint kinase Chk1

    DEFF Research Database (Denmark)

    Blasius, Melanie; Forment, Josep V; Thakkar, Neha

    2011-01-01

    BACKGROUND: The cell-cycle checkpoint kinase Chk1 is essential in mammalian cells due to its roles in controlling processes such as DNA replication, mitosis and DNA-damage responses. Despite its paramount importance, how Chk1 controls these functions remains unclear, mainly because very few Chk1...

  15. Immune Checkpoint Inhibitors: A New Opportunity in the Treatment of Ovarian Cancer?

    Directory of Open Access Journals (Sweden)

    Gloria Mittica

    2016-07-01

    Full Text Available Epithelial ovarian cancer (EOC is the leading cause of death for gynecological cancer. The standard treatment for advanced stage is the combination of optimal debulking surgery and platinum-based chemotherapy. Nevertheless, recurrence is frequent (around 70% and prognosis is globally poor. New therapeutic agents are needed to improve survival. Since EOC is strongly immunogenic, immune checkpoint inhibitors are under evaluation for their capacity to contrast the “turn off” signals expressed by the tumor to escape the immune system and usually responsible for self-tolerance maintenance. This article reviews the literature on anti-cytotoxic T-lymphocyte-associated protein 4 (CTLA-4, anti-PD-1, anti-PD-L1, and anti-PD-L2 antibodies in EOC and highlights their possible lines of development. Further studies are needed to better define the prognostic role of the immune checkpoint inhibitors, to identify predictors of response and the optimal clinical setting in EOC.

  16. Fission Yeast Apc15 Stabilizes MCC-Cdc20-APC/C Complexes, Ensuring Efficient Cdc20 Ubiquitination and Checkpoint Arrest.

    Science.gov (United States)

    May, Karen M; Paldi, Flora; Hardwick, Kevin G

    2017-04-24

    During mitosis, cells must segregate the replicated copies of their genome to their daughter cells with extremely high fidelity. Segregation errors lead to an abnormal chromosome number (aneuploidy), which typically results in disease or cell death [1]. Chromosome segregation and anaphase onset are initiated through the action of the multi-subunit E3 ubiquitin ligase known as the anaphase-promoting complex or cyclosome (APC/C [2]). The APC/C is inhibited by the spindle checkpoint in the presence of kinetochore attachment defects [3, 4]. Here we demonstrate that two non-essential APC/C subunits (Apc14 and Apc15) regulate association of spindle checkpoint proteins, in the form of the mitotic checkpoint complex (MCC), with the APC/C. apc14Δ mutants display increased MCC association with the APC/C and are unable to silence the checkpoint efficiently. Conversely, apc15Δ mutants display reduced association between the MCC and APC/C, are defective in poly-ubiquitination of Cdc20, and are checkpoint defective. In vitro reconstitution studies have shown that human MCC-APC/C can contain two molecules of Cdc20 [5-7]. Using a yeast strain expressing two Cdc20 genes with different epitope tags, we show by co-immunoprecipitation that this is true in vivo. MCC binding to the second molecule of Cdc20 is mediated via the C-terminal KEN box in Mad3. Somewhat surprisingly, complexes containing both molecules of Cdc20 accumulate in apc15Δ cells, and the implications of this observation are discussed. Copyright © 2017 The Author(s). Published by Elsevier Ltd.. All rights reserved.

  17. Avelumab: combining immune checkpoint inhibition and antibody-dependent cytotoxicity.

    Science.gov (United States)

    Hamilton, Gerhard; Rath, Barbara

    2017-04-01

    Immune checkpoint inhibition holds great promise for selected tumors. The human monoclonal antibody (mAB) avelumab is directed to programmed death ligand-1 (PD-L1) and is supposed to inhibit the immunosuppressive PD-L1/PD-1 interaction and, furthermore, effect antibody-dependent cytotoxicity (ADCC) lysis of tumor cells. Areas covered: This article presents an overview of the current means to activate the antitumor immune defense by targeting PD-1 or PD-L1 with mABs and their possible role in ADCC-mediated tumor cell elimination. Expert opinion: Avelumab contains a Fc region which can bind cognate receptors on immune effector cells and induce ADCC-mediated tumor cell lysis, in contrast to other mABs directed to PD-1/PD-L1 which lack the ability to trigger ADCC due to belonging to the IgG4 subclass or possessing a mutated Fc region. Preclinical and clinical data indicate that avelumab can be safely administered to cancer patients with a toxicity profile comparable to other mABs and without lysis of PD-L1-positive activated immune cells. This antibody yielded durable responses in a phase II trial in advanced Merkel cell carcinoma patients. Tumor cell lysis by avelumab prevents cells from resorting to alternative checkpoints as shown by targeting PD-1 and the upregulation of TIM-3.

  18. The internal Cdc20 binding site in BubR1 facilitates both spindle assembly checkpoint signalling and silencing

    DEFF Research Database (Denmark)

    Lischetti, Tiziana; Zhang, Gang; Sedgwick, Garry G

    2014-01-01

    Improperly attached kinetochores activate the spindle assembly checkpoint (SAC) and by an unknown mechanism catalyse the binding of two checkpoint proteins, Mad2 and BubR1, to Cdc20 forming the mitotic checkpoint complex (MCC). Here, to address the functional role of Cdc20 kinetochore localization...... in the SAC, we delineate the molecular details of its interaction with kinetochores. We find that BubR1 recruits the bulk of Cdc20 to kinetochores through its internal Cdc20 binding domain (IC20BD). We show that preventing Cdc20 kinetochore localization by removal of the IC20BD has a limited effect...... on the SAC because the IC20BD is also required for efficient SAC silencing. Indeed, the IC20BD can disrupt the MCC providing a mechanism for its role in SAC silencing. We thus uncover an unexpected dual function of the second Cdc20 binding site in BubR1 in promoting both efficient SAC signalling and SAC...

  19. Disruption of spindle checkpoint function in rats following 28 days of repeated administration of renal carcinogens.

    Science.gov (United States)

    Kimura, Masayuki; Mizukami, Sayaka; Watanabe, Yousuke; Hasegawa-Baba, Yasuko; Onda, Nobuhiko; Yoshida, Toshinori; Shibutani, Makoto

    2016-02-01

    We previously reported that 28-day exposure to hepatocarcinogens that facilitate cell proliferation specifically alters the expression of G1/S checkpoint-related genes and proteins, induces aberrant early expression of ubiquitin D (UBD) at the G2 phase, and increases apoptosis in the rat liver, indicating G1/S and spindle checkpoint dysfunction. The present study aimed to determine the time of onset of carcinogen-specific cell-cycle disruption after repeated administration of renal carcinogens for up to 28 days. Rats were orally administered the renal carcinogens nitrofurantoin (NFT), 1-amino-2,4-dibromoantraquinone (ADAQ), and 1,2,3-trichloropropane (TCP) or the non-carcinogenic renal toxicants 1-chloro-2-propanol, triamterene, and carboxin for 3, 7 or 28 days. Both immunohistochemical single-molecule analysis and real-time RT-PCR analysis revealed that carcinogen-specific expression changes were not observed after 28 days of administration. However, the renal carcinogens ADAQ and TCP specifically reduced the number of cells expressing phosphorylated-histone H3 at Ser10 in both UBD(+) cells and proliferating cells, suggestive of insufficient UBD expression at the M phase and early transition of proliferating cells from the M phase, without increasing apoptosis, after 28 days of administration. In contrast, NFT, which has marginal carcinogenic potential, did not induce such cellular responses. These results suggest that it may take 28 days to induce spindle checkpoint dysfunction by renal carcinogens; however, induction of apoptosis may not be essential. Thus, induction of spindle checkpoint dysfunction may be dependent on carcinogenic potential of carcinogen examined, and marginal carcinogens may not exert sufficient responses even after 28 days of administration.

  20. Deficiency of the Arabidopsis helicase RTEL1 triggers a SOG1-dependent replication checkpoint in response to DNA cross-links.

    Science.gov (United States)

    Hu, Zhubing; Cools, Toon; Kalhorzadeh, Pooneh; Heyman, Jefri; De Veylder, Lieven

    2015-01-01

    To maintain genome integrity, DNA replication is executed and regulated by a complex molecular network of numerous proteins, including helicases and cell cycle checkpoint regulators. Through a systematic screening for putative replication mutants, we identified an Arabidopsis thaliana homolog of human Regulator of Telomere Length 1 (RTEL1), which functions in DNA replication, DNA repair, and recombination. RTEL1 deficiency retards plant growth, a phenotype including a prolonged S-phase duration and decreased cell proliferation. Genetic analysis revealed that rtel1 mutant plants show activated cell cycle checkpoints, specific sensitivity to DNA cross-linking agents, and increased homologous recombination, but a lack of progressive shortening of telomeres, indicating that RTEL1 functions have only been partially conserved between mammals and plants. Surprisingly, RTEL1 deficiency induces tolerance to the deoxynucleotide-depleting drug hydroxyurea, which could be mimicked by DNA cross-linking agents. This resistance does not rely on the essential replication checkpoint regulator WEE1 but could be blocked by a mutation in the SOG1 transcription factor. Taken together, our data indicate that RTEL1 is required for DNA replication and that its deficiency activates a SOG1-dependent replication checkpoint. © 2015 American Society of Plant Biologists. All rights reserved.

  1. Checkpoint inhibitors in cancer immunotherapy: Cross reactivity of a CTLA-4 antibody and IDO-inhibitor L-1MT in pigs

    DEFF Research Database (Denmark)

    Al-Shatrawi, Zina Adil; Frøsig, Thomas Mørch; Jungersen, Gregers

    a non-specific activation of porcine T cells. This will be further investigated to provide the basis for in vivo studies investigating checkpoint inhibitor blockade in combination with other cancer immunotherapies. Eventually our goal is to establish pigs as an alternative large animal model......Blockade of checkpoint inhibitors has recently shown very convincing results in the treatment of cancer. One key target is CTLA-4, which has been demonstrated to be a potent negative regulator of lymphocyte activation. The treatment with the FDA-approved fully human CTLA-4 monoclonal antibody...... Ipilimumab increases anticancer T-cell reactivity and overall survival of metastatic cancer patients. Indole-amine 2,3-dioxygenase (IDO) is another checkpoint inhibitor which suppresses T-cell immunity by the depletion of tryptophan in the T-cell microenvironment, and also inhibition of IDO by L-1...

  2. In vitro analysis of the role of replication protein A (RPA) and RPA phosphorylation in ATR-mediated checkpoint signaling.

    Science.gov (United States)

    Lindsey-Boltz, Laura A; Reardon, Joyce T; Wold, Marc S; Sancar, Aziz

    2012-10-19

    Replication protein A (RPA) plays essential roles in DNA metabolism, including replication, checkpoint, and repair. Recently, we described an in vitro system in which the phosphorylation of human Chk1 kinase by ATR (ataxia telangiectasia mutated and Rad3-related) is dependent on RPA bound to single-stranded DNA. Here, we report that phosphorylation of other ATR targets, p53 and Rad17, has the same requirements and that RPA is also phosphorylated in this system. At high p53 or Rad17 concentrations, RPA phosphorylation is inhibited and, in this system, RPA with phosphomimetic mutations cannot support ATR kinase function, whereas a non-phosphorylatable RPA mutant exhibits full activity. Phosphorylation of these ATR substrates depends on the recruitment of ATR and the substrates by RPA to the RPA-ssDNA complex. Finally, mutant RPAs lacking checkpoint function exhibit essentially normal activity in nucleotide excision repair, revealing RPA separation of function for checkpoint and excision repair.

  3. In Vitro Analysis of the Role of Replication Protein A (RPA) and RPA Phosphorylation in ATR-mediated Checkpoint Signaling*

    Science.gov (United States)

    Lindsey-Boltz, Laura A.; Reardon, Joyce T.; Wold, Marc S.; Sancar, Aziz

    2012-01-01

    Replication protein A (RPA) plays essential roles in DNA metabolism, including replication, checkpoint, and repair. Recently, we described an in vitro system in which the phosphorylation of human Chk1 kinase by ATR (ataxia telangiectasia mutated and Rad3-related) is dependent on RPA bound to single-stranded DNA. Here, we report that phosphorylation of other ATR targets, p53 and Rad17, has the same requirements and that RPA is also phosphorylated in this system. At high p53 or Rad17 concentrations, RPA phosphorylation is inhibited and, in this system, RPA with phosphomimetic mutations cannot support ATR kinase function, whereas a non-phosphorylatable RPA mutant exhibits full activity. Phosphorylation of these ATR substrates depends on the recruitment of ATR and the substrates by RPA to the RPA-ssDNA complex. Finally, mutant RPAs lacking checkpoint function exhibit essentially normal activity in nucleotide excision repair, revealing RPA separation of function for checkpoint and excision repair. PMID:22948311

  4. Loss of p53 induces M-phase retardation following G2 DNA damage checkpoint abrogation.

    Science.gov (United States)

    Minemoto, Yuzuru; Uchida, Sanae; Ohtsubo, Motoaki; Shimura, Mari; Sasagawa, Toshiyuki; Hirata, Masato; Nakagama, Hitoshi; Ishizaka, Yukihito; Yamashita, Katsumi

    2003-04-01

    Most cell lines that lack functional p53 protein are arrested in the G2 phase of the cell cycle due to DNA damage. When the G2 checkpoint is abrogated, these cells are forced into mitotic catastrophe. A549 lung adenocarcinoma cells, in which p53 was eliminated with the HPV16 E6 gene, exhibited efficient arrest in the G2 phase when treated with adriamycin. Administration of caffeine to G2-arrested cells induced a drastic change in cell phenotype, the nature of which depended on the status of p53. Flow cytometric and microscopic observations revealed that cells that either contained or lacked p53 resumed their cell cycles and entered mitosis upon caffeine treatment. However, transit to the M phase was slower in p53-negative cells than in p53-positive cells. Consistent with these observations, CDK1 activity was maintained at high levels, along with stable cyclin B1, in p53-negative cells. The addition of butyrolactone I, which is an inhibitor of CDK1 and CDK2, to the p53-negative cells reduced the floating round cell population and induced the disappearance of cyclin B1. These results suggest a relationship between the p53 pathway and the ubiquitin-mediated degradation of mitotic cyclins and possible cross-talk between the G2-DNA damage checkpoint and the mitotic checkpoint.

  5. Clinical features, predictive correlates, and pathophysiology of immune-related adverse events in immune checkpoint inhibitor treatments in cancer: a short review

    OpenAIRE

    Yoest, Jennifer M

    2017-01-01

    Jennifer M Yoest Department of Pathology, University of Pittsburgh Medical Center, Pittsburgh, PA, USA Abstract: Identification and characterization of T-cell regulatory mechanisms, or checkpoints, have led to a wave of drug development aimed at inhibiting these targets to “remove the brakes” of the immune system. This class of anticancer therapeutics, termed immune checkpoint inhibitors (ICIs), has harnessed the potential of the body’s own immune system to reco...

  6. Rituximab does not reset defective early B cell tolerance checkpoints

    Science.gov (United States)

    Chamberlain, Nicolas; Massad, Christopher; Oe, Tyler; Cantaert, Tineke; Herold, Kevan C.; Meffre, Eric

    2015-01-01

    Type 1 diabetes (T1D) patients show abnormalities in early B cell tolerance checkpoints, resulting in the accumulation of large numbers of autoreactive B cells in their blood. Treatment with rituximab, an anti-CD20 mAb that depletes B cells, has been shown to preserve β cell function in T1D patients and improve other autoimmune diseases, including rheumatoid arthritis and multiple sclerosis. However, it remains largely unknown how anti–B cell therapy thwarts autoimmunity in these pathologies. Here, we analyzed the reactivity of Abs expressed by single, mature naive B cells from 4 patients with T1D before and 52 weeks after treatment to determine whether rituximab resets early B cell tolerance checkpoints. We found that anti–B cell therapy did not alter the frequencies of autoreactive and polyreactive B cells, which remained elevated in the blood of all patients after rituximab treatment. Moreover, the limited proliferative history of autoreactive B cells after treatment revealed that these clones were newly generated B cells and not self-reactive B cells that had escaped depletion and repopulated the periphery through homeostatic expansion. We conclude that anti–B cell therapy may provide a temporary dampening of autoimmune processes through B cell depletion. However, repletion with autoreactive B cells may explain the relapse that occurs in many autoimmune patients after anti–B cell therapy. PMID:26642366

  7. Roles of nibrin and ATM/ATR kinases on the G2 checkpoint under endogenous or radio-induced DNA damage

    Directory of Open Access Journals (Sweden)

    Katherine Marcelain

    2005-01-01

    Full Text Available Checkpoint response to DNA damage involves the activation of DNA repair and G2 lengthening subpathways. The roles of nibrin (NBS1 and the ATM/ATR kinases in the G2 DNA damage checkpoint, evoked by endogenous and radio-induced DNA damage, were analyzed in control, A-T and NBS lymphoblast cell lines. Short-term responses to G2 treatments were evaluated by recording changes in the yield of chromosomal aberrations in the ensuing mitosis, due to G2 checkpoint adaptation, and also in the duration of G2 itself. The role of ATM/ATR in the G2 checkpoint pathway repairing chromosomal aberrations was unveiled by caffeine inhibition of both kinases in G2. In the control cell lines, nibrin and ATM cooperated to provide optimum G2 repair for endogenous DNA damage. In the A-T cells, ATR kinase substituted successfully for ATM, even though no G2 lengthening occurred. X-ray irradiation (0.4 Gy in G2 increased chromosomal aberrations and lengthened G2, in both mutant and control cells. However, the repair of radio-induced DNA damage took place only in the controls. It was associated with nibrin-ATM interaction, and ATR did not substitute for ATM. The absence of nibrin prevented the repair of both endogenous and radio-induced DNA damage in the NBS cells and partially affected the induction of G2 lengthening.

  8. Constitutive Cdk2 activity promotes aneuploidy while altering the spindle assembly and tetraploidy checkpoints

    DEFF Research Database (Denmark)

    Jahn, Stephan C; Corsino, Patrick E; Davis, Bradley J

    2013-01-01

    instability. Expression of these complexes in the MCF10A cell line leads to retinoblastoma protein (Rb) hyperphosphorylation, a subsequent increase in proliferation rate, and increased expression of the spindle assembly checkpoint protein Mad2. This results in a strengthening of the spindle assembly...

  9. Molecular basis of APC/C regulation by the spindle assembly checkpoint

    Science.gov (United States)

    Zhang, Ziguo; Yang, Jing; Maslen, Sarah; Skehel, Mark; Barford, David

    2016-01-01

    In the dividing eukaryotic cell the spindle assembly checkpoint (SAC) ensures each daughter cell inherits an identical set of chromosomes. The SAC coordinates the correct attachment of sister chromatid kinetochores to the mitotic spindle with activation of the anaphase-promoting complex/cyclosome (APC/C), the E3 ubiquitin ligase that initiates chromosome separation. In response to unattached kinetochores, the SAC generates the mitotic checkpoint complex (MCC), a multimeric assembly that inhibits the APC/C, delaying chromosome segregation. Here, using cryo-electron microscopy we determined the near-atomic resolution structure of an APC/C-MCC complex (APC/CMCC). We reveal how degron-like sequences of the MCC subunit BubR1 block degron recognition sites on Cdc20, the APC/C coactivator subunit (Cdc20APC/C) responsible for substrate interactions. BubR1 also obstructs binding of UbcH10 (APC/C’s initiating E2) to repress APC/C ubiquitination activity. Conformational variability of the complex allows for UbcH10 association, and we show from a structure of APC/CMCC in complex with UbcH10 how the Cdc20 subunit intrinsic to the MCC (Cdc20MCC) is ubiquitinated, a process that results in APC/C reactivation when the SAC is silenced. PMID:27509861

  10. Genetic Control of the Trigger for the G2/M Checkpoint

    Energy Technology Data Exchange (ETDEWEB)

    Hall, Eric J. [Columbia University; Smilenov, Lubomir B. [Columbia University; Young, Erik F. [Columbia University

    2013-10-01

    The work undertaken in this project addressed two seminal areas of low dose radiation biology that are poorly understood and controversial. These areas are the challenge to the linear-no-threshold (LNT) paradigm at low doses of radiation and, the fundamental elements of radiation bystander effect biology Genetic contributions to low dose checkpoint engagement: The LNT paradigm is an extrapolation of known, measured cancer induction endpoints. Importantly, data for lower doses is often not available. Debatably, radiation protection standards have been introduced which are prudently contingent on the adherence of cancer risk to the established trend seen at higher doses. Intriguing findings from other labs have hinted at separate DNA damage response programs that engage at low or high levels of radiation. Individual radiation sensitivity commensurate with hemizygosity for a radiation sensitivity gene has been estimated at 1-2% in the U.S.. Careful interrogation of the DNA damage response at low doses of radiation became important and served as the basis for this grant. Several genes were tested in combinations to determine if combined haploinsufficiency for multiple radiosensitizing genes could render a cell more sensitive to lower levels of acute radiation exposure. We measured a classical radiation response endpoint, cell cycle arrest prior to mitosis. Mouse embryo fibroblasts were used and provided a uniform, rapidly dividing and genetically manipulable population of study. Our system did not report checkpoint engagement at acute doses of gamma rays below 100 mGy. The system did report checkpoint engagement reproducibly at 500 mGy establishing a threshold for activation between 100 and 500 mGy. Engagement of the checkpoint was ablated in cells nullizygous for ATM but was otherwise unperturbed in cells combinatorially haploinsufficient for ATM and Rad9, ATM and PTEN or PTEN and Rad9. Taken together, these experiments tell us that, in a sensitive fibroblast culture

  11. Biological significance of the focus on DNA damage checkpoint factors remained after irradiation of ionizing radiation

    International Nuclear Information System (INIS)

    Yamauchi, Motohiro; Suzuki, Keiji

    2005-01-01

    This paper reviews recent reports on the focus formation and participation to checkpoint of (such phosphorylated (P-d) as below) ATM and H2AX, MDC1, 53BP1 and NBS1, and discusses their role in DNA damage checkpoint induction mainly around authors' studies. When the cell is irradiated by ionizing radiation, the subtype histone like H2AX is P-d and the formed focus', seen in the nucleus on immuno-fluorographic observation, represents the P-d H2AX at the damaged site of DNA. The role of P-d ATM (the product of causative gene of ataxia-telangiectasia mutation, a protein kinase) has been first shown by laser beam irradiation. Described are discussions on the roles and functions after irradiation in focus formation and DNA damage checkpoint of P-d H2AX (a specific histone product by the radiation like γ-ray as above), P-d ATM, MDC1 (a mediator of DNA damage check point protein 1), 53BP1, (a p53 binding protein) and NBS1 (the product of the causative gene of Nijmegen Breakage Syndrome). Authors have come to point out the remained focal size increase as implications of the efficient repair of damaged DNA, and the second cycled p53 accumulation, of tumor suppression. Thus evaluation of biological significance of these aspects, scarcely noted hitherto, is concluded important. (S.I.)

  12. Design Optimization of Time- and Cost-Constrained Fault-Tolerant Embedded Systems with Checkpointing and Replication

    DEFF Research Database (Denmark)

    Pop, Paul; Izosimov, Viacheslav; Eles, Petru

    2009-01-01

    We present an approach to the synthesis of fault-tolerant hard real-time systems for safety-critical applications. We use checkpointing with rollback recovery and active replication for tolerating transient faults. Processes and communications are statically scheduled. Our synthesis approach deci...

  13. Preferential radiosensitization of G1 checkpoint--deficient cells by methylxanthines

    International Nuclear Information System (INIS)

    Russell, Kenneth J.; Wiens, Linda W.; Demers, G. William; Galloway, Denise A.; Le, Tiep; Rice, Glenn C.; Bianco, James A.; Singer, Jack W.; Groudine, Mark

    1996-01-01

    Purpose: To develop a checkpoint-based strategy for preferential radiosensitization of human tumors with deficient and/or mutant p53. Methods and Materials: A549 human lung adenocarcinoma cell lines differing in their expression of the p53 tumor suppressor gene were produced by transduction with the E6 oncogene from human papilloma virus type 16. The cells expressing E6 (E6+) lack a G1 arrest in response to ionizing radiation, are deficient in p53 and p21 expression, and exhibit a fivefold greater clonogenic survival following 10 Gy radiation. Results: Postirradiation incubation with millimolar concentrations of the methylxanthine pentoxifylline (PTX) results in preferential radiosensitization of the E6+ cells compared to the LXSN+ vector transduced controls. There is a threefold sensitization of the LXSN+ cells and a 15-fold sensitization of the E6+ cells, which results in equal clonogenic survival of the two lines. Flow cytometry reveals PTX abrogation of the radiation induced G2 arrest for both cell lines. PTX also prolongs G1 transit for both cell lines. Preliminary results are presented using a novel methylxanthine, lisofylline (LSF), which has similar cell cycle effects on G1 and G2 and achieves differential radiosensitization at micromolar concentrations that are sustainable in humans. Conclusions: This checkpoint-based strategy is a promising approach for achieving preferential radiosensitization of p53- tumors relative to p53+ normal tissues

  14. Effect of salt-inducible kinase 2 on checkpoint in response to γ-ray irradiation

    International Nuclear Information System (INIS)

    Yin Jiaojiao; Zhou Lijun; Wang Yu; Liu Xiaodan; Gu Yongqing; Zhou Pingkun

    2014-01-01

    Objective: To investigate the effect of salt-induced kinase 2 (SIK2) in the G_2/M checkpoint in response to ionizing radiation and the possible mechanism. Methods: HeLa cells were irradiated with "6"0Co γ-rays. The cell model of knockdown SIK2 expression was constrcuted by transfecting HeLa cells with a pSicoR-based lentivirus vector of expressing SIK2 shRNA by lipofectamin 2000. Western blot and flow cytometry were performed to measure the changes of SIK2 protein level and cell cycle distribution. The phosphorylated histone protein H3 on Ser 10 was used as a molecular marker of mitotic cells for detecting the function of G2/M checkpoint. Results: The expression level of SIK2 protein increased in HeLa cells after "6"0Co γ-ray irradiation. A cell model of knockdown SIK2 expression was successfully generated by transfecting the specific shRNA against SIK2. Depression of SIK2 significantly increased the cellular sensitivity at 1, 2, 4, 6 Gy post-irradiation (t = -3.445, -2.581, -3.251, -2.553, P < 0.05), and led cells to release earlier from the G_2/M boundary arrest compared to control cells at 5, 6 h post-irradiation(t = 4.341, 6.500, P < 0.05). Western blot analysis indicated that the irradiation-induced phosphorylated CHK2/T68 in SIK2 knock-down cells was earlier than that in control cells. Conclusions: salt-induced kinase 2 (SIK2) participates in the regulation of G_2/M checkpoint induced by ionizing radiation and affects cellular radiosensitivity. (authors)

  15. Predictors of responses to immune checkpoint blockade in advanced melanoma

    DEFF Research Database (Denmark)

    Jacquelot, N; Roberti, M P; Enot, D P

    2017-01-01

    Immune checkpoint blockers (ICB) have become pivotal therapies in the clinical armamentarium against metastatic melanoma (MMel). Given the frequency of immune related adverse events and increasing use of ICB, predictors of response to CTLA-4 and/or PD-1 blockade represent unmet clinical needs....... Using a systems biology-based approach to an assessment of 779 paired blood and tumor markers in 37 stage III MMel patients, we analyzed association between blood immune parameters and the functional immune reactivity of tumor-infiltrating cells after ex vivo exposure to ICB. Based on this assay, we...

  16. Neuromuscular complications of immune checkpoint inhibitor therapy.

    Science.gov (United States)

    Kolb, Noah A; Trevino, Christopher R; Waheed, Waqar; Sobhani, Fatemeh; Landry, Kara K; Thomas, Alissa A; Hehir, Mike

    2018-01-17

    Immune checkpoint inhibitor (ICPI) therapy unleashes the body's natural immune system to fight cancer. ICPIs improve overall cancer survival, however, the unbridling of the immune system may induce a variety of immune-related adverse events. Neuromuscular immune complications are rare but they can be severe. Myasthenia gravis and inflammatory neuropathy are the most common neuromuscular adverse events but a variety of others including inflammatory myopathy are reported. The pathophysiologic mechanism of these autoimmune disorders may differ from that of non-ICPI-related immune diseases. Accordingly, while the optimal treatment for ICPI-related neuromuscular disorders generally follows a traditional paradigm, there are important novel considerations in selecting appropriate immunosuppressive therapy. This review presents 2 new cases, a summary of neuromuscular ICPI complications, and an approach to the diagnosis and treatment of these disorders. Muscle Nerve, 2018. © 2018 Wiley Periodicals, Inc.

  17. Direct and indirect control of the initiation of meiotic recombination by DNA damage checkpoint mechanisms in budding yeast.

    Directory of Open Access Journals (Sweden)

    Bilge Argunhan

    Full Text Available Meiotic recombination plays an essential role in the proper segregation of chromosomes at meiosis I in many sexually reproducing organisms. Meiotic recombination is initiated by the scheduled formation of genome-wide DNA double-strand breaks (DSBs. The timing of DSB formation is strictly controlled because unscheduled DSB formation is detrimental to genome integrity. Here, we investigated the role of DNA damage checkpoint mechanisms in the control of meiotic DSB formation using budding yeast. By using recombination defective mutants in which meiotic DSBs are not repaired, the effect of DNA damage checkpoint mutations on DSB formation was evaluated. The Tel1 (ATM pathway mainly responds to unresected DSB ends, thus the sae2 mutant background in which DSB ends remain intact was employed. On the other hand, the Mec1 (ATR pathway is primarily used when DSB ends are resected, thus the rad51 dmc1 double mutant background was employed in which highly resected DSBs accumulate. In order to separate the effect caused by unscheduled cell cycle progression, which is often associated with DNA damage checkpoint defects, we also employed the ndt80 mutation which permanently arrests the meiotic cell cycle at prophase I. In the absence of Tel1, DSB formation was reduced in larger chromosomes (IV, VII, II and XI whereas no significant reduction was found in smaller chromosomes (III and VI. On the other hand, the absence of Rad17 (a critical component of the ATR pathway lead to an increase in DSB formation (chromosomes VII and II were tested. We propose that, within prophase I, the Tel1 pathway facilitates DSB formation, especially in bigger chromosomes, while the Mec1 pathway negatively regulates DSB formation. We also identified prophase I exit, which is under the control of the DNA damage checkpoint machinery, to be a critical event associated with down-regulating meiotic DSB formation.

  18. Genetic variation in the major mitotic checkpoint genes associated with chromosomal aberrations in healthy humans

    Czech Academy of Sciences Publication Activity Database

    Försti, A.; Frank, Ch.; Smolková, B.; Kazimírová, A.; Barančoková, M.; Vymetálková, Veronika; Kroupa, M.; Naccarati, Alessio; Vodičková, Ludmila; Buchancová, J.; Dusinská, M.; Musak, L.; Vodička, Pavel; Hemminki, K.

    2016-01-01

    Roč. 380, č. 2 (2016), s. 442-446 ISSN 0304-3835 R&D Projects: GA ČR(CZ) GA15-14789S Institutional support: RVO:68378041 Keywords : chromosomal integrity * cytogenetics * spindle checkpoint Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 6.375, year: 2016

  19. A Review of Immune Checkpoint Inhibitors for the Management of Locally Advanced or Metastatic Urothelial Carcinoma.

    Science.gov (United States)

    Hanna, Kirollos S

    2017-11-01

    Urothelial carcinoma (UC) is the second most common malignancy of the genitourinary system and the sixth most common cancer in the United States. The overall incidence of UC appears to be on the decline, but death rates have remained stable. Stage IV metastatic disease is associated with only a 5% survival rate at 5 years. Gemcitabine and cisplatin combinations or dose-dense methotrexate, vinblastine, doxorubicin, and cisplatin are the preferred regimens for individuals with advance, metastatic disease and a good performance status and organ function. Second-line therapies in this setting are limited. During the course of 1 year, five immune checkpoint inhibitors were approved for treatment of cancers in the locally advanced or metastatic setting: atezolizumab, nivolumab, durvalumab, avelumab, and pembrolizumab. Immunotherapies have played a significant role in the treatment of various cancers and have continued to expand. It is of utmost importance that practitioners include checkpoint inhibitors as treatment options for UC. Based on the limited data, pembrolizumab and atezolizumab may be the drugs of choice, as they are supported by the most influential data to date; however, further research is warranted. Ongoing clinical trials will further assess the benefits of inducing cellular immunity in the treatment of UC. These therapies mark a new landscape in the treatment of UC. In this article, the available data on immune checkpoint inhibitors for the treatment of locally advanced or metastatic UC and their place in therapy are reviewed. © 2017 Pharmacotherapy Publications, Inc.

  20. XRIndex: A brief screening tool for individual differences in security threat detection in x-ray images

    Directory of Open Access Journals (Sweden)

    Elena eRusconi

    2015-08-01

    Full Text Available X-ray imaging is a cost-effective technique at security checkpoints that typically require the presence of human operators. We have previously shown that self-reported Attention to Detail can predict threat detection performance with small-vehicle x-ray images (Rusconi et al., 2012. Here we provide evidence for the generality of such a link by having a large sample of naïve participants screen more typical dual-energy x-ray images of hand luggage. The results show that the Attention to Detail score is a linear predictor of threat detection accuracy. We then develop and fine-tune a novel self-report scale for security screening: the XRIndex, which improves on the Attention to Detail scale for predictive power and opacity to interpretation. The XRIndex is not redundant with any of the Big Five personality traits. We validate the XRIndex against security x-ray images with an independent sample of untrained participants and suggest that the XRIndex may be a useful aid for the identification of suitable candidates for professional security training with a focus on x-ray threat detection. Further studies are needed to determine whether this can also apply to trained professionals.

  1. The effect of tributyltin chloride on Caenorhabditis elegans germline is mediated by a conserved DNA damage checkpoint pathway.

    Science.gov (United States)

    Cheng, Zhe; Tian, Huimin; Chu, Hongran; Wu, Jianjian; Li, Yingying; Wang, Yanhai

    2014-03-21

    Tributyltin (TBT), one of the environmental pollutants, has been shown to impact the reproduction of animals. However, due to the lack of appropriate animal model, analysis of the affected molecular pathways in germ cells is lagging and has been particularly challenging. In the present study, we investigated the effects of tributyltin chloride (TBTCL) on the nematode Caenorhabditis elegans germline. We show that exposure of C. elegans to TBTCL causes significantly elevated level of sterility and embryonic lethality. TBTCL exposure results in an increased number of meiotic DNA double-strand breaks in germ cells, subsequently leading to activated DNA damage checkpoint. Exposing C. elegans to TBTCL causes dose- and time-dependent germline apoptosis. This apoptotic response was blocked in loss-of-function mutants of hus-1 (op241), mrt-2 (e2663) and p53/cep-1 (gk138), indicating that checkpoints and p53 are essential for mediating TBTCL-induced germ cell apoptosis. Moreover, TBTCL exposure can inhibit germ cell proliferation, which is also mediated by the conserved checkpoint pathway. We thereby propose that TBT exhibits its effects on the germline by inducing DNA damage and impaired maintenance of genomic integrity. Copyright © 2014 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.

  2. rad-Dependent response of the chk1-encoded protein kinase at the DNA damage checkpoint

    NARCIS (Netherlands)

    Walworth, N.C.; Bernards, R.A.

    1996-01-01

    Exposure of eukaryotic cells to agents that generate DNA damage results in transient arrest of progression through the cell cycle. In fission yeast, the DNA damage checkpoint associated with cell cycle arrest before mitosis requires the protein kinase p56chk1. DNA damage induced by ultraviolet

  3. Clinical characteristics of patient selection and imaging predictors of outcome in solid tumors treated with checkpoint-inhibitors

    International Nuclear Information System (INIS)

    Rossi, Sabrina; Toschi, Luca; Castello, Angelo; Grizzi, Fabio; Mansi, Luigi; Lopci, Egesta

    2017-01-01

    The rapidly evolving knowledge on tumor immunology and the continuous implementation of immunotherapy in cancer have recently led to the FDA and EMA approval of several checkpoint inhibitors as immunotherapic agents in clinical practice. Anti-CTLA-4, anti-PD-1, and anti-PDL-1 antibodies are becoming standard of care in advanced melanoma, as well as in relapsed or metastatic lung and kidney cancer, demonstrating higher and longer response compared to standard chemotherapy. These encouraging results have fostered the evaluation of these antibodies either alone or in combination with other therapies in several dozen clinical trials for the treatment of multiple tumor types. However, not all patients respond to immune checkpoint inhibitors, hence, specific biomarkers are necessary to guide and monitor therapy. The utility of PD-L1 expression as a biomarker has varied in different clinical trials, but, to date, no consensus has been reached on whether PD-L1 expression is an ideal marker for response and patient selection; approximately 20-25% of patients will respond to immunotherapy with checkpoint inhibitors despite a negative PD-L1 staining. On the other hand, major issues concern the evaluation of objective response in patients treated with immunotherapy. Pure morphological criteria as commonly used in solid tumors (i.e. RECIST) are not sufficient because change in size is not an early and reliable marker of tumor response to biological therapies. Thus, the scientific community has required a continuous adaptation of immune-related response criteria (irRC) to overcome the problem. In this context, metabolic information and antibody-based imaging with positron emission tomography (PET) have been investigated, providing a powerful approach for an optimal stratification of patients at staging and during the evaluation of the response to therapy. In the present review we provide an overview on the clinical characteristics of patient selection when using imaging

  4. Clinical characteristics of patient selection and imaging predictors of outcome in solid tumors treated with checkpoint-inhibitors

    Energy Technology Data Exchange (ETDEWEB)

    Rossi, Sabrina; Toschi, Luca [Humanitas Clinical and Research Hospital, Medical Oncology, Rozzano (Italy); Castello, Angelo [Humanitas Clinical and Research Hospital, Nuclear Medicine, Rozzano (Italy); Grizzi, Fabio [Humanitas Clinical and Research Hospital, Immunology and Inflammation, Rozzano (Italy); Mansi, Luigi [Seconda Universita di Napoli, Nuclear Medicine, Naples (Italy); Lopci, Egesta [Humanitas Clinical and Research Hospital, Nuclear Medicine, Rozzano (Italy); Humanitas Cancer Center, Humanitas Clinical and Research Hospital, Nuclear Medicine, Rozzano, MI (Italy)

    2017-12-15

    The rapidly evolving knowledge on tumor immunology and the continuous implementation of immunotherapy in cancer have recently led to the FDA and EMA approval of several checkpoint inhibitors as immunotherapic agents in clinical practice. Anti-CTLA-4, anti-PD-1, and anti-PDL-1 antibodies are becoming standard of care in advanced melanoma, as well as in relapsed or metastatic lung and kidney cancer, demonstrating higher and longer response compared to standard chemotherapy. These encouraging results have fostered the evaluation of these antibodies either alone or in combination with other therapies in several dozen clinical trials for the treatment of multiple tumor types. However, not all patients respond to immune checkpoint inhibitors, hence, specific biomarkers are necessary to guide and monitor therapy. The utility of PD-L1 expression as a biomarker has varied in different clinical trials, but, to date, no consensus has been reached on whether PD-L1 expression is an ideal marker for response and patient selection; approximately 20-25% of patients will respond to immunotherapy with checkpoint inhibitors despite a negative PD-L1 staining. On the other hand, major issues concern the evaluation of objective response in patients treated with immunotherapy. Pure morphological criteria as commonly used in solid tumors (i.e. RECIST) are not sufficient because change in size is not an early and reliable marker of tumor response to biological therapies. Thus, the scientific community has required a continuous adaptation of immune-related response criteria (irRC) to overcome the problem. In this context, metabolic information and antibody-based imaging with positron emission tomography (PET) have been investigated, providing a powerful approach for an optimal stratification of patients at staging and during the evaluation of the response to therapy. In the present review we provide an overview on the clinical characteristics of patient selection when using imaging

  5. Mutant p53 perturbs DNA replication checkpoint control through TopBP1 and Treslin.

    Science.gov (United States)

    Liu, Kang; Lin, Fang-Tsyr; Graves, Joshua D; Lee, Yu-Ju; Lin, Weei-Chin

    2017-05-09

    Accumulating evidence supports the gain-of-function of mutant forms of p53 (mutp53s). However, whether mutp53 directly perturbs the DNA replication checkpoint remains unclear. Previously, we have demonstrated that TopBP1 forms a complex with mutp53s and mediates their gain-of-function through NF-Y and p63/p73. Akt phosphorylates TopBP1 and induces its oligomerization, which inhibits its ATR-activating function. Here we show that various contact and conformational mutp53s bypass Akt to induce TopBP1 oligomerization and attenuate ATR checkpoint response during replication stress. The effect on ATR response caused by mutp53 can be exploited in a synthetic lethality strategy, as depletion of another ATR activator, DNA2, in mutp53-R273H-expressing cancer cells renders cells hypersensitive to cisplatin. Expression of mutp53-R273H also makes cancer cells more sensitive to DNA2 depletion or DNA2 inhibitors. In addition to ATR-activating function during replication stress, TopBP1 interacts with Treslin in a Cdk-dependent manner to initiate DNA replication during normal growth. We find that mutp53 also interferes with TopBP1 replication function. Several contact, but not conformational, mutp53s enhance the interaction between TopBP1 and Treslin and promote DNA replication despite the presence of a Cdk2 inhibitor. Together, these data uncover two distinct mechanisms by which mutp53 enhances DNA replication: ( i ) Both contact and conformational mutp53s can bind TopBP1 and attenuate the checkpoint response to replication stress, and ( ii ) during normal growth, contact (but not conformational) mutp53s can override the Cdk2 requirement to promote replication by facilitating the TopBP1/Treslin interaction.

  6. Hepatic neuregulin 4 signaling defines an endocrine checkpoint for steatosis-to-NASH progression

    Science.gov (United States)

    Guo, Liang; Chen, Zhimin; Xia, Houjun; Li, Siming; Zhang, Yanqiao; Kobberup, Sune; Zou, Weiping; Lin, Jiandie D.

    2017-01-01

    Nonalcoholic steatohepatitis (NASH) is characterized by progressive liver injury, inflammation, and fibrosis; however, the mechanisms that govern the transition from hepatic steatosis, which is relatively benign, to NASH remain poorly defined. Neuregulin 4 (Nrg4) is an adipose tissue–enriched endocrine factor that elicits beneficial metabolic effects in obesity. Here, we show that Nrg4 is a key component of an endocrine checkpoint that preserves hepatocyte health and counters diet-induced NASH in mice. Nrg4 deficiency accelerated liver injury, fibrosis, inflammation, and cell death in a mouse model of NASH. In contrast, transgenic expression of Nrg4 in adipose tissue alleviated diet-induced NASH. Nrg4 attenuated hepatocyte death in a cell-autonomous manner by blocking ubiquitination and proteasomal degradation of c-FLIPL, a negative regulator of cell death. Adeno-associated virus–mediated (AAV-mediated) rescue of hepatic c-FLIPL expression in Nrg4-deficent mice functionally restored the brake for steatosis to NASH transition. Thus, hepatic Nrg4 signaling serves as an endocrine checkpoint for steatosis-to-NASH progression by activating a cytoprotective pathway to counter stress-induced liver injury. PMID:29106384

  7. Rad9 contribution to radiosensitivity and the G2 checkpoint in a DT40 cell line

    Energy Technology Data Exchange (ETDEWEB)

    Kumano, Tomoyasu [Kanazawa Univ. (Japan). Graduate School of Medical Science

    2002-12-01

    In fission yeast, the rad9 (radiation sensitive) gene was cloned from a mutant that is sensitive to ionizing radiation, ultraviolet and hydroxyurea. This gene has also been shown to be required for a DNA damage checkpoint. Orthologues of the rad9 gene have recently been identified in higher eukaryote cells including human. Here we generated Rad9 knockout (Rad9-/-) cells from the chicken B lymphocyte line DT40 to examine the role of Rad9 in higher eukaryotes. First we isolated a part of the chicken Rad9 gene which was 54% identical with human Rad9 at the amino acid sequence level. Next we isolated genomic clones, determined exons and introns, and constructed targeting vectors designed to disrupt exon 1-3 of the chicken Rad9 gene by replacement with a drug-resistant gene. Successful targeted integration was verified by Southern blot analysis and the disruption of the Rad9 gene was confirmed by reverse transcription polymerase chain reaction (RT-PCR). To analyze the radiosensitivity of these Rad9-/- cells, we monitored the clonogenic survival after various degrees of X-ray irradiation. Rad9-/- cells were more sensitive to X-rays than wild type cells at all dosages. However, these cells were less sensitive than ATM knockout (ATM-/-) cells that are known to be X-ray sensitive and that showed a defective checkpoint control. In contrast, Rad9-/- cells were markedly more sensitive to ultraviolet and hydroxyruea. In addition, we assessed the G2 checkpoint by measurement of the mitotic index that is the fraction of the accumulating number of cells in mitosis at various times after X-ray irradiation. While the number of mitotic wild type cells did not increase until 2 hrs after X-ray irradiation, the number of mitotic Rad9-/- cells showed an increase similar to that of ATM-/- cells. These results suggest that just as in fission yeast, in higher eukaryotes Rad9 also contributes to X-ray, ultraviolet and hydroxyurea sensitivity, and plays an important role in the G2 checkpoint

  8. Rad9 contribution to radiosensitivity and the G2 checkpoint in a DT40 cell line

    International Nuclear Information System (INIS)

    Kumano, Tomoyasu

    2002-01-01

    In fission yeast, the rad9 (radiation sensitive) gene was cloned from a mutant that is sensitive to ionizing radiation, ultraviolet and hydroxyurea. This gene has also been shown to be required for a DNA damage checkpoint. Orthologues of the rad9 gene have recently been identified in higher eukaryote cells including human. Here we generated Rad9 knockout (Rad9-/-) cells from the chicken B lymphocyte line DT40 to examine the role of Rad9 in higher eukaryotes. First we isolated a part of the chicken Rad9 gene which was 54% identical with human Rad9 at the amino acid sequence level. Next we isolated genomic clones, determined exons and introns, and constructed targeting vectors designed to disrupt exon 1-3 of the chicken Rad9 gene by replacement with a drug-resistant gene. Successful targeted integration was verified by Southern blot analysis and the disruption of the Rad9 gene was confirmed by reverse transcription polymerase chain reaction (RT-PCR). To analyze the radiosensitivity of these Rad9-/- cells, we monitored the clonogenic survival after various degrees of X-ray irradiation. Rad9-/- cells were more sensitive to X-rays than wild type cells at all dosages. However, these cells were less sensitive than ATM knockout (ATM-/-) cells that are known to be X-ray sensitive and that showed a defective checkpoint control. In contrast, Rad9-/- cells were markedly more sensitive to ultraviolet and hydroxyruea. In addition, we assessed the G2 checkpoint by measurement of the mitotic index that is the fraction of the accumulating number of cells in mitosis at various times after X-ray irradiation. While the number of mitotic wild type cells did not increase until 2 hrs after X-ray irradiation, the number of mitotic Rad9-/- cells showed an increase similar to that of ATM-/- cells. These results suggest that just as in fission yeast, in higher eukaryotes Rad9 also contributes to X-ray, ultraviolet and hydroxyurea sensitivity, and plays an important role in the G2 checkpoint

  9. T cells in chronic lymphocytic leukemia display dysregulated expression of immune checkpoints and activation markers.

    Science.gov (United States)

    Palma, Marzia; Gentilcore, Giusy; Heimersson, Kia; Mozaffari, Fariba; Näsman-Glaser, Barbro; Young, Emma; Rosenquist, Richard; Hansson, Lotta; Österborg, Anders; Mellstedt, Håkan

    2017-03-01

    Chronic lymphocytic leukemia is characterized by impaired immune functions largely due to profound T-cell defects. T-cell functions also depend on co-signaling receptors, inhibitory or stimulatory, known as immune checkpoints, including cytotoxic T-lymphocyte-associated antigen-4 (CTLA-4) and programmed death-1 (PD-1). Here we analyzed the T-cell phenotype focusing on immune checkpoints and activation markers in chronic lymphocytic leukemia patients (n=80) with different clinical characteristics and compared them to healthy controls. In general, patients had higher absolute numbers of CD3 + cells and the CD8 + subset was particularly expanded in previously treated patients. Progressive patients had higher numbers of CD4 + and CD8 + cells expressing PD-1 compared to healthy controls, which was more pronounced in previously treated patients ( P =0.0003 and P =0.001, respectively). A significant increase in antigen-experienced T cells was observed in patients within both the CD4 + and CD8 + subsets, with a significantly higher PD-1 expression. Higher numbers of CD4 + and CD8 + cells with intracellular CTLA-4 were observed in patients, as well as high numbers of proliferating (Ki67 + ) and activated (CD69 + ) CD4 + and CD8 + cells, more pronounced in patients with active disease. The numbers of Th1, Th2, Th17 and regulatory T cells were substantially increased in patients compared to controls ( P leukemia T cells display increased expression of immune checkpoints, abnormal subset distribution, and a higher proportion of proliferating cells compared to healthy T cells. Disease activity and previous treatment shape the T-cell profile of chronic lymphocytic leukemia patients in different ways. Copyright© Ferrata Storti Foundation.

  10. Requirement for PLK1 kinase activity in the maintenance of a robust spindle assembly checkpoint

    Directory of Open Access Journals (Sweden)

    Aisling O'Connor

    2016-01-01

    Full Text Available During mitotic arrest induced by microtubule targeting drugs, the weakening of the spindle assembly checkpoint (SAC allows cells to progress through the cell cycle without chromosome segregation occurring. PLK1 kinase plays a major role in mitosis and emerging evidence indicates that PLK1 is also involved in establishing the checkpoint and maintaining SAC signalling. However, mechanistically, the role of PLK1 in the SAC is not fully understood, with several recent reports indicating that it can cooperate with either one of the major checkpoint kinases, Aurora B or MPS1. In this study, we assess the role of PLK1 in SAC maintenance. We find that in nocodazole-arrested U2OS cells, PLK1 activity is continuously required for maintaining Aurora B protein localisation and activity at kinetochores. Consistent with published data we find that upon PLK1 inhibition, phosphoThr3-H3, a marker of Haspin activity, is reduced. Intriguingly, Aurora B inhibition causes PLK1 to relocalise from kinetochores into fewer and much larger foci, possibly due to incomplete recruitment of outer kinetochore proteins. Importantly, PLK1 inhibition, together with partial inhibition of Aurora B, allows efficient SAC override to occur. This phenotype is more pronounced than the phenotype observed by combining the same PLK1 inhibitors with partial MPS1 inhibition. We also find that PLK1 inhibition does not obviously cooperate with Haspin inhibition to promote SAC override. These results indicate that PLK1 is directly involved in maintaining efficient SAC signalling, possibly by cooperating in a positive feedback loop with Aurora B, and that partially redundant mechanisms exist which reinforce the SAC.

  11. Drosophila MOF controls Checkpoint protein2 and regulates genomic stability during early embryogenesis.

    Science.gov (United States)

    Pushpavalli, Sreerangam N C V L; Sarkar, Arpita; Ramaiah, M Janaki; Chowdhury, Debabani Roy; Bhadra, Utpal; Pal-Bhadra, Manika

    2013-01-24

    In Drosophila embryos, checkpoints maintain genome stability by delaying cell cycle progression that allows time for damage repair or to complete DNA synthesis. Drosophila MOF, a member of MYST histone acetyl transferase is an essential component of male X hyperactivation process. Until recently its involvement in G2/M cell cycle arrest and defects in ionizing radiation induced DNA damage pathways was not well established. Drosophila MOF is highly expressed during early embryogenesis. In the present study we show that haplo-insufficiency of maternal MOF leads to spontaneous mitotic defects like mitotic asynchrony, mitotic catastrophe and chromatid bridges in the syncytial embryos. Such abnormal nuclei are eliminated and digested in the yolk tissues by nuclear fall out mechanism. MOF negatively regulates Drosophila checkpoint kinase 2 tumor suppressor homologue. In response to DNA damage the checkpoint gene Chk2 (Drosophila mnk) is activated in the mof mutants, there by causing centrosomal inactivation suggesting its role in response to genotoxic stress. A drastic decrease in the fall out nuclei in the syncytial embryos derived from mof¹/+; mnkp⁶/+ females further confirms the role of DNA damage response gene Chk2 to ensure the removal of abnormal nuclei from the embryonic precursor pool and maintain genome stability. The fact that mof mutants undergo DNA damage has been further elucidated by the increased number of single and double stranded DNA breaks. mof mutants exhibited genomic instability as evidenced by the occurance of frequent mitotic bridges in anaphase, asynchronous nuclear divisions, disruption of cytoskeleton, inactivation of centrosomes finally leading to DNA damage. Our findings are consistent to what has been reported earlier in mammals that; reduced levels of MOF resulted in increased genomic instability while total loss resulted in lethality. The study can be further extended using Drosophila as model system and carry out the interaction of MOF

  12. Drosophila MOF controls Checkpoint protein2 and regulates genomic stability during early embryogenesis

    Directory of Open Access Journals (Sweden)

    Pushpavalli Sreerangam NCVL

    2013-01-01

    Full Text Available Abstract Background In Drosophila embryos, checkpoints maintain genome stability by delaying cell cycle progression that allows time for damage repair or to complete DNA synthesis. Drosophila MOF, a member of MYST histone acetyl transferase is an essential component of male X hyperactivation process. Until recently its involvement in G2/M cell cycle arrest and defects in ionizing radiation induced DNA damage pathways was not well established. Results Drosophila MOF is highly expressed during early embryogenesis. In the present study we show that haplo-insufficiency of maternal MOF leads to spontaneous mitotic defects like mitotic asynchrony, mitotic catastrophe and chromatid bridges in the syncytial embryos. Such abnormal nuclei are eliminated and digested in the yolk tissues by nuclear fall out mechanism. MOF negatively regulates Drosophila checkpoint kinase 2 tumor suppressor homologue. In response to DNA damage the checkpoint gene Chk2 (Drosophila mnk is activated in the mof mutants, there by causing centrosomal inactivation suggesting its role in response to genotoxic stress. A drastic decrease in the fall out nuclei in the syncytial embryos derived from mof1/+; mnkp6/+ females further confirms the role of DNA damage response gene Chk2 to ensure the removal of abnormal nuclei from the embryonic precursor pool and maintain genome stability. The fact that mof mutants undergo DNA damage has been further elucidated by the increased number of single and double stranded DNA breaks. Conclusion mof mutants exhibited genomic instability as evidenced by the occurance of frequent mitotic bridges in anaphase, asynchronous nuclear divisions, disruption of cytoskeleton, inactivation of centrosomes finally leading to DNA damage. Our findings are consistent to what has been reported earlier in mammals that; reduced levels of MOF resulted in increased genomic instability while total loss resulted in lethality. The study can be further extended using

  13. Checkpoint Inhibition: Programmed Cell Death 1 and Programmed Cell Death 1 Ligand Inhibitors in Hodgkin Lymphoma.

    Science.gov (United States)

    Villasboas, Jose Caetano; Ansell, Stephen

    2016-01-01

    Hodgkin lymphoma (HL) is a lymphoid malignancy characterized by a reactive immune infiltrate surrounding relatively few malignant cells. In this scenario, active immune evasion seems to play a central role in allowing tumor progression. Immune checkpoint inhibitor pathways are normal mechanisms of T-cell regulation that suppress immune effector function following an antigenic challenge. Hodgkin lymphoma cells are able to escape immune surveillance by co-opting these mechanisms. The programmed cell death 1 (PD-1) pathway in particular is exploited in HL as the malignant Hodgkin and Reed-Sternberg cells express on their surface cognate ligands (PD-L1/L2) for the PD-1 receptor and thereby dampen the T-cell-mediated antitumoral response. Monoclonal antibodies that interact with and disrupt the PD-1:PD-L1/L2 axis have now been developed and tested in early-phase clinical trials in patients with advanced HL with encouraging results. The remarkable clinical activity of PD-1 inhibitors in HL highlights the importance of immune checkpoint pathways as therapeutic targets in HL. In this review, we discuss the rationale for targeting PD-1 and PD-L1 in the treatment of HL. We will evaluate the published clinical data on the different agents and highlight the safety profile of this class of agents. We discuss the available evidence on the use of biomarkers as predictors of response to checkpoint blockade and summarize the areas under active investigation in the use of PD-1/PD-L1 inhibitors for the treatment of HL.

  14. Incorporation of Immune Checkpoint Blockade into Chimeric Antigen Receptor T Cells (CAR-Ts): Combination or Built-In CAR-T.

    Science.gov (United States)

    Yoon, Dok Hyun; Osborn, Mark J; Tolar, Jakub; Kim, Chong Jai

    2018-01-24

    Chimeric antigen receptor (CAR) T cell therapy represents the first U.S. Food and Drug Administration approved gene therapy and these engineered cells function with unprecedented efficacy in the treatment of refractory CD19 positive hematologic malignancies. CAR translation to solid tumors is also being actively investigated; however, efficacy to date has been variable due to tumor-evolved mechanisms that inhibit local immune cell activity. To bolster the potency of CAR-T cells, modulation of the immunosuppressive tumor microenvironment with immune-checkpoint blockade is a promising strategy. The impact of this approach on hematological malignancies is in its infancy, and in this review we discuss CAR-T cells and their synergy with immune-checkpoint blockade.

  15. Incorporation of Immune Checkpoint Blockade into Chimeric Antigen Receptor T Cells (CAR-Ts: Combination or Built-In CAR-T

    Directory of Open Access Journals (Sweden)

    Dok Hyun Yoon

    2018-01-01

    Full Text Available Chimeric antigen receptor (CAR T cell therapy represents the first U.S. Food and Drug Administration approved gene therapy and these engineered cells function with unprecedented efficacy in the treatment of refractory CD19 positive hematologic malignancies. CAR translation to solid tumors is also being actively investigated; however, efficacy to date has been variable due to tumor-evolved mechanisms that inhibit local immune cell activity. To bolster the potency of CAR-T cells, modulation of the immunosuppressive tumor microenvironment with immune-checkpoint blockade is a promising strategy. The impact of this approach on hematological malignancies is in its infancy, and in this review we discuss CAR-T cells and their synergy with immune-checkpoint blockade.

  16. Checkpoint kinase 1-induced phosphorylation of O-linked β-N-acetylglucosamine transferase regulates the intermediate filament network during cytokinesis.

    Science.gov (United States)

    Li, Zhe; Li, Xueyan; Nai, Shanshan; Geng, Qizhi; Liao, Ji; Xu, Xingzhi; Li, Jing

    2017-12-01

    Checkpoint kinase 1 (Chk1) is a kinase instrumental for orchestrating DNA replication, DNA damage checkpoints, the spindle assembly checkpoint, and cytokinesis. Despite Chk1's pivotal role in multiple cellular processes, many of its substrates remain elusive. Here, we identified O- linked β- N -acetylglucosamine ( O -GlcNAc)-transferase (OGT) as one of Chk1's substrates. We found that Chk1 interacts with and phosphorylates OGT at Ser-20, which not only stabilizes OGT, but also is required for cytokinesis. Phospho-specific antibodies of OGT-pSer-20 exhibited specific signals at the midbody of the cell, consistent with midbody localization of OGT as reported previously. Moreover, phospho-deficient OGT (S20A) cells attenuated cellular O -GlcNAcylation levels and also reduced phosphorylation of Ser-71 in the cytoskeletal protein vimentin, a modification critical for severing vimentin filament during cytokinesis. Consequently, elongated vimentin bridges were observed in cells depleted of OGT via an si OGT- based approach. Lastly, expression of plasmids resistant to si OGT efficiently rescued the vimentin bridge phenotype, but the OGT-S20A rescue plasmids did not. Our results suggest a Chk1-OGT-vimentin pathway that regulates the intermediate filament network during cytokinesis. © 2017 by The American Society for Biochemistry and Molecular Biology, Inc.

  17. The Interaction between Checkpoint Kinase 1 (Chk1) and the Minichromosome Maintenance (MCM) Complex Is Required for DNA Damage-induced Chk1 Phosphorylation*

    Science.gov (United States)

    Han, Xiangzi; Aslanian, Aaron; Fu, Kang; Tsuji, Toshiya; Zhang, Youwei

    2014-01-01

    Chk1 is an essential mediator of the DNA damage response and cell cycle checkpoint. However, how exactly Chk1 transduces the checkpoint signaling is not fully understood. Here we report the identification of the heterohexamic minichromosome maintenance (MCM) complex that interacts with Chk1 by mass spectrometry. The interaction between Chk1 and the MCM complex was reduced by DNA damage treatment. We show that the MCM complex, at least partially, contributes to the chromatin association of Chk1, allowing for immediate phosphorylation of Chk1 by ataxia telangiectasia mutated and Rad3-related (ATR) in the presence of DNA damage. Further, phosphorylation of Chk1 at ATR sites reduces the interaction between Chk1 and the MCM complex, facilitating chromatin release of phosphorylated Chk1, a critical step in the initiation and amplification of cell cycle checkpoint. Together, these data provide novel insights into the activation of Chk1 in response to DNA damage. PMID:25049228

  18. Thallium-201 for cardiac stress tests: residual radioactivity worries patients and security.

    Science.gov (United States)

    Geraci, Matthew J; Brown, Norman; Murray, David

    2012-12-01

    A 47-year-old man presented to the Emergency Department (ED) in duress and stated he was "highly radioactive." There were no reports of nuclear disasters, spills, or mishaps in the local area. This report discusses the potential for thallium-201 (Tl-201) patients to activate passive radiation alarms days to weeks after nuclear stress tests, even while shielded inside industrial vehicles away from sensors. Characteristics of Tl-201, as used for medical imaging, are described. This patient was twice detained by Homeland Security Agents and searched after he activated radiation detectors at a seaport security checkpoint. Security agents deemed him not to be a threat, but they expressed concern regarding his health and level of personal radioactivity. The patient was subsequently barred from his job and sent to the hospital. Tl-201 is a widely used radioisotope for medical imaging. The radioactive half-life of Tl-201 is 73.1h, however, reported periods of extended personal radiation have been seen as far out as 61 days post-administration. This case describes an anxious, but otherwise asymptomatic patient presenting to the ED with detection of low-level personal radiation. Documentation should be provided to and carried by individuals receiving radionuclides for a minimum of five to six half-lives of the longest-lasting isotope provided. Patients receiving Tl-201 should understand the potential for security issues; reducing probable tense moments, confusion, and anxiety to themselves, their employers, security officials, and ED staff. Copyright © 2012 Elsevier Inc. All rights reserved.

  19. Immune Checkpoint Inhibitors: An Innovation in Immunotherapy for the Treatment and Management of Patients with Cancer.

    Science.gov (United States)

    Dine, Jennifer; Gordon, RuthAnn; Shames, Yelena; Kasler, Mary Kate; Barton-Burke, Margaret

    2017-01-01

    Cancer survival rates are generally increasing in the United States. These trends have been partially attributed to improvement in therapeutic strategies. Cancer immunotherapy is an example of one of the newer strategies used to fight cancer, which primes or activates the immune system to produce antitumor effects. The first half of this review paper concisely describes the cell mechanisms that control antitumor immunity and the major immunotherapeutic strategies developed to target these mechanisms. The second half of the review discusses in greater depth immune checkpoint inhibitors that have recently demonstrated tremendous promise for the treatment of diverse solid tumor types, including melanoma, non-small cell lung cancer, and others. More specifically, the mechanisms of action, side effects, and patient and family management and education concerns are discussed to provide oncology nurses up-to-date information relevant to caring for cancer-affected patients treated with immune checkpoint inhibitors. Future directions for cancer immunotherapy are considered.

  20. Nucleotide Selectivity at a Preinsertion Checkpoint of T7 RNA Polymerase Transcription Elongation.

    Science.gov (United States)

    E, Chao; Duan, Baogen; Yu, Jin

    2017-04-20

    Nucleotide selection is crucial for transcription fidelity control, in particular, for viral T7 RNA polymerase (RNAP) lack of proofreading activity. It has been recognized that multiple kinetic checkpoints exist prior to full nucleotide incorporation. In this work, we implemented intensive atomistic molecular dynamics (MD) simulations to quantify how strong the nucleotide selection is at the initial checkpoint of an elongation cycle of T7 RNAP. The incoming nucleotides bind into a preinsertion site where a critical tyrosine residue locates nearby to assist the nucleotide selection. We calculated the relative binding free energy between a noncognate nucleotide and a cognate one at a preinsertion configuration via alchemical simulations, showing that a small selection free energy or the binding free energy difference (∼3 k B T) exists between the two nucleotides. Indeed, another preinsertion configuration favored by the noncognate nucleotides was identified, which appears to be off path for further nucleotide insertion and additionally assists the nucleotide selection. By chemical master equation (CME) approach, we show that the small selection free energy at the preinsertion site along with the off-path noncognate nucleotide filtering can help substantially to reduce the error rate and to maintain the elongation rate high in the T7 RNAP transcription.

  1. ProAtlantic - The Atlantic Checkpoint - Data Availability and Adequacy in the Atlantic Basin

    Science.gov (United States)

    McGrath, F.

    2017-12-01

    DG MAREs Atlantic Checkpoint is a basin scale wide monitoring system assessment activity based upon targeted end-user applications. It is designed to be a benchmark for the assessment of hydrographic, geological, habitat, climate and fisheries data existence and availability in the Atlantic basin. DG MAREs Atlantic Checkpoint service will be delivered by the ProAtlantic project. The objective of this project is to investigate, through appropriate methodologies in the framework of 11 key marine challenges, how current international and national data providers - e.g. EMODNet, Copernicus - meet the requirements of the stakeholders and deliver fit for purpose data. By so doing, the main thematic and geographic gaps will be readily identified in the Atlantic basin for future consideration by DG MARE. For each challenge, specific web products in the form of maps, metadata, spreadsheets and reports will be delivered. These products are not an end by themselves but rather a means of showing whether data were available, let alone accessible. For example, the Fisheries Impact Challenge outputs include data grids (VMS/Seabed) and data adequacy reports. Production of gridded data layers in order to show the extent of fisheries impact on the seafloor involved the identification, acquisition and collation of data sources for the required data types (VMS/Seabed/Habitats Data) in the Atlantic basin. The resulting spatial coverage of these grids indicates the relatively low level of data availability and adequacy across the Atlantic basin. Aside from the data delivered by programmes such as EMODNet and Copernicus, there are a lot of initiatives by regional bodies such as OSPAR and ICES that consist of assembling and disseminating data to address specific issues. Several international projects have delivered research, data collection, and networking around several of the Atlantic Checkpoint challenge topics, namely MPAs, renewable energy assessment, seabed mapping, oil spill

  2. Radiation-induced apoptosis and cell cycle checkpoints in human colorectal tumour cell lines

    International Nuclear Information System (INIS)

    Playle, L.C.

    2001-03-01

    The p53 tumour suppressor gene is mutated in 75% of colorectal carcinomas and is critical for DNA damage-induced G1 cell cycle arrest. Data presented in this thesis demonstrate that after treatment with Ionizing Radiation (IR), colorectal tumour cell lines with mutant p53 are unable to arrest at G1 and undergo cell cycle arrest at G2. The staurosporine derivative, UCN-01, was shown to abrogate the IR-induced G2 checkpoint in colorectal tumour cell lines. Furthermore, in some cell lines, abrogation of the G2 checkpoint was associated with radiosensitisation. Data presented in this study demonstrate that 2 out of 5 cell lines with mutant p53 were sensitised to IR by UCN-01. In order to determine whether radiosensitisation correlated with lack of functional p53, transfected derivatives of an adenoma-derived cell line were studied, in which endogenous wild type p53 was disrupted by expression of a dominant negative p53 mutant protein (and with a vector control). In both these cell lines UCN-01 abrogated the G2 arrest however this was not associated with radiosensitisation, indicating that radiosensitisation is a cell type-specific phenomenon. Although 2 colorectal carcinoma cell lines, with mutant p53, were sensitised to IR by UCN-01, the mechanisms of p53-independent IR-induced apoptosis in the colon are essentially unknown. The mitogen-activated protein kinase (MAPK) pathways (that is the JNK, p38 and ERK pathways) have been implicated in apoptosis in a range of cell systems and in IR-induced apoptosis in some cell types. Data presented in this study show that, although the MAPKs can be activated by the known activator anisomycin, there is no evidence of a role for MAPKs in IR-induced apoptosis in colorectal tumour cell lines, regardless of p53 status. In summary, some colorectal tumour cell lines with mutant p53 can be sensitised to IR-induced cell death by G2 checkpoint abrogation and this may be an important treatment strategy, however mechanisms of IR-induced p53

  3. Role of Immune Checkpoint Inhibitors in Small Cell Lung Cancer.

    Science.gov (United States)

    Cooper, Maryann R; Alrajhi, Abdullah M; Durand, Cheryl R

    Small cell lung cancer (SCLC) accounts for approximately 13% of all lung cancer diagnoses each year. SCLC is characterized by a rapid doubling time, early metastatic spread, and an unfavorable prognosis overall. Most patients with SCLC will respond to initial treatment; however, the majority will experience a disease recurrence and response to second-line therapies is poor. Immune checkpoint inhibitors may be an option given the success in other diseases. A literature search was conducted using Medline (1946-July week 1, 2017) and Embase (1996-2017 week 28) with the search terms small cell lung cancer combined with nivolumab or ipilimumab or pembrolizumab or atezolizumab or tremelimumab or durvalumab. Five clinical trials, including extended follow-up for 2, that evaluated immune checkpoint inhibitors in limited stage or extensive stage SCLC were included. In 2 phase 2 trials, ipilimumab was added to upfront chemotherapy. In both trials, an improvement in progression-free survival was seen. Toxicity, when combined with a platinum and etoposide, was significant. In a confirmatory phase 3 trial, ipilimumab did not prolong overall survival when added to first-line chemotherapy. Overall, response rates were similar between the placebo and ipilimumab groups. A phase 1/2 trial evaluated nivolumab alone or in combination with ipilimumab in recurrent SCLC. Results revealed that nivolumab monotherapy and the combination of nivolumab and ipilimumab were relatively safe and had antitumor activity. Pembrolizumab has been evaluated in a multicohort, phase 1b trial. Preliminary data showed a durable response in the second-line setting. Given the lack of overall survival data and significant toxicity associated with the combination of ipilimumab with first-line chemotherapy, this treatment is not a reasonable option at this time. Nivolumab alone or in combination with ipilimumab is a valid option for recurrent SCLC.

  4. A case of pembrolizumab-induced type-1 diabetes mellitus and discussion of immune checkpoint inhibitor-induced type 1 diabetes.

    Science.gov (United States)

    Chae, Young Kwang; Chiec, Lauren; Mohindra, Nisha; Gentzler, Ryan; Patel, Jyoti; Giles, Francis

    2017-01-01

    Immune checkpoint inhibitors such as pembrolizumab, ipilimumab, and nivolumab, now FDA-approved for use in treating several types of cancer, have been associated with immune-related adverse effects. Specifically, the antibodies targeting the programmed-cell death-1 immune checkpoint, pembrolizumab and nivolumab, have been rarely reported to induce the development of type 1 diabetes mellitus. Here we describe a case of a patient who developed antibody-positive type 1 diabetes mellitus following treatment with pembrolizumab in combination with systemic chemotherapy for metastatic adenocarcinoma of the lung. We will also provide a brief literature review of other rarely reported cases of type 1 diabetes presenting after treatment with pembrolizumab and nivolumab, as well as discussion regarding potential mechanisms of this adverse effect and its importance as these drugs continue to become even more widespread.

  5. The Neurospora crassa UVS-3 epistasis group encodes homologues of the ATR/ATRIP checkpoint control system.

    Science.gov (United States)

    Kazama, Yusuke; Ishii, Chizu; Schroeder, Alice L; Shimada, Hisao; Wakabayashi, Michiyoshi; Inoue, Hirokazu

    2008-02-01

    The mutagen sensitive uvs-3 and mus-9 mutants of Neurospora show mutagen and hydroxyurea sensitivity, mutator effects and duplication instability typical of recombination repair and DNA damage checkpoint defective mutants. To determine the nature of these genes we used cosmids from a genomic library to clone the uvs-3 gene by complementation for MMS sensitivity. Mutation induction by transposon insertion and RIP defined the coding sequence. RFLP analysis confirmed that this sequence maps in the area of uvs-3 at the left telomere of LG IV. Analysis of the cDNA showed that the UVS-3 protein contains an ORF of 969 amino acids with one intron. It is homologous to UvsD of Aspergillus nidulans, a member of the ATRIP family of checkpoint proteins. It retains the N' terminal coiled-coil motif followed by four basic amino acids typical of these proteins and shows the highest homology in this region. The uvsD cDNA partially complements the defects of the uvs-3 mutation. The uvs-3 mutant shows a higher level of micronuclei in conidia and failure to halt germination and nuclear division in the presence of hydroxyurea than wild type, suggesting checkpoint defects. ATRIP proteins bind tightly to ATR PI-3 kinase (phosphatidylinositol 3-kinase) proteins. Therefore, we searched the Neurospora genome sequence for homologues of the Aspergillus nidulans ATR, UvsB. A uvsB homologous sequence was present in the right arm of chromosome I where the mus-9 gene maps. A cosmid containing this genomic DNA complemented the mus-9 mutation. The putative MUS-9 protein is 2484 amino acids long with eight introns. Homology is especially high in the C-terminal 350 amino acids that correspond to the PI-3 kinase domain. In wild type a low level of constitutive mRNA is present for both genes. It is transiently induced upon UV exposure.

  6. Wip1 phosphatase is associated with chromatin and dephosphorylates gammaH2AX to promote checkpoint inhibition

    Czech Academy of Sciences Publication Activity Database

    Macůrek, Libor; Lindqvist, A.; Voets, O.; Kool, J.; Vos, H.R.; Medema, R.H.

    2010-01-01

    Roč. 29, č. 15 (2010), s. 2281-2291 ISSN 0950-9232 R&D Projects: GA ČR GPP305/10/P420 Institutional research plan: CEZ:AV0Z50520514 Keywords : DNA damage * checkpoint * phosphatase Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 7.414, year: 2010

  7. Using ergonomics checkpoints to support a participatory ergonomics intervention in an industrially developing country (IDC)--a case study.

    Science.gov (United States)

    Helali, Faramarz

    2009-01-01

    To achieve ergonomics awareness in 3 subsidiary companies, an intervention team was formed. The aims of this study were to implement basic ergonomics through a participatory ergonomics intervention process that can support a continuous learning process and lead to an improvement in health and safety as well as in the work systems in the organization. The findings of this study (i.e., method, continuous learning and integration) were key to making the participatory ergonomics intervention successful. Furthermore, 4 issues of the ergonomics checkpoints (i.e., work schedules, work tasks, healthy work organization and learning) for assessing the work system were found suitable for both changing work schedules and for improving the work system. This paper describes the result of this project and also the experiences gained and the conclusions reached from using the International Labour Office's ergonomics checkpoints in the industries of industrially developing country.

  8. Vaccination targeting human HER3 alters the phenotype of infiltrating T cells and responses to immune checkpoint inhibition.

    Science.gov (United States)

    Osada, Takuya; Morse, Michael A; Hobeika, Amy; Diniz, Marcio A; Gwin, William R; Hartman, Zachary; Wei, Junping; Guo, Hongtao; Yang, Xiao-Yi; Liu, Cong-Xiao; Kaneko, Kensuke; Broadwater, Gloria; Lyerly, H Kim

    2017-01-01

    Expression of human epidermal growth factor family member 3 (HER3), a critical heterodimerization partner with EGFR and HER2, promotes more aggressive biology in breast and other epithelial malignancies. As such, inhibiting HER3 could have broad applicability to the treatment of EGFR- and HER2-driven tumors. Although lack of a functional kinase domain limits the use of receptor tyrosine kinase inhibitors, HER3 contains antigenic targets for T cells and antibodies. Using novel human HER3 transgenic mouse models of breast cancer, we demonstrate that immunization with recombinant adenoviral vectors encoding full length human HER3 (Ad-HER3-FL) induces HER3-specific T cells and antibodies, alters the T cell infiltrate in tumors, and influences responses to immune checkpoint inhibitions. Both preventative and therapeutic Ad-HER3-FL immunization delayed tumor growth but were associated with both intratumoral PD-1 expressing CD8 + T cells and regulatory CD4 + T cell infiltrates. Immune checkpoint inhibition with either anti-PD-1 or anti-PD-L1 antibodies increased intratumoral CD8 + T cell infiltration and eliminated tumor following preventive vaccination with Ad-HER3-FL vaccine. The combination of dual PD-1/PD-L1 and CTLA4 blockade slowed the growth of tumor in response to Ad-HER3-FL in the therapeutic model. We conclude that HER3-targeting vaccines activate HER3-specific T cells and induce anti-HER3 specific antibodies, which alters the intratumoral T cell infiltrate and responses to immune checkpoint inhibition.

  9. Oncogene-induced senescence is part of the tumorigenesis barrier imposed by DNA damage checkpoints

    DEFF Research Database (Denmark)

    Bartkova, Jirina; Rezaei, Nousin; Liontos, Michalis

    2006-01-01

    Recent studies have indicated the existence of tumorigenesis barriers that slow or inhibit the progression of preneoplastic lesions to neoplasia. One such barrier involves DNA replication stress, which leads to activation of the DNA damage checkpoint and thereby to apoptosis or cell cycle arrest...... and senescence markers cosegregate closely. Thus, senescence in human preneoplastic lesions is a manifestation of oncogene-induced DNA replication stress and, together with apoptosis, provides a barrier to malignant progression....

  10. Silencing of poly(ADP-ribose) glycohydrolase sensitizes lung cancer cells to radiation through the abrogation of DNA damage checkpoint

    Energy Technology Data Exchange (ETDEWEB)

    Nakadate, Yusuke [Shien-Lab, National Cancer Center Hospital, 5-1-1 Tsukiji, Chuo-ku, Tokyo 104-0045 (Japan); Department of Bioengineering, Graduate School of Engineering, Osaka City University, 3-3-138 Sugimoto, Sumiyoshi-ku, Osaka 558-8585 (Japan); Kodera, Yasuo; Kitamura, Yuka [Shien-Lab, National Cancer Center Hospital, 5-1-1 Tsukiji, Chuo-ku, Tokyo 104-0045 (Japan); Tachibana, Taro [Department of Bioengineering, Graduate School of Engineering, Osaka City University, 3-3-138 Sugimoto, Sumiyoshi-ku, Osaka 558-8585 (Japan); Tamura, Tomohide [Division of Thoracic Oncology, National Cancer Center Hospital, 5-1-1 Tsukiji, Chuo-ku, Tokyo 104-0045 (Japan); Koizumi, Fumiaki, E-mail: fkoizumi@ncc.go.jp [Division of Thoracic Oncology, National Cancer Center Hospital, 5-1-1 Tsukiji, Chuo-ku, Tokyo 104-0045 (Japan)

    2013-11-29

    Highlights: •Radiosensitization by PARG silencing was observed in multiple lung cancer cells. •PAR accumulation was enhanced by PARG silencing after DNA damage. •Radiation-induced G2/M arrest and checkpoint activation were impaired by PARG siRNA. -- Abstract: Poly(ADP-ribose) glycohydrolase (PARG) is a major enzyme that plays a role in the degradation of poly(ADP-ribose) (PAR). PARG deficiency reportedly sensitizes cells to the effects of radiation. In lung cancer, however, it has not been fully elucidated. Here, we investigated whether PARG siRNA contributes to an increased radiosensitivity using 8 lung cancer cell lines. Among them, the silencing of PARG induced a radiosensitizing effect in 5 cell lines. Radiation-induced G2/M arrest was largely suppressed by PARG siRNA in PC-14 and A427 cells, which exhibited significantly enhanced radiosensitivity in response to PARG knockdown. On the other hand, a similar effect was not observed in H520 cells, which did not exhibit a radiosensitizing effect. Consistent with a cell cycle analysis, radiation-induced checkpoint signals were not well activated in the PC-14 and A427 cells when treated with PARG siRNA. These results suggest that the increased sensitivity to radiation induced by PARG knockdown occurs through the abrogation of radiation-induced G2/M arrest and checkpoint activation in lung cancer cells. Our findings indicate that PARG could be a potential target for lung cancer treatments when used in combination with radiotherapy.

  11. ATM/Wip1 activities at chromatin control Plk1 re-activation to determine G2 checkpoint duration

    Czech Academy of Sciences Publication Activity Database

    Jaiswal, H.; Benada, Jan; Müllers, E.; Akopyan, K.; Burdová, Kamila; Koolmeister, T.; Helleday, T.; Medema, R.H.; Macůrek, Libor; Lindqvist, A.

    2017-01-01

    Roč. 36, č. 14 (2017), s. 2161-2176 ISSN 0261-4189 R&D Projects: GA ČR GA13-18392S Institutional support: RVO:68378050 Keywords : ATM * ATR * checkpoint recovery * G2 * Pik1 Subject RIV: EB - Genetics ; Molecular Biology OBOR OECD: Cell biology Impact factor: 9.792, year: 2016

  12. Structural Biology of the Immune Checkpoint Receptor PD-1 and Its Ligands PD-L1/PD-L2

    NARCIS (Netherlands)

    Zak, Krzysztof M.; Grudnik, Przemyslaw; Magiera, Katarzyna; Dömling, Alexander; Dubin, Grzegorz; Holak, Tad A.

    2017-01-01

    Cancer cells can avoid and suppress immune responses through activation of inhibitory immune checkpoint proteins, such as PD-1, PD-L1, and CTLA-4. Blocking the activities of these proteins with monoclonal antibodies, and thus restoring T cell function, has delivered breakthrough therapies against

  13. Acute inflammatory thyromegaly following checkpoint inhibition: A new imaging entity?

    Directory of Open Access Journals (Sweden)

    Erik H. Middlebrooks, MD

    2018-02-01

    Full Text Available Immune checkpoint blockade (CPB utilizing such agents as ipilimumab, nivolumab, or pembrolizumab has revolutionized melanoma therapy and has seen continued utilization in numerous other malignancies in recent years. However, these agents come at the price of inflammatory immune-related adverse events. Despite the increasing recognition of biochemical thyroid dysfunction associated with CPB, information regarding potential imaging findings is sparse. We describe the first 2 cases of acute thyroiditis following CPB presenting as diffuse thyromegaly documented by computed tomography, ultrasound, and iodine uptake imaging. Given the rise in the use of CPB, it is important for radiologists to recognize potential imaging manifestations of therapy immune-related adverse events to avoid erroneous diagnosis and to prompt the biochemical investigation of thyroid function.

  14. Structural basis of a novel PD-L1 nanobody for immune checkpoint blockade.

    Science.gov (United States)

    Zhang, Fei; Wei, Hudie; Wang, Xiaoxiao; Bai, Yu; Wang, Pilin; Wu, Jiawei; Jiang, Xiaoyong; Wang, Yugang; Cai, Haiyan; Xu, Ting; Zhou, Aiwu

    2017-01-01

    The use of antibodies to target immune checkpoints, particularly PD-1/PD-L1, has made a profound impact in the field of cancer immunotherapy. Here, we identified KN035, an anti-PD-L1 nanobody that can strongly induce T-cell responses and inhibit tumor growth. The crystal structures of KN035 complexed with PD-L1 and free PD-L1, solved here at 1.7 and 2.7 Å resolution, respectively, show that KN035 competes with PD-1 (programmed death protein 1) for the same flat surface on PD-L1, mainly through a single surface loop of 21 amino acids. This loop forms two short helices and develops key hydrophobic and ionic interactions with PD-L1 residues, such as Ile54, Tyr56 and Arg113, which are also involved in PD-1 binding. The detailed mutagenesis study identified the hotspot residues of the PD-L1 surface and provides an explanation for the stronger (~1 000-fold) binding of KN035 to PD-L1 than PD-1 and its lack of binding to PD-L2. Overall, this study reveals how a single immunoglobulin-variable scaffold of KN035 or PD-1 can bind to a flat protein surface through either a single surface loop or beta-sheet strands; and provides a basis for designing new immune checkpoint blockers and generating bi-specific antibodies for combination therapy.

  15. Checkpoint-based forward recovery using lookahead execution and rollback validation in parallel and distributed systems. Ph.D. Thesis, 1992

    Science.gov (United States)

    Long, Junsheng

    1994-01-01

    This thesis studies a forward recovery strategy using checkpointing and optimistic execution in parallel and distributed systems. The approach uses replicated tasks executing on different processors for forwared recovery and checkpoint comparison for error detection. To reduce overall redundancy, this approach employs a lower static redundancy in the common error-free situation to detect error than the standard N Module Redundancy scheme (NMR) does to mask off errors. For the rare occurrence of an error, this approach uses some extra redundancy for recovery. To reduce the run-time recovery overhead, look-ahead processes are used to advance computation speculatively and a rollback process is used to produce a diagnosis for correct look-ahead processes without rollback of the whole system. Both analytical and experimental evaluation have shown that this strategy can provide a nearly error-free execution time even under faults with a lower average redundancy than NMR.

  16. NDR1 modulates the UV-induced DNA-damage checkpoint and nucleotide excision repair

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jeong-Min; Choi, Ji Ye [Department of Biological Science, Dong-A University, Busan (Korea, Republic of); Yi, Joo Mi [Research Center, Dongnam Institute of Radiological & Medical Sciences, Busan (Korea, Republic of); Chung, Jin Woong; Leem, Sun-Hee; Koh, Sang Seok [Department of Biological Science, Dong-A University, Busan (Korea, Republic of); Kang, Tae-Hong, E-mail: thkang@dau.ac.kr [Department of Biological Science, Dong-A University, Busan (Korea, Republic of)

    2015-06-05

    Nucleotide excision repair (NER) is the sole mechanism of UV-induced DNA lesion repair in mammals. A single round of NER requires multiple components including seven core NER factors, xeroderma pigmentosum A–G (XPA–XPG), and many auxiliary effector proteins including ATR serine/threonine kinase. The XPA protein helps to verify DNA damage and thus plays a rate-limiting role in NER. Hence, the regulation of XPA is important for the entire NER kinetic. We found that NDR1, a novel XPA-interacting protein, modulates NER by modulating the UV-induced DNA-damage checkpoint. In quiescent cells, NDR1 localized mainly in the cytoplasm. After UV irradiation, NDR1 accumulated in the nucleus. The siRNA knockdown of NDR1 delayed the repair of UV-induced cyclobutane pyrimidine dimers in both normal cells and cancer cells. It did not, however, alter the expression levels or the chromatin association levels of the core NER factors following UV irradiation. Instead, the NDR1-depleted cells displayed reduced activity of ATR for some set of its substrates including CHK1 and p53, suggesting that NDR1 modulates NER indirectly via the ATR pathway. - Highlights: • NDR1 is a novel XPA-interacting protein. • NDR1 accumulates in the nucleus in response to UV irradiation. • NDR1 modulates NER (nucleotide excision repair) by modulating the UV-induced DNA-damage checkpoint response.

  17. Pch2 acts through Xrs2 and Tel1/ATM to modulate interhomolog bias and checkpoint function during meiosis.

    Directory of Open Access Journals (Sweden)

    Hsuan-Chung Ho

    2011-11-01

    Full Text Available Proper segregation of chromosomes during meiosis requires the formation and repair of double-strand breaks (DSBs to form crossovers. Repair is biased toward using the homolog as a substrate rather than the sister chromatid. Pch2 is a conserved member of the AAA(+-ATPase family of proteins and is implicated in a wide range of meiosis-specific processes including the recombination checkpoint, maturation of the chromosome axis, crossover control, and synapsis. We demonstrate a role for Pch2 in promoting and regulating interhomolog bias and the meiotic recombination checkpoint in response to unprocessed DSBs through the activation of axial proteins Hop1 and Mek1 in budding yeast. We show that Pch2 physically interacts with the putative BRCT repeats in the N-terminal region of Xrs2, a member of the MRX complex that acts at sites of unprocessed DSBs. Pch2, Xrs2, and the ATM ortholog Tel1 function in the same pathway leading to the phosphorylation of Hop1, independent of Rad17 and the ATR ortholog Mec1, which respond to the presence of single-stranded DNA. An N-terminal deletion of Xrs2 recapitulates the pch2Δ phenotypes for signaling unresected breaks. We propose that interaction with Xrs2 may enable Pch2 to remodel chromosome structure adjacent to the site of a DSB and thereby promote accessibility of Hop1 to the Tel1 kinase. In addition, Xrs2, like Pch2, is required for checkpoint-mediated delay conferred by the failure to synapse chromosomes.

  18. The tumor suppressor homolog in fission yeast, myh1+, displays a strong interaction with the checkpoint gene rad1+

    International Nuclear Information System (INIS)

    Jansson, Kristina; Warringer, Jonas; Farewell, Anne; Park, Han-Oh; Hoe, Kwang-Lae; Kim, Dong-Uk; Hayles, Jacqueline; Sunnerhagen, Per

    2008-01-01

    The DNA glycosylase MutY is strongly conserved in evolution, and homologs are found in most eukaryotes and prokaryotes examined. This protein is implicated in repair of oxidative DNA damage, in particular adenine mispaired opposite 7,8-dihydro-8-oxoguanine. Previous investigations in Escherichia coli, fission yeast, and mammalian cells show an association of mutations in MutY homologs with a mutator phenotype and carcinogenesis. Eukaryotic MutY homologs physically associate with several proteins with a role in replication, DNA repair, and checkpoint signaling, specifically the trimeric 9-1-1 complex. In a genetic investigation of the fission yeast MutY homolog, myh1 + , we show that the myh1 mutation confers a moderately increased UV sensitivity alone and in combination with mutations in several DNA repair genes. The myh1 rad1, and to a lesser degree myh1 rad9, double mutants display a synthetic interaction resulting in enhanced sensitivity to DNA damaging agents and hydroxyurea. UV irradiation of myh1 rad1 double mutants results in severe chromosome segregation defects and visible DNA fragmentation, and a failure to activate the checkpoint. Additionally, myh1 rad1 double mutants exhibit morphological defects in the absence of DNA damaging agents. We also found a moderate suppression of the slow growth and UV sensitivity of rhp51 mutants by the myh1 mutation. Our results implicate fission yeast Myh1 in repair of a wider range of DNA damage than previously thought, and functionally link it to the checkpoint pathway

  19. Checkpoint blockade in combination with cancer vaccines.

    Science.gov (United States)

    Morse, Michael A; Lyerly, H Kim

    2015-12-16

    Checkpoint blockade, prevention of inhibitory signaling that limits activation or function of tumor antigen-specific T cells responses, is revolutionizing the treatment of many poor prognosis malignancies. Indeed monoclonal antibodies that modulate signaling through the inhibitory molecules CTLA-4 and PD-1 are now clinically available; however, many tumors, demonstrate minimal response suggesting the need for combinations with other therapeutic strategies. Because an inadequate frequency of activated tumor antigen-specific T cells in the tumor environment, the so-called non-inflamed phenotype, is observed in some malignancies, other rationale partners are modalities that lead to enhanced T cell activation (vaccines, cytokines, toll-like receptor agonists, and other anticancer therapies such as chemo-, radio- or targeted therapies that lead to release of antigen from tumors). This review will focus on preclinical and clinical data supporting the use of cancer vaccines with anti-CTLA-4 and anti-PD-1/PD-L1 antibodies. Preliminary preclinical data demonstrate enhanced antitumor activity although the results in human studies are less clear. Broader combinations of multiple immune modulators are now under study. Copyright © 2015 Elsevier Ltd. All rights reserved.

  20. Immune Checkpoint Molecules on Tumor-Infiltrating Lymphocytes and Their Association with Tertiary Lymphoid Structures in Human Breast Cancer

    Directory of Open Access Journals (Sweden)

    Cinzia Solinas

    2017-10-01

    Full Text Available There is an exponentially growing interest in targeting immune checkpoint molecules in breast cancer (BC, particularly in the triple-negative subtype where unmet treatment needs remain. This study was designed to analyze the expression, localization, and prognostic role of PD-1, PD-L1, PD-L2, CTLA-4, LAG3, and TIM3 in primary BC. Gene expression analysis using the METABRIC microarray dataset found that all six immune checkpoint molecules are highly expressed in basal-like and HER2-enriched compared to the other BC molecular subtypes. Flow cytometric analysis of fresh tissue homogenates from untreated primary tumors show that PD-1 is principally expressed on CD4+ or CD8+ T cells and CTLA-4 is expressed on CD4+ T cells. The global proportion of PD-L1+, PD-L2+, LAG3+, and TIM3+ tumor-infiltrating lymphocytes (TIL was low and detectable in only a small number of tumors. Immunohistochemically staining fixed tissues from the same tumors was employed to score TIL and tertiary lymphoid structures (TLS. PD-L1+, PD-L2+, LAG3+, and TIM3+ cells were detected in some TLS in a pattern that resembles secondary lymphoid organs. This observation suggests that TLS are important sites of immune activation and regulation, particularly in tumors with extensive baseline immune infiltration. Significantly improved overall survival was correlated with PD-1 expression in the HER2-enriched and PD-L1 or CTLA-4 expression in basal-like BC. PD-1 and CTLA-4 proteins were most frequently detected on TIL, which supports the correlations observed between their gene expression and improved long-term outcome in basal-like and HER2-enriched BC. PD-L1 expression by tumor or immune cells is uncommon in BC. Overall, the data presented here distinguish PD-1 as a marker of T cell activity in both the T and B cell areas of BC associated TLS. We found that immune checkpoint molecule expression parallels the extent of TIL and TLS, although there is a noteworthy amount of heterogeneity

  1. A Novel Antagonist of the Immune Checkpoint Protein Adenosine A2a Receptor Restores Tumor-Infiltrating Lymphocyte Activity in the Context of the Tumor Microenvironment

    Directory of Open Access Journals (Sweden)

    Melanie Mediavilla-Varela

    2017-07-01

    Full Text Available BACKGROUND: Therapeutic strategies targeting immune checkpoint proteins have led to significant responses in patients with various tumor types. The success of these studies has led to the development of various antibodies/inhibitors for the different checkpoint proteins involved in immune evasion of the tumor. Adenosine present in high concentrations in the tumor microenvironment activates the immune checkpoint adenosine A2a receptor (A2aR, leading to the suppression of antitumor responses. Inhibition of this checkpoint has the potential to enhance antitumor T-cell responsiveness. METHODS: We developed a novel A2aR antagonist (PBF-509 and tested its antitumor response in vitro, in a mouse model, and in non-small cell lung cancer patient samples. RESULTS: Our studies showed that PBF-509 is highly specific to the A2aR as well as inhibitory of A2aR function in an in vitro model. In a mouse model, we found that lung metastasis was decreased after treatment with PBF-509 compared with its control. Furthermore, freshly resected tumor-infiltrating lymphocytes from lung cancer patients showed increased A2aR expression in CD4+ cells and variable expression in CD8+ cells. Ex vivo studies showed an increased responsiveness of human tumor-infiltrating lymphocytes when PBF-509 was combined with anti-PD-1 or anti-PD-L1. CONCLUSIONS: Our studies demonstrate that inhibition of the A2aR using the novel inhibitor PBF-509 could lead to novel immunotherapeutic strategies in non-small cell lung cancer.

  2. ALDH1A1 maintains ovarian cancer stem cell-like properties by altered regulation of cell cycle checkpoint and DNA repair network signaling.

    Directory of Open Access Journals (Sweden)

    Erhong Meng

    Full Text Available OBJECTIVE: Aldehyde dehydrogenase (ALDH expressing cells have been characterized as possessing stem cell-like properties. We evaluated ALDH+ ovarian cancer stem cell-like properties and their role in platinum resistance. METHODS: Isogenic ovarian cancer cell lines for platinum sensitivity (A2780 and platinum resistant (A2780/CP70 as well as ascites from ovarian cancer patients were analyzed for ALDH+ by flow cytometry to determine its association to platinum resistance, recurrence and survival. A stable shRNA knockdown model for ALDH1A1 was utilized to determine its effect on cancer stem cell-like properties, cell cycle checkpoints, and DNA repair mediators. RESULTS: ALDH status directly correlated to platinum resistance in primary ovarian cancer samples obtained from ascites. Patients with ALDHHIGH displayed significantly lower progression free survival than the patients with ALDHLOW cells (9 vs. 3 months, respectively p<0.01. ALDH1A1-knockdown significantly attenuated clonogenic potential, PARP-1 protein levels, and reversed inherent platinum resistance. ALDH1A1-knockdown resulted in dramatic decrease of KLF4 and p21 protein levels thereby leading to S and G2 phase accumulation of cells. Increases in S and G2 cells demonstrated increased expression of replication stress associated Fanconi Anemia DNA repair proteins (FANCD2, FANCJ and replication checkpoint (pS317 Chk1 were affected. ALDH1A1-knockdown induced DNA damage, evidenced by robust induction of γ-H2AX and BAX mediated apoptosis, with significant increases in BRCA1 expression, suggesting ALDH1A1-dependent regulation of cell cycle checkpoints and DNA repair networks in ovarian cancer stem-like cells. CONCLUSION: This data suggests that ovarian cancer cells expressing ALDH1A1 may maintain platinum resistance by altered regulation of cell cycle checkpoint and DNA repair network signaling.

  3. Characterization of a cancer cell line that expresses a splicing variant form of 53BP1: Separation of checkpoint and repair functions in 53BP1

    International Nuclear Information System (INIS)

    Iwabuchi, Kuniyoshi; Matsui, Tadashi; Hashimoto, Mitsumasa; Matsumoto, Yoshihisa; Kurihara, Takayuki; Date, Takayasu

    2008-01-01

    53BP1 plays important roles in checkpoint signaling and repair for DNA double-strand breaks. We found that a colon cancer cell line, SW48, expressed a splicing variant form of 53BP1, which lacks the residues corresponding to exons 10 and 11. Activation of ATM and phosphorylation of ATM and ATR targets occurred in SW48 cells in response to X-irradiation, and these X-ray-induced responses were not enhanced by expression of full-length 53BP1 in SW48 cells, indicating that this splicing variant fully activates the major checkpoint signaling in SW48 cells. In contrast, the expression of full-length 53BP1 in SW48 cells promoted the repair of X-ray-induced DNA damage, evidenced by faster disappearance of X-ray-induced γ-H2AX foci, a marker for DNA damage, and less residual chromosomal aberrations after X-irradiation. We conclude that the two major roles of 53BP1, the checkpoint signaling and repair for DNA damage, can be functionally separated

  4. Mechanism-based screen for G1/S checkpoint activators identifies a selective activator of EIF2AK3/PERK signalling.

    Science.gov (United States)

    Stockwell, Simon R; Platt, Georgina; Barrie, S Elaine; Zoumpoulidou, Georgia; Te Poele, Robert H; Aherne, G Wynne; Wilson, Stuart C; Sheldrake, Peter; McDonald, Edward; Venet, Mathilde; Soudy, Christelle; Elustondo, Frédéric; Rigoreau, Laurent; Blagg, Julian; Workman, Paul; Garrett, Michelle D; Mittnacht, Sibylle

    2012-01-01

    Human cancers often contain genetic alterations that disable G1/S checkpoint control and loss of this checkpoint is thought to critically contribute to cancer generation by permitting inappropriate proliferation and distorting fate-driven cell cycle exit. The identification of cell permeable small molecules that activate the G1/S checkpoint may therefore represent a broadly applicable and clinically effective strategy for the treatment of cancer. Here we describe the identification of several novel small molecules that trigger G1/S checkpoint activation and characterise the mechanism of action for one, CCT020312, in detail. Transcriptional profiling by cDNA microarray combined with reverse genetics revealed phosphorylation of the eukaryotic initiation factor 2-alpha (EIF2A) through the eukaryotic translation initiation factor 2-alpha kinase 3 (EIF2AK3/PERK) as the mechanism of action of this compound. While EIF2AK3/PERK activation classically follows endoplasmic reticulum (ER) stress signalling that sets off a range of different cellular responses, CCT020312 does not trigger these other cellular responses but instead selectively elicits EIF2AK3/PERK signalling. Phosphorylation of EIF2A by EIF2A kinases is a known means to block protein translation and hence restriction point transit in G1, but further supports apoptosis in specific contexts. Significantly, EIF2AK3/PERK signalling has previously been linked to the resistance of cancer cells to multiple anticancer chemotherapeutic agents, including drugs that target the ubiquitin/proteasome pathway and taxanes. Consistent with such findings CCT020312 sensitizes cancer cells with defective taxane-induced EIF2A phosphorylation to paclitaxel treatment. Our work therefore identifies CCT020312 as a novel small molecule chemical tool for the selective activation of EIF2A-mediated translation control with utility for proof-of-concept applications in EIF2A-centered therapeutic approaches, and as a chemical starting point for

  5. Mad2 binding to Mad1 and Cdc20, rather than oligomerization, is required for the spindle checkpoint

    DEFF Research Database (Denmark)

    Sironi, L; Melixetian, M; Faretta, M

    2001-01-01

    Mad2 is a key component of the spindle checkpoint, a device that controls the fidelity of chromosome segregation in mitosis. The ability of Mad2 to form oligomers in vitro has been correlated with its ability to block the cell cycle upon injection into Xenopus embryos. Here we show that Mad2 forms...

  6. Pemodelan Molekul Turunan p-Metoksi sinnamoil Hidrazida Sebagai Inhibitor Checkpoint Kinase 1 dan Inhibitor Aromatase secara In silico

    Directory of Open Access Journals (Sweden)

    Galih Satrio Putra

    2017-08-01

    Full Text Available The development of anticancer drugs from ethyl p-methoxycinnamate (EPMC derivatives continues to obtain compounds that have high ability of cancer cells apoptosis and minimal side effects. p-Methoxycinnamoyl hydrazide derivate compounds from EPMC structure modification were docked into the ligand-binding pocket of Check point kinase 1 enzymes (2YWP and the aromatase enzyme (3S7S using software Molegro Virtual Docker (MVD Ver.5.5. We compared the Rerank score of native ligand with derivate compounds of p-Methoxycinnamoyl hydrazide. Rerank scores of compounds 4b and 4c (-99.98 Kcal/mol and -99.80 Kcal/mol were lower than the native ligand A42 in inhibiting the enzyme checkpoint kinase 1. Rerank values of p-Methoxycinnamoyl hydrazide derivate compounds were greater than the native ligand EXM in inhibiting the enzyme aromatase. p-Methoxycinnamoyl hydrazide derivate compounds, especially compounds 4b and 4c, had anticancer mechanism by inhibiting the enzyme pathway checkpoint kinase 1 and had not activity in inhibiting the aromatase enzyme.

  7. The human papillomavirus type 58 E7 oncoprotein modulates cell cycle regulatory proteins and abrogates cell cycle checkpoints

    International Nuclear Information System (INIS)

    Zhang Weifang; Li Jing; Kanginakudru, Sriramana; Zhao Weiming; Yu Xiuping; Chen, Jason J.

    2010-01-01

    HPV type 58 (HPV-58) is the third most common HPV type in cervical cancer from Eastern Asia, yet little is known about how it promotes carcinogenesis. In this study, we demonstrate that HPV-58 E7 significantly promoted the proliferation and extended the lifespan of primary human keratinocytes (PHKs). HPV-58 E7 abrogated the G1 and the postmitotic checkpoints, although less efficiently than HPV-16 E7. Consistent with these observations, HPV-58 E7 down-regulated the cellular tumor suppressor pRb to a lesser extent than HPV-16 E7. Similar to HPV-16 E7 expressing PHKs, Cdk2 remained active in HPV-58 E7 expressing PHKs despite the presence of elevated levels of p53 and p21. Interestingly, HPV-58 E7 down-regulated p130 more efficiently than HPV-16 E7. Our study demonstrates a correlation between the ability of down-regulating pRb/p130 and abrogating cell cycle checkpoints by HPV-58 E7, which also correlates with the biological risks of cervical cancer progression associated with HPV-58 infection.

  8. Advanced shortwave infrared and Raman hyperspectral sensors for homeland security and law enforcement operations

    Science.gov (United States)

    Klueva, Oksana; Nelson, Matthew P.; Gardner, Charles W.; Gomer, Nathaniel R.

    2015-05-01

    Proliferation of chemical and explosive threats as well as illicit drugs continues to be an escalating danger to civilian and military personnel. Conventional means of detecting and identifying hazardous materials often require the use of reagents and/or physical sampling, which is a time-consuming, costly and often dangerous process. Stand-off detection allows the operator to detect threat residues from a safer distance minimizing danger to people and equipment. Current fielded technologies for standoff detection of chemical and explosive threats are challenged by low area search rates, poor targeting efficiency, lack of sensitivity and specificity or use of costly and potentially unsafe equipment such as lasers. A demand exists for stand-off systems that are fast, safe, reliable and user-friendly. To address this need, ChemImage Sensor Systems™ (CISS) has developed reagent-less, non-contact, non-destructive sensors for the real-time detection of hazardous materials based on widefield shortwave infrared (SWIR) and Raman hyperspectral imaging (HSI). Hyperspectral imaging enables automated target detection displayed in the form of image making result analysis intuitive and user-friendly. Application of the CISS' SWIR-HSI and Raman sensing technologies to Homeland Security and Law Enforcement for standoff detection of homemade explosives and illicit drugs and their precursors in vehicle and personnel checkpoints is discussed. Sensing technologies include a portable, robot-mounted and standalone variants of the technology. Test data is shown that supports the use of SWIR and Raman HSI for explosive and drug screening at checkpoints as well as screening for explosives and drugs at suspected clandestine manufacturing facilities.

  9. Loss of yeast peroxiredoxin Tsa1p induces genome instability through activation of the DNA damage checkpoint and elevation of dNTP levels.

    Directory of Open Access Journals (Sweden)

    Hei-Man Vincent Tang

    2009-10-01

    Full Text Available Peroxiredoxins are a family of antioxidant enzymes critically involved in cellular defense and signaling. Particularly, yeast peroxiredoxin Tsa1p is thought to play a role in the maintenance of genome integrity, but the underlying mechanism is not understood. In this study, we took a genetic approach to investigate the cause of genome instability in tsa1Delta cells. Strong genetic interactions of TSA1 with DNA damage checkpoint components DUN1, SML1, and CRT1 were found when mutant cells were analyzed for either sensitivity to DNA damage or rate of spontaneous base substitutions. An elevation in intracellular dNTP production was observed in tsa1Delta cells. This was associated with constitutive activation of the DNA damage checkpoint as indicated by phosphorylation of Rad9/Rad53p, reduced steady-state amount of Sml1p, and induction of RNR and HUG1 genes. In addition, defects in the DNA damage checkpoint did not modulate intracellular level of reactive oxygen species, but suppressed the mutator phenotype of tsa1Delta cells. On the contrary, overexpression of RNR1 exacerbated this phenotype by increasing dNTP levels. Taken together, our findings uncover a new role of TSA1 in preventing the overproduction of dNTPs, which is a root cause of genome instability.

  10. The tumor suppressor homolog in fission yeast, myh1{sup +}, displays a strong interaction with the checkpoint gene rad1{sup +}

    Energy Technology Data Exchange (ETDEWEB)

    Jansson, Kristina; Warringer, Jonas; Farewell, Anne [Department of Cell and Molecular Biology, Lundberg Laboratory, Goeteborg University, P.O. Box 462, Goeteborg SE-405 30 (Sweden); Park, Han-Oh [Bioneer Corporation, 49-3, Munpyeong-dong, Daedeok-gu, Daejon 306-220 (Korea, Republic of); Hoe, Kwang-Lae; Kim, Dong-Uk [Functional Genomics Research Center, Korea Research Institute of Bioscience and Biotechnology (KRIBB), Yusong, Daejeon (Korea, Republic of); Hayles, Jacqueline [Cell Cycle Laboratory, Cancer Research UK, London Research Institute, 44 Lincoln' s Inn Fields, London WC2A 3PX (United Kingdom); Sunnerhagen, Per [Department of Cell and Molecular Biology, Lundberg Laboratory, Goeteborg University, P.O. Box 462, Goeteborg SE-405 30 (Sweden)], E-mail: per.sunnerhagen@cmb.gu.se

    2008-09-26

    The DNA glycosylase MutY is strongly conserved in evolution, and homologs are found in most eukaryotes and prokaryotes examined. This protein is implicated in repair of oxidative DNA damage, in particular adenine mispaired opposite 7,8-dihydro-8-oxoguanine. Previous investigations in Escherichia coli, fission yeast, and mammalian cells show an association of mutations in MutY homologs with a mutator phenotype and carcinogenesis. Eukaryotic MutY homologs physically associate with several proteins with a role in replication, DNA repair, and checkpoint signaling, specifically the trimeric 9-1-1 complex. In a genetic investigation of the fission yeast MutY homolog, myh1{sup +}, we show that the myh1 mutation confers a moderately increased UV sensitivity alone and in combination with mutations in several DNA repair genes. The myh1 rad1, and to a lesser degree myh1 rad9, double mutants display a synthetic interaction resulting in enhanced sensitivity to DNA damaging agents and hydroxyurea. UV irradiation of myh1 rad1 double mutants results in severe chromosome segregation defects and visible DNA fragmentation, and a failure to activate the checkpoint. Additionally, myh1 rad1 double mutants exhibit morphological defects in the absence of DNA damaging agents. We also found a moderate suppression of the slow growth and UV sensitivity of rhp51 mutants by the myh1 mutation. Our results implicate fission yeast Myh1 in repair of a wider range of DNA damage than previously thought, and functionally link it to the checkpoint pathway.

  11. Interactions of checkpoint-genes RAD9, RAD17, RAD24 and RAD53 determining radioresistance of Yeast Saccharomyces Cerevisiae

    International Nuclear Information System (INIS)

    Koltovaya, N.A.; Nikulushkina, Yu.V.; Roshchina, M.P.; Devin, A.B.

    2007-01-01

    The mechanisms of genetic control of progress through the division cell cycle (checkpoint-control) in yeast Saccharomyces cerevisiae have been studied intensively. To investigate the role of checkpoint-genes RAD9, RAD17, RAD24, RAD53 in cell radioresistance we have investigated cell sensitivity of double mutants to γ-ray. Double mutants involving various combinations with rad9Δ show epistatic interactions, i.e. the sensitivity of the double mutants to γ-ray was no greater than that of more sensitive of the two single mutants. This suggests that all these genes govern the same pathway. This group of genes was named RAD9-epistasis group. It is interesting to note that the genes RAD9 and RAD53 have positive effect but RAD17 and RAD24 have negative effect on radiosensitivity of yeast cells. Interactions between mutations may differ depending on the agent γ-ray or UV-light, for example mutations rad9Δ and rad24Δ show additive effect for γ-ray and epistatic effect for UV-light

  12. Immune checkpoint inhibitors for non-small-cell lung cancer: does that represent a 'new frontier'?

    Science.gov (United States)

    Pilotto, Sara; Kinspergher, Stefania; Peretti, Umberto; Calio, Anna; Carbognin, Luisa; Ferrara, Roberto; Brunelli, Matteo; Chilosi, Marco; Tortora, Giampaolo; Bria, Emilio

    2015-01-01

    Advances in the interpretation and understanding of cancer behaviour, particularly of its ability to evade the host immunosurveillance, deregulating the balance between inhibitory and stimulatory factors, led to the development of an innovative category of immunotherapeutic agents, currently under investigation. Although the disappointing data deriving from the employment of vaccines in non-small cell lung cancer (NSCLC), more promising results have been obtained in the early phase trials with immune checkpoint inhibitors, such as cytotoxic T-lymphocyte-associated antigen-4 (CTLA-4), programmed cell death protein-1 (PD-1) and programmed death-ligand 1 (PD-L1) inhibitors. This review delineates the main features of the available immunotherapeutic agents, focusing the discussion on immune checkpoint inhibitors, those that have already demonstrated a relevant clinical activity (such as Ipilimumab and Nivolumab) and those molecules still in early development phase. Moreover, we underline the possible emerging issues deriving from the progressive diffusion of Immuno-Oncology into the standard clinical practice. The careful and accurate identification and management of immune-related toxicities, the validation of more reliable immune response criteria and the increasing research of potential predictive biomarkers are key points of discussion. The perspective is that immunotherapy might represent an effective 'magic bullet', able to change the treatment paradigm of NSCLC, particularly of those subgroups featured by a heavily mutant cancer (squamous histology and smokers), where the immunologic agents contribute in cancer development and progression seems to be strong and, concurrently, the efficacy of standard therapies particularly limited.

  13. Strategies to overcome HBV-specific T cell exhaustion: checkpoint inhibitors and metabolic re-programming.

    Science.gov (United States)

    Fisicaro, Paola; Boni, Carolina; Barili, Valeria; Laccabue, Diletta; Ferrari, Carlo

    2018-01-29

    HBV-specific T cells play a key role in antiviral protection and failure to control HBV is associated with severely dysfunctional T cell responses. Therefore, functional T cell reconstitution represents a potential way to treat chronically infected patients. The growing understanding of the dysregulated transcriptional/epigenetic and metabolic programs underlying T cell exhaustion allows to envisage functional T cell reconstitution strategies based on the combined/sequential use of compounds able to induce decline of antigen load, checkpoint modulation, metabolic and epigenetic reprogramming with possible boosting of functionally restored responses by specific vaccines. Copyright © 2018 Elsevier B.V. All rights reserved.

  14. Structure of a Blinkin-BUBR1 complex reveals an interaction crucial for kinetochore-mitotic checkpoint regulation via an unanticipated binding Site

    DEFF Research Database (Denmark)

    Bolanos-Garcia, Victor M; Lischetti, Tiziana; Matak-Vinković, Dijana

    2011-01-01

    The maintenance of genomic stability relies on the spindle assembly checkpoint (SAC), which ensures accurate chromosome segregation by delaying the onset of anaphase until all chromosomes are properly bioriented and attached to the mitotic spindle. BUB1 and BUBR1 kinases are central for this proc...

  15. Immune Checkpoint Inhibitor-Associated Type 1 Diabetes Mellitus: Case Series, Review of the Literature, and Optimal Management

    OpenAIRE

    Kapke, Jonathan; Shaheen, Zachary; Kilari, Deepak; Knudson, Paul; Wong, Stuart

    2017-01-01

    With the introduction of immune checkpoint inhibitors into clinical practice, various autoimmune toxicities have been described. Antibodies targeting the receptor:ligand pairing of programmed death receptor-1 (PD-1) and its cognate ligand programmed death-ligand 1 (PD-L1) in rare reports have been associated with autoimmune diabetes mellitus. We report 2 cases of rapid-onset, insulin-dependent, type 1 diabetes mellitus in the setting of administration of nivolumab, a fully human monoclonal an...

  16. Resistance to checkpoint blockade therapy through inactivation of antigen presentation.

    Science.gov (United States)

    Sade-Feldman, Moshe; Jiao, Yunxin J; Chen, Jonathan H; Rooney, Michael S; Barzily-Rokni, Michal; Eliane, Jean-Pierre; Bjorgaard, Stacey L; Hammond, Marc R; Vitzthum, Hans; Blackmon, Shauna M; Frederick, Dennie T; Hazar-Rethinam, Mehlika; Nadres, Brandon A; Van Seventer, Emily E; Shukla, Sachet A; Yizhak, Keren; Ray, John P; Rosebrock, Daniel; Livitz, Dimitri; Adalsteinsson, Viktor; Getz, Gad; Duncan, Lyn M; Li, Bo; Corcoran, Ryan B; Lawrence, Donald P; Stemmer-Rachamimov, Anat; Boland, Genevieve M; Landau, Dan A; Flaherty, Keith T; Sullivan, Ryan J; Hacohen, Nir

    2017-10-26

    Treatment with immune checkpoint blockade (CPB) therapies often leads to prolonged responses in patients with metastatic melanoma, but the common mechanisms of primary and acquired resistance to these agents remain incompletely characterized and have yet to be validated in large cohorts. By analyzing longitudinal tumor biopsies from 17 metastatic melanoma patients treated with CPB therapies, we observed point mutations, deletions or loss of heterozygosity (LOH) in beta-2-microglobulin (B2M), an essential component of MHC class I antigen presentation, in 29.4% of patients with progressing disease. In two independent cohorts of melanoma patients treated with anti-CTLA4 and anti-PD1, respectively, we find that B2M LOH is enriched threefold in non-responders (~30%) compared to responders (~10%) and associated with poorer overall survival. Loss of both copies of B2M is found only in non-responders. B2M loss is likely a common mechanism of resistance to therapies targeting CTLA4 or PD1.

  17. Mitosis-specific phosphorylation of PML at T409 regulates spindle checkpoint.

    Science.gov (United States)

    Jin, J; Liu, J

    2016-08-31

    During mitosis, Promyelocytic leukemia nuclear bodies (PML NBs) change dramatically in morphology and composition, but little is known about function of PML in mitosis. Here, we show that PML is phosphorylated at T409 (PML p409) in a mitosis-specific manner. More importantly, PML p409 contributes to maintain the duration of pro-metaphase and regulates spindle checkpoint. Deficient PML p409 caused a shortening of pro-metaphase and challenged the nocodazole-triggered mitotic arrest. T409A mutation led to a higher frequency of misaligned chromosomes on metaphase plate, and subsequently death in late mitosis. In addition, inhibition of PML p409 repressed growth of tumor cells, suggesting that PML p409 is a potential target for cancer therapy. Collectively, our study demonstrated an important phosphorylated site of PML, which contributed to explore the role of PML in mitosis.

  18. Immune checkpoint inhibitors and targeted therapies for metastatic melanoma: A network meta-analysis.

    Science.gov (United States)

    Pasquali, Sandro; Chiarion-Sileni, Vanna; Rossi, Carlo Riccardo; Mocellin, Simone

    2017-03-01

    Immune checkpoint inhibitors and targeted therapies, two new class of drugs for treatment of metastatic melanoma, have not been compared in randomized controlled trials (RCT). We quantitatively summarized the evidence and compared immune and targeted therapies in terms of both efficacy and toxicity. A comprehensive search for RCTs of immune checkpoint inhibitors and targeted therapies was conducted to August 2016. Using a network meta-analysis approach, treatments were compared with each other and ranked based on their effectiveness (as measured by the impact on progression-free survival [PFS]) and acceptability (the inverse of high grade toxicity). Twelve RCTs enrolling 6207 patients were included. Network meta-analysis generated 15 comparisons. Combined BRAF and MEK inhibitors were associated with longer PFS as compared to anti-CTLA4 (HR: 0.22; 95% confidence interval [CI]: 0.12-0.41) and anti-PD1 antibodies alone (HR: 0.38; CI: 0.20-0.72). However, anti-PD1 monoclonal antibodies were less toxic than anti-CTLA4 monoclonal antibodies (RR: 0.65; CI: 0.40-0.78) and their combination significantly increased toxicity compared to either single agent anti-CTLA4 (RR: 2.06; CI: 1.45-2.93) or anti-PD1 monoclonal antibodies (RR: 3.67; CI: 2.27-5.96). Consistently, ranking analysis suggested that the combination of targeted therapies is the most effective strategy, whereas single agent anti-PD1 antibodies have the best acceptability. The GRADE level of evidence quality for these findings was moderate to low. The simultaneous inhibition of BRAF and MEK appears the most effective treatment for melanomas harboring BRAF V600 mutation, although anti-PD1 antibodies appear to be less toxic. Further research is needed to increase the quality of evidence. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Alterations of the spindle checkpoint pathway in clinicopathologically aggressive CpG island methylator phenotype clear cell renal cell carcinomas.

    Science.gov (United States)

    Arai, Eri; Gotoh, Masahiro; Tian, Ying; Sakamoto, Hiromi; Ono, Masaya; Matsuda, Akio; Takahashi, Yoriko; Miyata, Sayaka; Totsuka, Hirohiko; Chiku, Suenori; Komiyama, Motokiyo; Fujimoto, Hiroyuki; Matsumoto, Kenji; Yamada, Tesshi; Yoshida, Teruhiko; Kanai, Yae

    2015-12-01

    CpG-island methylator phenotype (CIMP)-positive clear cell renal cell carcinomas (RCCs) are characterized by accumulation of DNA hypermethylation of CpG islands, clinicopathological aggressiveness and poor patient outcome. The aim of this study was to clarify the molecular pathways participating in CIMP-positive renal carcinogenesis. Genome (whole-exome and copy number), transcriptome and proteome (two-dimensional image converted analysis of liquid chromatography-mass spectrometry) analyses were performed using tissue specimens of 87 CIMP-negative and 14 CIMP-positive clear cell RCCs and corresponding specimens of non-cancerous renal cortex. Genes encoding microtubule-associated proteins, such as DNAH2, DNAH5, DNAH10, RP1 and HAUS8, showed a 10% or higher incidence of genetic aberrations (non-synonymous single-nucleotide mutations and insertions/deletions) in CIMP-positive RCCs, whereas CIMP-negative RCCs lacked distinct genetic characteristics. MetaCore pathway analysis of CIMP-positive RCCs revealed that alterations of mRNA or protein expression were significantly accumulated in six pathways, all participating in the spindle checkpoint, including the "The metaphase checkpoint (p = 1.427 × 10(-6))," "Role of Anaphase Promoting Complex in cell cycle regulation (p = 7.444 × 10(-6))" and "Spindle assembly and chromosome separation (p = 9.260 × 10(-6))" pathways. Quantitative RT-PCR analysis revealed that mRNA expression levels for genes included in such pathways, i.e., AURKA, AURKB, BIRC5, BUB1, CDC20, NEK2 and SPC25, were significantly higher in CIMP-positive than in CIMP-negative RCCs. All CIMP-positive RCCs showed overexpression of Aurora kinases, AURKA and AURKB, and this overexpression was mainly attributable to increased copy number. These data suggest that abnormalities of the spindle checkpoint pathway participate in CIMP-positive renal carcinogenesis, and that AURKA and AURKB may be potential therapeutic targets in more aggressive CIMP-positive RCCs.

  20. Multicenter Evaluation of the Tolerability of Combined Treatment With PD-1 and CTLA-4 Immune Checkpoint Inhibitors and Palliative Radiation Therapy

    Energy Technology Data Exchange (ETDEWEB)

    Bang, Andrew [Department of Radiation Oncology, Brigham and Women' s Hospital/Dana-Farber Cancer Institute, Boston, Massachusetts (United States); Division of Radiation Oncology, University of Ottawa, Ottawa, Ontario (Canada); Wilhite, Tyler J. [Harvard Medical School, Boston, Massachusetts (United States); Pike, Luke R.G. [Harvard Radiation Oncology Program, Brigham and Women' s Hospital/Dana-Farber Cancer Institute, Boston, Massachusetts (United States); Cagney, Daniel N.; Aizer, Ayal A.; Taylor, Allison; Spektor, Alexander; Krishnan, Monica [Department of Radiation Oncology, Brigham and Women' s Hospital/Dana-Farber Cancer Institute, Boston, Massachusetts (United States); Ott, Patrick A. [Department of Medical Oncology and Center for Immuno-Oncology, Dana-Farber Cancer Institute, Boston, Massachusetts (United States); Balboni, Tracy A. [Department of Radiation Oncology, Brigham and Women' s Hospital/Dana-Farber Cancer Institute, Boston, Massachusetts (United States); Hodi, F. Stephen [Department of Medical Oncology and Center for Immuno-Oncology, Dana-Farber Cancer Institute, Boston, Massachusetts (United States); Schoenfeld, Jonathan D., E-mail: jdschoenfeld@partners.org [Department of Radiation Oncology, Brigham and Women' s Hospital/Dana-Farber Cancer Institute, Boston, Massachusetts (United States)

    2017-06-01

    Purpose: To analyze immune-related adverse events (ir-AEs) in patients treated with radiation and immune checkpoint blockade. Methods and Materials: We retrospectively reviewed records from patients with metastatic non-small cell lung cancer, melanoma, or renal cell cancer who received at least 1 cycle of a CTLA-4 or PD-1 inhibitor and radiation. Immune-related adverse events, defined using Common Terminology Criteria for Adverse Events version 4.0, were tabulated in relation to treatment variables, and associations with sequencing and timing were assessed. Results: We identified 133 patients, of whom 28 received a CTLA-4 inhibitor alone, 88 received a PD-1 inhibitor alone, and 17 received both classes of inhibitors either sequentially (n=13) or concurrently (n=4). Fifty-six patients received radiation within 14 days of an immune checkpoint inhibitor. Forty-six patients experienced at least 1 ir-AE (34.6%). Patients receiving both CTLA-4 and PD-1 inhibitors experienced more any-grade ir-AEs as compared with either individually (71% vs 29%, P=.0008). Any-grade ir-AEs occurred in 39% of patients in whom radiation was administered within 14 days of immunotherapy, compared with 23% of other patients (P=.06) and more often in patients who received higher equivalent dose in 2-Gy fractions (EQD2) EQD2 (P=.01). However, most toxicities were mild. There were no associations between site irradiated and specific ir-AEs. Conclusions: Our data suggest the combination of focal palliative radiation and CTLA-4 and/or PD-1 inhibitors is well tolerated, with manageable ir-AEs that did not seem to be associated with the particular site irradiated. Although conclusions are limited by the heterogeneity of patients and treatments, and future confirmatory studies are needed, this information can help guide clinical practice for patients receiving immune checkpoint therapy who require palliative radiation therapy.

  1. The Fluke Security Project

    Science.gov (United States)

    2000-04-01

    be an extension of Utah’s nascent Quarks system, oriented to closely coupled cluster environments. However, the grant did not actually begin until... Intel x86, implemented ten virtual machine monitors and servers, including a virtual memory manager, a checkpointer, a process manager, a file server...Fluke, we developed a novel hierarchical processor scheduling frame- work called CPU inheritance scheduling [5]. This is a framework for scheduling

  2. The Checkpoint Kinase 1 Inhibitor Prexasertib Induces Regression of Preclinical Models of Human Neuroblastoma.

    Science.gov (United States)

    Lowery, Caitlin D; VanWye, Alle B; Dowless, Michele; Blosser, Wayne; Falcon, Beverly L; Stewart, Julie; Stephens, Jennifer; Beckmann, Richard P; Bence Lin, Aimee; Stancato, Louis F

    2017-08-01

    Purpose: Checkpoint kinase 1 (CHK1) is a key regulator of the DNA damage response and a mediator of replication stress through modulation of replication fork licensing and activation of S and G 2 -M cell-cycle checkpoints. We evaluated prexasertib (LY2606368), a small-molecule CHK1 inhibitor currently in clinical testing, in multiple preclinical models of pediatric cancer. Following an initial assessment of prexasertib activity, this study focused on the preclinical models of neuroblastoma. Experimental Design: We evaluated the antiproliferative activity of prexasertib in a panel of cancer cell lines; neuroblastoma cell lines were among the most sensitive. Subsequent Western blot and immunofluorescence analyses measured DNA damage and DNA repair protein activation. Prexasertib was investigated in several cell line-derived xenograft mouse models of neuroblastoma. Results: Within 24 hours, single-agent prexasertib promoted γH2AX-positive double-strand DNA breaks and phosphorylation of DNA damage sensors ATM and DNA-PKcs, leading to neuroblastoma cell death. Knockdown of CHK1 and/or CHK2 by siRNA verified that the double-strand DNA breaks and cell death elicited by prexasertib were due to specific CHK1 inhibition. Neuroblastoma xenografts rapidly regressed following prexasertib administration, independent of starting tumor volume. Decreased Ki67 and increased immunostaining of endothelial and pericyte markers were observed in xenografts after only 6 days of exposure to prexasertib, potentially indicating a swift reduction in tumor volume and/or a direct effect on tumor vasculature. Conclusions: Overall, these data demonstrate that prexasertib is a specific inhibitor of CHK1 in neuroblastoma and leads to DNA damage and cell death in preclinical models of this devastating pediatric malignancy. Clin Cancer Res; 23(15); 4354-63. ©2017 AACR . ©2017 American Association for Cancer Research.

  3. Akt Kinase-Mediated Checkpoint of cGAS DNA Sensing Pathway

    Directory of Open Access Journals (Sweden)

    Gil Ju Seo

    2015-10-01

    Full Text Available Upon DNA stimulation, cyclic GMP-AMP synthase (cGAS synthesizes the second messenger cyclic GMP-AMP (cGAMP that binds to the STING, triggering antiviral interferon-β (IFN-β production. However, it has remained undetermined how hosts regulate cGAS enzymatic activity after the resolution of DNA immunogen. Here, we show that Akt kinase plays a negative role in cGAS-mediated anti-viral immune response. Akt phosphorylated the S291 or S305 residue of the enzymatic domain of mouse or human cGAS, respectively, and this phosphorylation robustly suppressed its enzymatic activity. Consequently, expression of activated Akt led to the reduction of cGAMP and IFN-β production and the increase of herpes simplex virus 1 replication, whereas treatment with Akt inhibitor augmented cGAS-mediated IFN-β production. Furthermore, expression of the phosphorylation-resistant cGAS S291A mutant enhanced IFN-β production upon DNA stimulation, HSV-1 infection, and vaccinia virus infection. Our study identifies an Akt kinase-mediated checkpoint to fine-tune hosts’ immune responses to DNA stimulation.

  4. The Aurora B kinase in chromosome biorientation and spindle checkpoint signalling

    Directory of Open Access Journals (Sweden)

    Veronica eKrenn

    2015-10-01

    Full Text Available Aurora B, a member of the Aurora family of serine/threonine protein kinases, is a key player in chromosome segregation. As part of a macromolecular complex known as the chromosome passenger complex, Aurora B concentrates early during mitosis in the proximity of centromeres and kinetochores, the sites of attachment of chromosomes to spindle microtubules. There, it contributes to a number of processes that impart fidelity to cell division, including kinetochore stabilization, kinetochore-microtubule attachment, and the regulation of a surveillance mechanism named the spindle assembly checkpoint. In the regulation of these processes, Aurora B is the fulcrum of a remarkably complex network of interactions that feed back on its localization and activation state. In this review we discuss the multiple roles of Aurora B during mitosis, focusing in particular on its role at centromeres and kinetochores. Many details of the network of interactions at these locations remain poorly understood, and we focus here on several crucial outstanding questions.

  5. Aurora-B Mediated ATM Serine 1403 Phosphorylation Is Required For Mitotic ATM Activation and the Spindle Checkpoint

    OpenAIRE

    Yang, Chunying; Tang, Xi; Guo, Xiaojing; Niikura, Yohei; Kitagawa, Katsumi; Cui, Kemi; Wong, Stephen T.C.; Fu, Li; Xu, Bo

    2011-01-01

    The ATM kinase plays a critical role in the maintenance of genetic stability. ATM is activated in response to DNA damage and is essential for cell cycle checkpoints. Here, we report that ATM is activated in mitosis in the absence of DNA damage. We demonstrate that mitotic ATM activation is dependent on the Aurora-B kinase and that Aurora-B phosphorylates ATM on serine 1403. This phosphorylation event is required for mitotic ATM activation. Further, we show that loss of ATM function results in...

  6. Characterization of a putative spindle assembly checkpoint kinase Mps1, suggests its involvement in cell division, morphogenesis and oxidative stress tolerance in Candida albicans.

    Directory of Open Access Journals (Sweden)

    Mohan Kamthan

    Full Text Available In Saccharomyces cerevisiae MPS1 is one of the major protein kinase that governs the spindle checkpoint pathway. The S. cerevisiae structural homolog of opportunistic pathogen Candida albicans CaMPS1, is indispensable for the cell viability. The essentiality of Mps1 was confirmed by Homozygote Trisome test. To determine its biological function in this pathogen conditional mutant was generated through regulatable MET3 promoter. Examination of heterozygous and conditional (+Met/Cys mps1 mutants revealed a mitosis specific arrest phenotype, where mutants showed large buds with undivided nuclei. Flowcytometry analysis revealed abnormal ploidy levels in mps1 mutant. In presence of anti-microtubule drug Nocodazole, mps1 mutant showed a dramatic loss of viability suggesting a role of Mps1 in Spindle Assembly Checkpoint (SAC activation. These mutants were also defective in microtubule organization. Moreover, heterozygous mutant showed defective in-vitro yeast to hyphae morphological transition. Growth defect in heterozygous mutant suggest haploinsufficiency of this gene. qRT PCR analysis showed around 3 fold upregulation of MPS1 in presence of serum. This expression of MPS1 is dependent on Efg1 and is independent of other hyphal regulators like Ras1 and Tpk2. Furthermore, mps1 mutants were also sensitive to oxidative stress. Heterozygous mps1 mutant did not undergo morphological transition and showed 5-Fold reduction in colony forming units in response to macrophage. Thus, the vital checkpoint kinase, Mps1 besides cell division also has a role in morphogenesis and oxidative stress tolerance, in this pathogenic fungus.

  7. An Archaeosome-Adjuvanted Vaccine and Checkpoint Inhibitor Therapy Combination Significantly Enhances Protection from Murine Melanoma

    Directory of Open Access Journals (Sweden)

    Felicity C. Stark

    2017-10-01

    Full Text Available Archaeosomes constitute archaeal lipid vesicle vaccine adjuvants that evoke a strong CD8+ T cell response to antigenic cargo. Therapeutic treatment of murine B16-ovalbumin (B16-OVA melanoma with archaeosome-OVA eliminates small subcutaneous solid tumors; however, they eventually resurge despite an increased frequency of circulating and tumor infiltrating OVA-CD8+ T cells. Herein, a number of different approaches were evaluated to improve responses, including dose number, interval, and the combination of vaccine with checkpoint inhibitors. Firstly, we found that tumor protection could not be enhanced by repetitive and/or delayed boosting to maximize the CD8+ T cell number and/or phenotype. The in vivo cytotoxicity of vaccine-induced OVA-CD8+ T cells was impaired in tumor-bearing mice. Additionally, tumor-infiltrating OVA-CD8+ T cells had an increased expression of programmed cell death protein-1 (PD-1 compared to other organ compartments, suggesting impaired function. Combination therapy of tumor-bearing mice with the vaccine archaeosome-OVA, and α-CTLA-4 administered concurrently as well as α-PD-1 and an α-PD-L1 antibody administered starting 9 days after tumor challenge given on a Q3Dx4 schedule (days 9, 12, 15 and 18, significantly enhanced survival. Following multi-combination therapy ~70% of mice had rapid tumor recession, with no detectable tumor mass after >80 days in comparison to a median survival of 17–22 days for untreated or experimental groups receiving single therapies. Overall, archaeosomes offer a powerful platform for delivering cancer antigens when used in combination with checkpoint inhibitor immunotherapies.

  8. Disruption of murine mp29/Syf2/Ntc31 gene results in embryonic lethality with aberrant checkpoint response.

    Directory of Open Access Journals (Sweden)

    Chia-Hsin Chen

    Full Text Available Human p29 is a putative component of spliceosomes, but its role in pre-mRNA is elusive. By siRNA knockdown and stable overexpression, we demonstrated that human p29 is involved in DNA damage response and Fanconi anemia pathway in cultured cells. In this study, we generated p29 knockout mice (mp29(GT/GT using the mp29 gene trap embryonic stem cells to study the role of mp29 in DNA damage response in vivo. Interruption of mp29 at both alleles resulted in embryonic lethality. Embryonic abnormality occurred as early as E6.5 in mp29(GT/GT mice accompanied with decreased mRNA levels of α-tubulin and Chk1. The reduction of α-tubulin and Chk1 mRNAs is likely due to an impaired post-transcriptional event. An aberrant G2/M checkpoint was found in mp29 gene trap embryos when exposed to aphidicolin and UV light. This embryonic lethality was rescued by crossing with mp29 transgenic mice. Additionally, the knockdown of zfp29 in zebrafish resulted in embryonic death at 72 hours of development postfertilization (hpf. A lower level of acetylated α-tubulin was also observed in zfp29 morphants. Together, these results illustrate an indispensable role of mp29 in DNA checkpoint response during embryonic development.

  9. Monitoring of scrap loads at Gorzia border checkpoints: A thirty months experience and some suggestions

    International Nuclear Information System (INIS)

    Fabretto, M.

    1999-01-01

    The following topics are highlighted: personnel training, assistance from foreign scrap suppliers, and computerized database. It is suggested that when selecting personnel for this job, major attention should be paid to their attitudes; the personnel should be given very good training, teaching them also how to make controls manually; expert physicist' support should be available within a very short time; each monitoring checkpoint should have its local electronic database; periodical exchange and updating of information should be practised on the standardization of methods of detection, of levels of attention and alarm, of statistics among the people in charge of EU and non-EU countries. (P.A.)

  10. Arabidopsis ARGONAUTE7 selects miR390 through multiple checkpoints during RISC assembly.

    Science.gov (United States)

    Endo, Yayoi; Iwakawa, Hiro-oki; Tomari, Yukihide

    2013-07-01

    Plant ARGONAUTE7 (AGO7) assembles RNA-induced silencing complex (RISC) specifically with miR390 and regulates the auxin-signalling pathway via production of TAS3 trans-acting siRNAs (tasiRNAs). However, how AGO7 discerns miR390 among other miRNAs remains unclear. Here, we show that the 5' adenosine of miR390 and the central region of miR390/miR390* duplex are critical for the specific interaction with AGO7. Furthermore, despite the existence of mismatches in the seed and central regions of the duplex, cleavage of the miR390* strand is required for maturation of AGO7-RISC. These findings suggest that AGO7 uses multiple checkpoints to select miR390, thereby circumventing promiscuous tasiRNA production.

  11. Fission yeast strains with circular chromosomes require the 9-1-1 checkpoint complex for the viability in response to the anti-cancer drug 5-fluorodeoxyuridine.

    Directory of Open Access Journals (Sweden)

    Hossain Mohammad Shamim

    Full Text Available Thymidine kinase converts 5-fluorodeoxyuridine to 5-fluorodeoxyuridine monophosphate, which causes disruption of deoxynucleotide triphosphate ratios. The fission yeast Schizosaccharomyces pombe does not express endogenous thymidine kinase but 5-fluorodeoxyuridine inhibits growth when exogenous thymidine kinase is expressed. Unexpectedly, we found that 5-fluorodeoxyuridine causes S phase arrest even without thymidine kinase expression. DNA damage checkpoint proteins such as the 9-1-1 complex were required for viability in the presence of 5-fluorodeoxyuridine. We also found that strains with circular chromosomes, due to loss of pot1+, which have higher levels of replication stress, were more sensitive to loss of the 9-1-1 complex in the presence of 5-fluorodeoxyuridine. Thus, our results suggest that strains carrying circular chromosomes exhibit a greater dependence on DNA damage checkpoints to ensure viability in the presence of 5-fluorodeoxyuridine compared to stains that have linear chromosomes.

  12. Fission yeast strains with circular chromosomes require the 9-1-1 checkpoint complex for the viability in response to the anti-cancer drug 5-fluorodeoxyuridine.

    Science.gov (United States)

    Shamim, Hossain Mohammad; Minami, Yukako; Tanaka, Daiki; Ukimori, Shinobu; Murray, Johanne M; Ueno, Masaru

    2017-01-01

    Thymidine kinase converts 5-fluorodeoxyuridine to 5-fluorodeoxyuridine monophosphate, which causes disruption of deoxynucleotide triphosphate ratios. The fission yeast Schizosaccharomyces pombe does not express endogenous thymidine kinase but 5-fluorodeoxyuridine inhibits growth when exogenous thymidine kinase is expressed. Unexpectedly, we found that 5-fluorodeoxyuridine causes S phase arrest even without thymidine kinase expression. DNA damage checkpoint proteins such as the 9-1-1 complex were required for viability in the presence of 5-fluorodeoxyuridine. We also found that strains with circular chromosomes, due to loss of pot1+, which have higher levels of replication stress, were more sensitive to loss of the 9-1-1 complex in the presence of 5-fluorodeoxyuridine. Thus, our results suggest that strains carrying circular chromosomes exhibit a greater dependence on DNA damage checkpoints to ensure viability in the presence of 5-fluorodeoxyuridine compared to stains that have linear chromosomes.

  13. Attenuation of G2 cell cycle checkpoint control in human tumor cells is associated with increased frequencies of unrejoined chromosome breaks but not increased cytotoxicity following radiation exposure

    International Nuclear Information System (INIS)

    Schwartz, J.L.; Cowan, J.; Grdina, D.J.

    1997-01-01

    The contribution of G 2 cell cycle checkpoint control to ionizing radiation responses was examined in ten human tumor cell lines. Most of the delay in cell cycle progression seen in the first cell cycle following radiation exposure was due to blocks in G 2 and there were large cell line-to-cell line variations in the length of the G 2 block. Longer delays were seen in cell lines that had mutations in p53. There was a highly significant inverse correlation between the length of G 2 delay and the frequency of unrejoined chromosome breaks seen as chromosome terminal deletions in mitosis, and observation that supports the hypothesis that the signal for G 2 delay in mammalian cells is an unrejoined chromosome break. There were also an inverse correlation between the length of G 2 delay and the level of chromosome aneuploidy in each cell line, suggesting that the G 2 and mitotic spindel checkpoints may be linked to each other. Attenuation in G 2 checkpoint control was not associated with alterations in either the frequency of induced chromosome rearrangements or cell survival following radiation exposure suggesting that chromosome rearrangements, the major radiation-induced lethal lesion in tumor cells, form before cells enters G 2 . Thus, agents that act solely to override G 2 arrest should produce little radiosensitization in human tumor cells

  14. Akt Kinase-Mediated Checkpoint of cGAS DNA Sensing Pathway.

    Science.gov (United States)

    Seo, Gil Ju; Yang, Aerin; Tan, Brandon; Kim, Sungyoon; Liang, Qiming; Choi, Younho; Yuan, Weiming; Feng, Pinghui; Park, Hee-Sung; Jung, Jae U

    2015-10-13

    Upon DNA stimulation, cyclic GMP-AMP synthase (cGAS) synthesizes the second messenger cyclic GMP-AMP (cGAMP) that binds to the STING, triggering antiviral interferon-β (IFN-β) production. However, it has remained undetermined how hosts regulate cGAS enzymatic activity after the resolution of DNA immunogen. Here, we show that Akt kinase plays a negative role in cGAS-mediated anti-viral immune response. Akt phosphorylated the S291 or S305 residue of the enzymatic domain of mouse or human cGAS, respectively, and this phosphorylation robustly suppressed its enzymatic activity. Consequently, expression of activated Akt led to the reduction of cGAMP and IFN-β production and the increase of herpes simplex virus 1 replication, whereas treatment with Akt inhibitor augmented cGAS-mediated IFN-β production. Furthermore, expression of the phosphorylation-resistant cGAS S291A mutant enhanced IFN-β production upon DNA stimulation, HSV-1 infection, and vaccinia virus infection. Our study identifies an Akt kinase-mediated checkpoint to fine-tune hosts' immune responses to DNA stimulation. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  15. 75 FR 57811 - Notice of Intent To Prepare an Environmental Assessment and Scoping; President's Park South...

    Science.gov (United States)

    2010-09-22

    ..., concrete planters and standing canine vehicles. These security elements, while effective, are visually... security elements that are both durable and more aesthetic at the vehicle checkpoints and along the street... considered by both the NPS and USSS. The date for the public meeting will be announced through the news media...

  16. DW-MRI as a Predictive Biomarker of Radiosensitization of GBM through Targeted Inhibition of Checkpoint Kinases.

    Science.gov (United States)

    Williams, Terence M; Galbán, Stefanie; Li, Fei; Heist, Kevin A; Galbán, Craig J; Lawrence, Theodore S; Holland, Eric C; Thomae, Tami L; Chenevert, Thomas L; Rehemtulla, Alnawaz; Ross, Brian D

    2013-04-01

    The inherent treatment resistance of glioblastoma (GBM) can involve multiple mechanisms including checkpoint kinase (Chk1/2)-mediated increased DNA repair capability, which can attenuate the effects of genotoxic chemotherapies and radiation. The goal of this study was to evaluate diffusion-weighted magnetic resonance imaging (DW-MRI) as a biomarker for Chk1/2 inhibitors in combination with radiation for enhancement of treatment efficacy in GBM. We evaluated a specific small molecule inhibitor of Chk1/2, AZD7762, in combination with radiation using in vitro human cell lines and in vivo using a genetically engineered GBM mouse model. DW-MRI and T1-contrast MRI were used to follow treatment effects on intracranial tumor cellularity and growth rates, respectively. AZD7762 inhibited clonal proliferation in a panel of GBM cell lines and increased radiosensitivity in p53-mutated GBM cell lines to a greater extent compared to p53 wild-type cells. In vivo efficacy of AZD7762 demonstrated a dose-dependent inhibitory effect on GBM tumor growth rate and a reduction in tumor cellularity based on DW-MRI scans along with enhancement of radiation efficacy. DW-MRI was found to be a useful imaging biomarker for the detection of radiosensitization through inhibition of checkpoint kinases. Chk1/2 inhibition resulted in antiproliferative activity, prevention of DNA damage-induced repair, and radiosensitization in preclinical GBM tumor models, both in vitro and in vivo. The effects were found to be maximal in p53-mutated GBM cells. These results provide the rationale for integration of DW-MRI in clinical translation of Chk1/2 inhibition with radiation for the treatment of GBM.

  17. Mitotic catastrophe occurs in the absence of apoptosis in p53-null cells with a defective G1 checkpoint.

    Directory of Open Access Journals (Sweden)

    Michalis Fragkos

    Full Text Available Cell death occurring during mitosis, or mitotic catastrophe, often takes place in conjunction with apoptosis, but the conditions in which mitotic catastrophe may exhibit features of programmed cell death are still unclear. In the work presented here, we studied mitotic cell death by making use of a UV-inactivated parvovirus (adeno-associated virus; AAV that has been shown to induce a DNA damage response and subsequent death of p53-defective cells in mitosis, without affecting the integrity of the host genome. Osteosarcoma cells (U2OSp53DD that are deficient in p53 and lack the G1 cell cycle checkpoint respond to AAV infection through a transient G2 arrest. We found that the infected U2OSp53DD cells died through mitotic catastrophe with no signs of chromosome condensation or DNA fragmentation. Moreover, cell death was independent of caspases, apoptosis-inducing factor (AIF, autophagy and necroptosis. These findings were confirmed by time-lapse microscopy of cellular morphology following AAV infection. The assays used readily revealed apoptosis in other cell types when it was indeed occurring. Taken together the results indicate that in the absence of the G1 checkpoint, mitotic catastrophe occurs in these p53-null cells predominantly as a result of mechanical disruption induced by centrosome overduplication, and not as a consequence of a suicide signal.

  18. Cancer immunogenomic approach to neoantigen discovery in a checkpoint blockade responsive murine model of oral cavity squamous cell carcinoma

    Science.gov (United States)

    Zolkind, Paul; Przybylski, Dariusz; Marjanovic, Nemanja; Nguyen, Lan; Lin, Tianxiang; Johanns, Tanner; Alexandrov, Anton; Zhou, Liye; Allen, Clint T.; Miceli, Alexander P.; Schreiber, Robert D.; Artyomov, Maxim; Dunn, Gavin P.; Uppaluri, Ravindra

    2018-01-01

    Head and neck squamous cell carcinomas (HNSCC) are an ideal immunotherapy target due to their high mutation burden and frequent infiltration with lymphocytes. Preclinical models to investigate targeted and combination therapies as well as defining biomarkers to guide treatment represent an important need in the field. Immunogenomics approaches have illuminated the role of mutation-derived tumor neoantigens as potential biomarkers of response to checkpoint blockade as well as representing therapeutic vaccines. Here, we aimed to define a platform for checkpoint and other immunotherapy studies using syngeneic HNSCC cell line models (MOC2 and MOC22), and evaluated the association between mutation burden, predicted neoantigen landscape, infiltrating T cell populations and responsiveness of tumors to anti-PD1 therapy. We defined dramatic hematopoietic cell transcriptomic alterations in the MOC22 anti-PD1 responsive model in both tumor and draining lymph nodes. Using a cancer immunogenomics pipeline and validation with ELISPOT and tetramer analysis, we identified the H-2Kb-restricted ICAM1P315L (mICAM1) as a neoantigen in MOC22. Finally, we demonstrated that mICAM1 vaccination was able to protect against MOC22 tumor development defining mICAM1 as a bona fide neoantigen. Together these data define a pre-clinical HNSCC model system that provides a foundation for future investigations into combination and novel therapeutics. PMID:29423108

  19. Study of the G2/M cell cycle checkpoint in irradiated mammary epithelial cells overexpressing Cul-4A gene

    International Nuclear Information System (INIS)

    Gupta, Anu; Yang, L.-X.; Chen, L.-C.

    2002-01-01

    Purpose: Members of the cullin gene family are known to be involved in cell cycle control. One of the cullin genes, Cul-4A, is amplified and overexpressed in breast cancer cells. This study investigates the effect of Cul-4A overexpression upon G2/M cell cycle checkpoint after DNA damage induced by either ionizing or nonionizing radiation. Methods and Materials: The normal mammary epithelial cell line MCF10A was stably transfected with full-length Cul-4A cDNA. Independent clones of MCF10A cells that overexpress Cul-4A proteins were selected and treated with either 8 Gy of ionizing radiation or 7 J/M 2 of UV radiation. The profile of cell cycle progression and the accumulation of several cell cycle proteins were analyzed. Results: We found that overexpression of Cul-4A in MCF10A cells abrogated the G2/M cell cycle checkpoint in response to DNA damage induced by ionizing irradiation, but not to DNA damage induced by nonionizing radiation. Analysis of cell cycle proteins showed that after ionizing irradiation, p53 accumulated in the mock-transfected MCF10A cells, but not in the Cul-4A transfectants. Conclusion: Our results suggest a role for Cul-4A in tumorigenesis and/or tumor progression, possibly through disruption of cell cycle control

  20. Clonal neoantigens elicit T cell immunoreactivity and sensitivity to immune checkpoint blockade

    Science.gov (United States)

    McGranahan, Nicholas; Furness, Andrew J. S.; Rosenthal, Rachel; Ramskov, Sofie; Lyngaa, Rikke; Saini, Sunil Kumar; Jamal-Hanjani, Mariam; Wilson, Gareth A.; Birkbak, Nicolai J.; Hiley, Crispin T.; Watkins, Thomas B. K.; Shafi, Seema; Murugaesu, Nirupa; Mitter, Richard; Akarca, Ayse U.; Linares, Joseph; Marafioti, Teresa; Henry, Jake Y.; Van Allen, Eliezer M.; Miao, Diana; Schilling, Bastian; Schadendorf, Dirk; Garraway, Levi A.; Makarov, Vladimir; Rizvi, Naiyer A.; Snyder, Alexandra; Hellmann, Matthew D.; Merghoub, Taha; Wolchok, Jedd D.; Shukla, Sachet A.; Wu, Catherine J.; Peggs, Karl S.; Chan, Timothy A.; Hadrup, Sine R.; Quezada, Sergio A.; Swanton, Charles

    2016-01-01

    As tumors grow, they acquire mutations, some of which create neoantigens that influence the response of patients to immune checkpoint inhibitors. We explored the impact of neoantigen intratumor heterogeneity (ITH) on antitumor immunity. Through integrated analysis of ITH and neoantigen burden, we demonstrate a relationship between clonal neoantigen burden and overall survival in primary lung adenocarcinomas. CD8+ tumor-infiltrating lymphocytes reactive to clonal neoantigens were identified in early-stage non–small cell lung cancer and expressed high levels of PD-1. Sensitivity to PD-1 and CTLA-4 blockade in patients with advanced NSCLC and melanoma was enhanced in tumors enriched for clonal neoantigens. T cells recognizing clonal neoantigens were detectable in patients with durable clinical benefit. Cytotoxic chemotherapy–induced subclonal neoantigens, contributing to an increased mutational load, were enriched in certain poor responders. These data suggest that neoantigen heterogeneity may influence immune surveillance and support therapeutic developments targeting clonal neoantigens. PMID:26940869

  1. Pharmacometrics and systems pharmacology of immune checkpoint inhibitor nivolumab in cancer translational medicine

    Directory of Open Access Journals (Sweden)

    Sujit Nair

    2016-02-01

    Full Text Available Nivolumab, a fully human immunoglobulin G4 (IgG4 monoclonal antibody (mAb that targets the programmed cell death-1 (PD-1 inhibitory receptor expressed on lymphocytes and dendritic cells, has been approved for metastatic melanoma, advanced squamous non-small cell lung cancer (NSCLC and metastatic renal cell carcinoma. In this review, pharmacology and pharmacometrics systems of this immunopharmaceutical are discussed. Mechanistic actions of T-cell biology with respect to both “priming phase” (anti-cytotoxic T-lymphocyte associated antigen 4 (anti-CTLA-4 mAb; ipilimumab and “effector phase” (anti-PD-1 mAb; nivolumab was discussed, respectively. Key pharmacometric variables in anticancer efficacy of nivolumab such as target engagement, metabolism, pharmacology systems and clearance are elucidated with an emphasis on current knowledge from pre-clinical as well as phase 1, 2 and 3 clinical trials information, including the data presented at the American Society of Clinical Oncology (ASCO 2015 and European Cancer Congress 2015. Nivolumab biomarkers, safety, and synergistic combination immunotherapies are delineated. Nivolumab, administered via intravenous infusion, has an acceptable safety profile and good efficacy. Indeed, the way forward to leverage maximum benefits for the cancer patient may be to synergize anti-PD-1 blockade with complementary targets in immune checkpoint pathways or other oncogenic signal transduction pathways. The encouraging results with nivolumab lend credence to the promise of immune checkpoint blockade as a therapeutic strategy that has been come-of-age in clinical oncology. Of necessity, the burden of “financial toxicity” on cancer patients and families must be factored in considering nivolumab therapy. The problem of ligand PD-L1 being a weak biomarker in clinical practice was discussed. Appropriate patient selection methods including immunopharmacogenomics may be used to identify those patients who are most

  2. Identification of a novel EGF-sensitive cell cycle checkpoint

    International Nuclear Information System (INIS)

    Walker, Francesca; Zhang Huihua; Burgess, Antony W.

    2007-01-01

    The site of action of growth factors on mammalian cell cycle has been assigned to the boundary between the G1 and S phases. We show here that Epidermal Growth Factor (EGF) is also required for mitosis. BaF/3 cells expressing the EGFR (BaF/wtEGFR) synthesize DNA in response to EGF, but arrest in S-phase. We have generated a cell line (BaF/ERX) with defective downregulation of the EGFR and sustained activation of EGFR signalling pathways: these cells undergo mitosis in an EGF-dependent manner. The transit of BaF/ERX cells through G2/M strictly requires activation of EGFR and is abolished by AG1478. This phenotype is mimicked by co-expression of ErbB2 in BaF/wtEGFR cells, and abolished by inhibition of the EGFR kinase, suggesting that sustained signalling of the EGFR, through impaired downregulation of the EGFR or heterodimerization, is required for completion of the cycle. We have confirmed the role of EGFR signalling in the G2/M phase of the cell cycle using a human tumor cell line which overexpresses the EGFR and is dependent on EGFR signalling for growth. These findings unmask an EGF-sensitive checkpoint, helping to understand the link between sustained EGFR signalling, proliferation and the acquisition of a radioresistant phenotype in cancer cells

  3. Phenotypic characterization of autoreactive B cells--checkpoints of B cell tolerance in patients with systemic lupus erythematosus.

    Directory of Open Access Journals (Sweden)

    Annett M Jacobi

    Full Text Available DNA-reactive B cells play a central role in systemic lupus erythematosus (SLE; DNA antibodies precede clinical disease and in established disease correlate with renal inflammation and contribute to dendritic cell activation and high levels of type 1 interferon. A number of central and peripheral B cell tolerance mechanisms designed to control the survival, differentiation and activation of autoreactive B cells are thought to be disturbed in patients with SLE. The characterization of DNA-reactive B cells has, however, been limited by their low frequency in peripheral blood. Using a tetrameric configuration of a peptide mimetope of DNA bound by pathogenic anti-DNA antibodies, we can identify B cells producing potentially pathogenic DNA-reactive antibodies. We, therefore, characterized the maturation and differentiation states of peptide, (ds double stranded DNA cross-reactive B cells in the peripheral blood of lupus patients and correlated these with clinical disease activity. Flow cytometric analysis demonstrated a significantly higher frequency of tetramer-binding B cells in SLE patients compared to healthy controls. We demonstrated the existence of a novel tolerance checkpoint at the transition of antigen-naïve to antigen-experienced. We further demonstrate that patients with moderately active disease have more autoreactive B cells in both the antigen-naïve and antigen-experienced compartments consistent with greater impairment in B cell tolerance in both early and late checkpoints in these patients than in patients with quiescent disease. This methodology enables us to gain insight into the development and fate of DNA-reactive B cells in individual patients with SLE and paves the way ultimately to permit better and more customized therapies.

  4. Spindle assembly checkpoint protein expression correlates with cellular proliferation and shorter time to recurrence in ovarian cancer.

    LENUS (Irish Health Repository)

    McGrogan, Barbara

    2014-07-01

    Ovarian carcinoma (OC) is the most lethal of the gynecological malignancies, often presenting at an advanced stage. Treatment is hampered by high levels of drug resistance. The taxanes are microtubule stabilizing agents, used as first-line agents in the treatment of OC that exert their apoptotic effects through the spindle assembly checkpoint. BUB1-related protein kinase (BUBR1) and mitotic arrest deficient 2 (MAD2), essential spindle assembly checkpoint components, play a key role in response to taxanes. BUBR1, MAD2, and Ki-67 were assessed on an OC tissue microarray platform representing 72 OC tumors of varying histologic subtypes. Sixty-one of these patients received paclitaxel and platinum agents combined; 11 received platinum alone. Overall survival was available for all 72 patients, whereas recurrence-free survival (RFS) was available for 66 patients. Increased BUBR1 expression was seen in serous carcinomas, compared with other histologies (P = .03). Increased BUBR1 was significantly associated with tumors of advanced stage (P = .05). Increased MAD2 and BUBR1 expression also correlated with increased cellular proliferation (P < .0002 and P = .02, respectively). Reduced MAD2 nuclear intensity was associated with a shorter RFS (P = .03), in ovarian tumors of differing histologic subtype (n = 66). In this subgroup, for those women who received paclitaxel and platinum agents combined (n = 57), reduced MAD2 intensity also identified women with a shorter RFS (P < .007). For the entire cohort of patients, irrespective of histologic subtype or treatment, MAD2 nuclear intensity retained independent significance in a multivariate model, with tumors showing reduced nuclear MAD2 intensity identifying patients with a poorer RFS (P = .05).

  5. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  6. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  7. Attenuation of G{sub 2} cell cycle checkpoint control in human tumor cells is associated with increased frequencies of unrejoined chromosome breaks but not increased cytotoxicity following radiation exposure

    Energy Technology Data Exchange (ETDEWEB)

    Schwartz, J.L.; Cowan, J.; Grdina, D.J. [and others

    1997-08-01

    The contribution of G{sub 2} cell cycle checkpoint control to ionizing radiation responses was examined in ten human tumor cell lines. Most of the delay in cell cycle progression seen in the first cell cycle following radiation exposure was due to blocks in G{sub 2} and there were large cell line-to-cell line variations in the length of the G{sub 2} block. Longer delays were seen in cell lines that had mutations in p53. There was a highly significant inverse correlation between the length of G{sub 2} delay and the frequency of unrejoined chromosome breaks seen as chromosome terminal deletions in mitosis, and observation that supports the hypothesis that the signal for G{sub 2} delay in mammalian cells is an unrejoined chromosome break. There were also an inverse correlation between the length of G{sub 2} delay and the level of chromosome aneuploidy in each cell line, suggesting that the G{sub 2} and mitotic spindel checkpoints may be linked to each other. Attenuation in G{sub 2} checkpoint control was not associated with alterations in either the frequency of induced chromosome rearrangements or cell survival following radiation exposure suggesting that chromosome rearrangements, the major radiation-induced lethal lesion in tumor cells, form before cells enters G{sub 2}. Thus, agents that act solely to override G{sub 2} arrest should produce little radiosensitization in human tumor cells.

  8. Centromeric DNA replication reconstitution reveals DNA loops and ATR checkpoint suppression.

    Science.gov (United States)

    Aze, Antoine; Sannino, Vincenzo; Soffientini, Paolo; Bachi, Angela; Costanzo, Vincenzo

    2016-06-01

    Half of the human genome is made up of repetitive DNA. However, mechanisms underlying replication of chromosome regions containing repetitive DNA are poorly understood. We reconstituted replication of defined human chromosome segments using bacterial artificial chromosomes in Xenopus laevis egg extract. Using this approach we characterized the chromatin assembly and replication dynamics of centromeric alpha-satellite DNA. Proteomic analysis of centromeric chromatin revealed replication-dependent enrichment of a network of DNA repair factors including the MSH2-6 complex, which was required for efficient centromeric DNA replication. However, contrary to expectations, the ATR-dependent checkpoint monitoring DNA replication fork arrest could not be activated on highly repetitive DNA due to the inability of the single-stranded DNA binding protein RPA to accumulate on chromatin. Electron microscopy of centromeric DNA and supercoil mapping revealed the presence of topoisomerase I-dependent DNA loops embedded in a protein matrix enriched for SMC2-4 proteins. This arrangement suppressed ATR signalling by preventing RPA hyper-loading, facilitating replication of centromeric DNA. These findings have important implications for our understanding of repetitive DNA metabolism and centromere organization under normal and stressful conditions.

  9. The Spindle Assembly Checkpoint in Arabidopsis Is Rapidly Shut Off during Severe Stress.

    Science.gov (United States)

    Komaki, Shinichiro; Schnittger, Arp

    2017-10-23

    The spindle assembly checkpoint (SAC) in animals and yeast assures equal segregation of chromosomes during cell division. The prevalent occurrence of polyploidy in flowering plants together with the observation that many plants can be readily forced to double their genomes by application of microtubule drugs raises the question of whether plants have a proper SAC. Here, we provide a functional framework of the core SAC proteins in Arabidopsis. We reveal that Arabidopsis will delay mitosis in a SAC-dependent manner if the spindle is perturbed. However, we also show that the molecular architecture of the SAC is unique in plants. Moreover, the SAC is short-lived and cannot stay active for more than 2 hr, after which the cell cycle is reset. This resetting opens the possibility for genome duplications and raises the hypothesis that a rapid termination of a SAC-induced mitotic arrest provides an adaptive advantage for plants impacting plant genome evolution. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. Kaposi sarcoma herpes virus latency associated nuclear antigen protein release the G2/M cell cycle blocks by modulating ATM/ATR mediated checkpoint pathway.

    Directory of Open Access Journals (Sweden)

    Amit Kumar

    Full Text Available The Kaposi's sarcoma-associated herpesvirus infects the human population and maintains latency stage of viral life cycle in a variety of cell types including cells of epithelial, mesenchymal and endothelial origin. The establishment of latent infection by KSHV requires the expression of an unique repertoire of genes among which latency associated nuclear antigen (LANA plays a critical role in the replication of the viral genome. LANA regulates the transcription of a number of viral and cellular genes essential for the survival of the virus in the host cell. The present study demonstrates the disruption of the host G2/M cell cycle checkpoint regulation as an associated function of LANA. DNA profile of LANA expressing human B-cells demonstrated the ability of this nuclear antigen in relieving the drug (Nocodazole induced G2/M checkpoint arrest. Caffeine suppressed nocodazole induced G2/M arrest indicating involvement of the ATM/ATR. Notably, we have also shown the direct interaction of LANA with Chk2, the ATM/ATR signalling effector and is responsible for the release of the G2/M cell cycle block.

  11. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  12. [Prospect and Current Situation of Immune Checkpoint Inhibitors 
in First-line Treatment in Advanced Non-small Cell Lung Cancer Patients].

    Science.gov (United States)

    Wang, Haiyang; Yu, Xiaoqing; Fan, Yun

    2017-06-20

    With the breakthroughs achieved of programmed death-1 (PD-1)/PD-L1 inhibitors monotherapy as first-line and second-line treatment in advanced non-small cell lung cancer (NSCLC), the treatment strategy is gradually evolving and optimizing. Immune combination therapy expands the benefit population and improves the curative effect. A series of randomized phase III trials are ongoing. In this review, we discuss the prospect and current situation of immune checkpoint inhibitors in first-line treatment in advanced NSCLC patients.

  13. Upregulated ATM gene expression and activated DNA crosslink-induced damage response checkpoint in Fanconi anemia: implications for carcinogenesis.

    Science.gov (United States)

    Yamamoto, Kazuhiko; Nihrane, Abdallah; Aglipay, Jason; Sironi, Juan; Arkin, Steven; Lipton, Jeffrey M; Ouchi, Toru; Liu, Johnson M

    2008-01-01

    Fanconi anemia (FA) predisposes to hematopoietic failure, birth defects, leukemia, and squamous cell carcinoma of the head and neck (HNSCC) and cervix. The FA/BRCA pathway includes 8 members of a core complex and 5 downstream gene products closely linked with BRCA1 or BRCA2. Precancerous lesions are believed to trigger the DNA damage response (DDR), and we focused on the DDR in FA and its putative role as a checkpoint barrier to cancer. In primary fibroblasts with mutations in the core complex FANCA protein, we discovered that basal expression and phosphorylation of ATM (ataxia telangiectasia mutated) and p53 induced by irradiation (IR) or mitomycin C (MMC) were upregulated. This heightened response appeared to be due to increased basal levels of ATM in cultured FANCA-mutant cells, highlighting the new observation that ATM can be regulated at the transcriptional level in addition to its well-established activation by autophosphorylation. Functional analysis of this response using gamma-H2AX foci as markers of DNA double-stranded breaks (DSBs) demonstrated abnormal persistence of only MMC- and not IR-induced foci. Thus, we describe a processing defect that leads to general DDR upregulation but specific persistence of DNA crosslinker-induced damage response foci. Underscoring the significance of these findings, we found resistance to DNA crosslinker-induced cell cycle arrest and apoptosis in a TP53-mutant, patient-derived HNSCC cell line, whereas a lymphoblastoid cell line derived from this same individual was not mutated at TP53 and retained DNA crosslinker sensitivity. Our results suggest that cancer in FA may arise from selection for cells that escape from a chronically activated DDR checkpoint.

  14. Prognostic utility of baseline neutrophil-to-lymphocyte ratio in patients receiving immune checkpoint inhibitors: a review and meta-analysis

    Directory of Open Access Journals (Sweden)

    Sacdalan DB

    2018-02-01

    Full Text Available Danielle Benedict Sacdalan,1 Josephine Anne Lucero,2 Dennis Lee Sacdalan1 1Section of Medical Oncology, Department of Medicine, University of the Philippines Manila and Philippine General Hospital, Manila, Philippines; 2Department of Medicine, University of the Philippines Manila and Philippine General Hospital, Manila, Philippines Introduction: Systemic inflammation is associated with prognosis in solid tumors. The neutrophil-to-lymphocyte ratio (NLR is a marker for the general immune response to various stress stimuli. Studies have shown correlation of NLR to outcomes in immune checkpoint blockade, peripheral neutrophil count to intratumor neutrophil population, and NLR to intratumoral levels of myeloid-derived suppressor cells. Studies have shown elevated peripheral blood regulator T cells accompanied by elevated NLR are associated with poor outcomes further highlighting the importance of inflammation in the prognosis of cancer patients.Methods: We performed a meta-analysis of published articles on the utility of baseline NLR in predicting outcomes in patients treated with immune checkpoint inhibitors (ICIs using Review Manager, version 5.3. Seven studies on the prognostic utility of NLR in ICI treatment were included in this analysis. For outcomes of interest, the hazard ratios (HRs were computed. Subgroup analyses were planned based on type of malignancy and type of immune checkpoint inhibitor.Results/discussion: A high NLR resulted in worse overall survival (OS (HR, 1.92; 95% CI, 1.29–2.87; p=0.001 and progression-free survival (PFS; HR, 1.66; 95% CI, 1.38–2.01; p<0.00001 across types of malignancies studied (melanoma, non-small-cell lung cancer, and genitourinary cancer. Subgroup analysis across different types of malignancies treated with ICI showed similar results for OS and PFS. The single study on genitourinary cancers also showed worse OS and PFS (OS: HR, 1.82; 95% CI, 1.29–2.87; p=0.001 and PFS: HR, 1.83; 95% CI, 0.97–3

  15. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  16. Effects and Mechanisms of Checkpoint Inhibitors (CTLA-4, PD-1 and PD-L1 Inhibitors as New Immunotherapeutic Agents for Bladder Cancer

    Directory of Open Access Journals (Sweden)

    Serdar Çelik

    2018-04-01

    Full Text Available Since intravesical Bacillus Calmette-Guerin (BCG began to be used for bladder cancer, our understanding of the importance of immune mechanisms in bladder cancer has steadily grown. With developments in immunotherapy in recent years, the use of new immunotherapeutic agents for bladder cancer, especially chemotherapy-resistant invasive and metastatic cancers, has opened the way for research in this area. Of these new therapeutic agents, this article reviews studies published on PubMed or listed on the ClinicalTrials.gov website as of December 2017 regarding the effects and mechanisms of action of checkpoint inhibitors [cytotoxic t-lymphocyte associated protein-4, programmed cell death 1 receptor (PD-1 and PD-1 ligand inhibitors] on bladder cancer. Because checkpoint inhibitors were first used for chemotherapy-resistant bladder cancer after identification of positive expression in tumor cells and especially in tumor-infiltrating mononuclear cells, significant objective response rates and survival advantages have been reported. Research continues regarding the use of these agents as first- and second-line treatment for metastatic disease in combination with chemotherapy; their efficacy in neoadjuvant, adjuvant, and bladder-preserving approaches to muscle-invasive bladder cancer (MIBC disease, and their use in non-muscle-invasize bladder cancer (NMIBC, especially BCG-refractory disease. Depending on the results of these ongoing studies, immunotherapy may direct the treatment of bladder cancer in the future.

  17. Acute symptomatic hypocalcemia from immune checkpoint therapy-induced hypoparathyroidism.

    Science.gov (United States)

    Win, Myint Aung; Thein, Kyaw Zin; Qdaisat, Aiham; Yeung, Sai-Ching Jim

    2017-07-01

    Ipilimumab (a monoclonal antibody against CTLA-4) and nivolumab (a humanized antibody against PD-1) target these immune checkpoint pathways and are used for treatment of melanoma and an increasing number of other cancers. However, they may cause immune-related adverse effects (IRAEs). Although many endocrinopathies are known to be IRAEs, primary hypoparathyroidism with severe hypocalcemia has never been reported. This is the first case of hypoparathyroidism as an IRAE presenting to an Emergency Department with acute hypocalcemia. A 73-year-old man with metastatic melanoma presented to the Emergency Department for the chief complaints of imbalance, general muscle weakness, abdominal pain and tingling in extremities. He had wide spread metastasis, and begun immunotherapy with concurrent ipilimumab and nivolumab 1.5months ago. At presentation, he had ataxia, paresthesia in the hands and feet, and abdominal cramping. Magnetic resonance imaging of the brain was unremarkable. He was found to be hypocalcemic with undetectable plasma parathyroid hormone. He was admitted for treatment of symptomatic hypocalcemia and was diagnosed with primary hypoparathyroidism. Shortly afterwards, he had thyrotoxicosis manifesting as tachycardia and anxiety, followed by development of primary hypothyroidism. At 4months after the Emergency Department visit, his parathyroid function and thyroid function had not recovered, and required continued thyroid hormone replacement and calcium and vitamin D treatment for hypocalcemia. Primary hypoparathyroidism caused by ipilimumab and nivolumab may acute manifest with severe symptomatic hypocalcemia. Emergency care providers should be aware of hypoparathyroidism as a new IRAE in this new era of immuno-oncology. Copyright © 2017 Elsevier Inc. All rights reserved.

  18. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  19. A plant cyclin B2 is degraded early in mitosis and its ectopic expression shortens G2-phase and alleviates the DNA-damage checkpoint

    Czech Academy of Sciences Publication Activity Database

    Weingartner, M.; Pelayo, H. R.; Binarová, Pavla; Zwerger, K.; Melikant, B.; Torre, C.; Heberle-Bors, E.; Bogre, L.

    2003-01-01

    Roč. 116, č. 3 (2003), s. 487-498 ISSN 0021-9533 R&D Projects: GA MŠk LN00A081 Grant - others:GA Ministerio de Ciencia y Tecnologia(ES) BMC2001-2195; Biotechnology and Biological Science Research Council(AU) 111/P133340 Institutional research plan: CEZ:AV0Z5020903 Keywords : cyclin B * mitosis * checkpoint Subject RIV: EE - Microbiology, Virology Impact factor: 7.250, year: 2003

  20. A Phase 1 Trial of an Immune Checkpoint Inhibitor plus Stereotactic Ablative Radiotherapy in Patients with Inoperable Stage I Non-Small Cell Lung Cancer

    Science.gov (United States)

    2017-10-01

    with Inoperable Stage I Non-Small Cell Lung Cancer PRINCIPAL INVESTIGATOR: Karen Kelly, MD CONTRACTING ORGANIZATION: University of California...Inhibitor plus Stereotactic Ablative Radiotherapy in Patients with Inoperable Stage I Non-Small Cell Lung Cancer 5b. GRANT NUMBER W81XWH-15-2-0063...immune checkpoint inhibitor MPDL3280A (atezolizumab) in early stage inoperable non-small cell lung cancer . The trial is comprised of a traditional 3 + 3

  1. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  2. A direct role of Mad1 in the spindle assembly checkpoint beyond Mad2 kinetochore recruitment

    DEFF Research Database (Denmark)

    Kruse, Thomas; Larsen, Marie Sofie Yoo; Sedgwick, Garry G

    2014-01-01

    in the SAC beyond recruitment of C-Mad2 to kinetochores has not yet been addressed. Here, we show that Mad1 is required for mitotic arrest even when C-Mad2 is artificially recruited to kinetochores, indicating that it has indeed an additional function in promoting the checkpoint. The C-terminal globular...... domain of Mad1 and conserved residues in this region are required for this unexpected function of Mad1........ The conversion of O-Mad2 into C-Mad2 at unattached kinetochores is thought to be a key step in activating the SAC. The "template model" proposes that this is achieved by the recruitment of soluble O-Mad2 to C-Mad2 bound at kinetochores through its interaction with Mad1. Whether Mad1 has additional roles...

  3. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  4. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  5. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  6. The architecture of the BubR1 tetratricopeptide tandem repeat defines a protein motif underlying mitotic checkpoint-kinetochore communication

    DEFF Research Database (Denmark)

    Bolanos-Garcia, Victor M; Nilsson, Jakob; Blundell, Tom L

    2012-01-01

    advance to anaphase before every chromosome is properly attached to microtubules of the mitotic spindle. The architecture of the KNL1-BubR1 complex reveals important features of the molecular recognition between SAC components and the kinetochore. The interaction is important for a functional SAC...... as substitution of BubR1 residues engaged in KNL1 binding impaired the SAC and BubR1 recruitment into checkpoint complexes in stable cell lines. Here we discuss the implications of the disorder-to-order transition of KNL1 upon BubR1 binding for SAC signaling and propose a mechanistic model of how BUBs binding may...

  7. Solid-State High Power Radio Frequency Directed Energy Systems in Support of USMC Force Protection Operations

    Science.gov (United States)

    2015-06-01

    Alberts, The Information Age: An Anthology on its Impact and Consequences (Washington, DC: Command and Control Research Program, 1997), 2, http...Mission. Checkpoints (Border Security Company 18 Standard Operating Procedures). BSC-18, 2011. Alberts, M. The Information Age: An Anthology on

  8. Targeting cytokine signaling checkpoint CIS activates NK cells to protect from tumor initiation and metastasis

    Science.gov (United States)

    Putz, Eva M.; Guillerey, Camille; Kos, Kevin; Stannard, Kimberley; Miles, Kim; Delconte, Rebecca B.; Nicholson, Sandra E.; Huntington, Nicholas D.; Smyth, Mark J.

    2017-01-01

    ABSTRACT The cytokine-induced SH2-containing protein CIS belongs to the suppressor of cytokine signaling (SOCS) protein family. Here, we show the critical role of CIS in suppressing natural killer (NK) cell control of tumor initiation and metastasis. Cish-deficient mice were highly resistant to methylcholanthrene-induced sarcoma formation and protected from lung metastasis of B16F10 melanoma and RM-1 prostate carcinoma cells. In contrast, the growth of primary subcutaneous tumors, including those expressing the foreign antigen OVA, was unchanged in Cish-deficient mice. The combination of Cish deficiency and relevant targeted and immuno-therapies such as combined BRAF and MEK inhibitors, immune checkpoint blockade antibodies, IL-2 and type I interferon revealed further improved control of metastasis. The data clearly indicate that targeting CIS promotes NK cell antitumor functions and CIS holds great promise as a novel target in NK cell immunotherapy. PMID:28344878

  9. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  10. Loss of the Greatwall Kinase Weakens the Spindle Assembly Checkpoint.

    Directory of Open Access Journals (Sweden)

    M Kasim Diril

    2016-09-01

    Full Text Available The Greatwall kinase/Mastl is an essential gene that indirectly inhibits the phosphatase activity toward mitotic Cdk1 substrates. Here we show that although Mastl knockout (MastlNULL MEFs enter mitosis, they progress through mitosis without completing cytokinesis despite the presence of misaligned chromosomes, which causes chromosome segregation defects. Furthermore, we uncover the requirement of Mastl for robust spindle assembly checkpoint (SAC maintenance since the duration of mitotic arrest caused by microtubule poisons in MastlNULL MEFs is shortened, which correlates with premature disappearance of the essential SAC protein Mad1 at the kinetochores. Notably, MastlNULL MEFs display reduced phosphorylation of a number of proteins in mitosis, which include the essential SAC kinase MPS1. We further demonstrate that Mastl is required for multi-site phosphorylation of MPS1 as well as robust MPS1 kinase activity in mitosis. In contrast, treatment of MastlNULL cells with the phosphatase inhibitor okadaic acid (OKA rescues the defects in MPS1 kinase activity, mislocalization of phospho-MPS1 as well as Mad1 at the kinetochore, and premature SAC silencing. Moreover, using in vitro dephosphorylation assays, we demonstrate that Mastl promotes persistent MPS1 phosphorylation by inhibiting PP2A/B55-mediated MPS1 dephosphorylation rather than affecting Cdk1 kinase activity. Our findings establish a key regulatory function of the Greatwall kinase/Mastl->PP2A/B55 pathway in preventing premature SAC silencing.

  11. Loss of the Greatwall Kinase Weakens the Spindle Assembly Checkpoint.

    Science.gov (United States)

    Diril, M Kasim; Bisteau, Xavier; Kitagawa, Mayumi; Caldez, Matias J; Wee, Sheena; Gunaratne, Jayantha; Lee, Sang Hyun; Kaldis, Philipp

    2016-09-01

    The Greatwall kinase/Mastl is an essential gene that indirectly inhibits the phosphatase activity toward mitotic Cdk1 substrates. Here we show that although Mastl knockout (MastlNULL) MEFs enter mitosis, they progress through mitosis without completing cytokinesis despite the presence of misaligned chromosomes, which causes chromosome segregation defects. Furthermore, we uncover the requirement of Mastl for robust spindle assembly checkpoint (SAC) maintenance since the duration of mitotic arrest caused by microtubule poisons in MastlNULL MEFs is shortened, which correlates with premature disappearance of the essential SAC protein Mad1 at the kinetochores. Notably, MastlNULL MEFs display reduced phosphorylation of a number of proteins in mitosis, which include the essential SAC kinase MPS1. We further demonstrate that Mastl is required for multi-site phosphorylation of MPS1 as well as robust MPS1 kinase activity in mitosis. In contrast, treatment of MastlNULL cells with the phosphatase inhibitor okadaic acid (OKA) rescues the defects in MPS1 kinase activity, mislocalization of phospho-MPS1 as well as Mad1 at the kinetochore, and premature SAC silencing. Moreover, using in vitro dephosphorylation assays, we demonstrate that Mastl promotes persistent MPS1 phosphorylation by inhibiting PP2A/B55-mediated MPS1 dephosphorylation rather than affecting Cdk1 kinase activity. Our findings establish a key regulatory function of the Greatwall kinase/Mastl->PP2A/B55 pathway in preventing premature SAC silencing.

  12. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  13. ORDER SECURITY – NATIONAL SECURITY ADMINISTRATION. NATIONAL SECURITY DEFENSE AS SPECIAL ADMINISTRATION

    OpenAIRE

    Zoltán BALLA

    2009-01-01

    National security administration is the special executivedisposal activity of the national security agencies, the section of the state administration that helps the governmental work by reconnoitering and preventing with secret-servicing methods of the risks that shall harm or endanger the national security’s interests. The main operational principles of national security governing are the followings among others: - controlling the operation of national security organization belongs to the ex...

  14. Computer Security: Security operations at CERN (4/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...

  15. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  16. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriat...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development.......When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...

  17. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  18. Pragmatic security metrics applying metametrics to information security

    CERN Document Server

    Brotby, W Krag

    2013-01-01

    Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics.Packed with time-saving tips, the book offers easy-to-follow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system (a comprehensive suite of metrics) to

  19. In-silico modeling of the mitotic spindle assembly checkpoint.

    Directory of Open Access Journals (Sweden)

    Bashar Ibrahim

    2008-02-01

    Full Text Available The Mitotic Spindle Assembly Checkpoint ((MSAC is an evolutionary conserved mechanism that ensures the correct segregation of chromosomes by restraining cell cycle progression from entering anaphase until all chromosomes have made proper bipolar attachments to the mitotic spindle. Its malfunction can lead to cancer.We have constructed and validated for the human (MSAC mechanism an in silico dynamical model, integrating 11 proteins and complexes. The model incorporates the perspectives of three central control pathways, namely Mad1/Mad2 induced Cdc20 sequestering based on the Template Model, MCC formation, and APC inhibition. Originating from the biochemical reactions for the underlying molecular processes, non-linear ordinary differential equations for the concentrations of 11 proteins and complexes of the (MSAC are derived. Most of the kinetic constants are taken from literature, the remaining four unknown parameters are derived by an evolutionary optimization procedure for an objective function describing the dynamics of the APC:Cdc20 complex. MCC:APC dissociation is described by two alternatives, namely the "Dissociation" and the "Convey" model variants. The attachment of the kinetochore to microtubuli is simulated by a switching parameter silencing those reactions which are stopped by the attachment. For both, the Dissociation and the Convey variants, we compare two different scenarios concerning the microtubule attachment dependent control of the dissociation reaction. Our model is validated by simulation of ten perturbation experiments.Only in the controlled case, our models show (MSAC behaviour at meta- to anaphase transition in agreement with experimental observations. Our simulations revealed that for (MSAC activation, Cdc20 is not fully sequestered; instead APC is inhibited by MCC binding.

  20. Genetic analysis of the spindle checkpoint genes san-1, mdf-2, bub-3 and the CENP-F homologues hcp-1 and hcp-2 in Caenorhabditis elegans

    Directory of Open Access Journals (Sweden)

    Moore Landon L

    2008-02-01

    Full Text Available Abstract Background The spindle checkpoint delays the onset of anaphase until all sister chromatids are aligned properly at the metaphase plate. To investigate the role san-1, the MAD3 homologue, has in Caenorhabditis elegans embryos we used RNA interference (RNAi to identify genes synthetic lethal with the viable san-1(ok1580 deletion mutant. Results The san-1(ok1580 animal has low penetrating phenotypes including an increased incidence of males, larvae arrest, slow growth, protruding vulva, and defects in vulva morphogenesis. We found that the viability of san-1(ok1580 embryos is significantly reduced when HCP-1 (CENP-F homologue, MDF-1 (MAD-1 homologue, MDF-2 (MAD-2 homologue or BUB-3 (predicted BUB-3 homologue are reduced by RNAi. Interestingly, the viability of san-1(ok1580 embryos is not significantly reduced when the paralog of HCP-1, HCP-2, is reduced. The phenotype of san-1(ok1580;hcp-1(RNAi embryos includes embryonic and larval lethality, abnormal organ development, and an increase in abnormal chromosome segregation (aberrant mitotic nuclei, anaphase bridging. Several of the san-1(ok1580;hcp-1(RNAi animals displayed abnormal kinetochore (detected by MPM-2 and microtubule structure. The survival of mdf-2(RNAi;hcp-1(RNAi embryos but not bub-3(RNAi;hcp-1(RNAi embryos was also compromised. Finally, we found that san-1(ok1580 and bub-3(RNAi, but not hcp-1(RNAi embryos, were sensitive to anoxia, suggesting that like SAN-1, BUB-3 has a functional role as a spindle checkpoint protein. Conclusion Together, these data suggest that in the C. elegans embryo, HCP-1 interacts with a subset of the spindle checkpoint pathway. Furthermore, the fact that san-1(ok1580;hcp-1(RNAi animals had a severe viability defect whereas in the san-1(ok1580;hcp-2(RNAi and san-1(ok1580;hcp-2(ok1757 animals the viability defect was not as severe suggesting that hcp-1 and hcp-2 are not completely redundant.

  1. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  2. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  3. C/EBPα Expression is Partially Regulated by C/EBPβ in Response to DNA Damage and C/EBPα Deficient Fibroblasts Display an Impaired G1 Checkpoint

    Science.gov (United States)

    Ranjan, Rakesh; Thompson, Elizabeth A.; Yoon, Kyungsil; Smart, Robert C.

    2009-01-01

    We observed that C/EBPα is highly inducible in primary fibroblasts by DNA damaging agents that induce strand breaks, alkylate and crosslink DNA as well as those that produce bulky DNA lesions. Fibroblasts deficient in C/EBPα (C/EBPα-/-) display an impaired G1 checkpoint as evidenced by inappropriate entry into S-phase in response to DNA damage and these cells also display an enhanced G1 to S transition in response to mitogens. The induction of C/EBPα by DNA damage in fibroblasts does not require p53. EMSA analysis of nuclear extracts prepared from UVB- and MNNG-treated fibroblasts revealed increased binding of C/EBPβ to a C/EBP consensus sequence and ChIP analysis revealed increased C/EBPβ binding to the C/EBPα promoter. To determine whether C/EBPβ has a role in the regulation of C/EBPα we treated C/EBPβ-/- fibroblasts with UVB or MNNG. We observed C/EBPα induction was impaired in both UVB- and MNNG- treated C/EBPβ-/- fibroblasts. Our study reveals a novel role for C/EBPβ in the regulation of C/EBPα in response to DNA damage and provides definitive genetic evidence that C/EBPα has a critical role in the DNA damage G1 checkpoint. PMID:19581927

  4. Microsoft Security Bible A Collection of Practical Security Techniques

    CERN Document Server

    Mullen, Timothy "Thor"

    2011-01-01

    Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications

  5. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  6. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  7. DNA Checkpoint and Repair Factors Are Nuclear Sensors for Intracellular Organelle Stresses—Inflammations and Cancers Can Have High Genomic Risks

    Directory of Open Access Journals (Sweden)

    Huihong Zeng

    2018-05-01

    Full Text Available Under inflammatory conditions, inflammatory cells release reactive oxygen species (ROS and reactive nitrogen species (RNS which cause DNA damage. If not appropriately repaired, DNA damage leads to gene mutations and genomic instability. DNA damage checkpoint factors (DDCF and DNA damage repair factors (DDRF play a vital role in maintaining genomic integrity. However, how DDCFs and DDRFs are modulated under physiological and pathological conditions are not fully known. We took an experimental database analysis to determine the expression of 26 DNA DDCFs and 42 DNA DDRFs in 21 human and 20 mouse tissues in physiological/pathological conditions. We made the following significant findings: (1 Few DDCFs and DDRFs are ubiquitously expressed in tissues while many are differentially regulated.; (2 the expression of DDCFs and DDRFs are modulated not only in cancers but also in sterile inflammatory disorders and metabolic diseases; (3 tissue methylation status, pro-inflammatory cytokines, hypoxia regulating factors and tissue angiogenic potential can determine the expression of DDCFs and DDRFs; (4 intracellular organelles can transmit the stress signals to the nucleus, which may modulate the cell death by regulating the DDCF and DDRF expression. Our results shows that sterile inflammatory disorders and cancers increase genomic instability, therefore can be classified as pathologies with a high genomic risk. We also propose a new concept that as parts of cellular sensor cross-talking network, DNA checkpoint and repair factors serve as nuclear sensors for intracellular organelle stresses. Further, this work would lead to identification of novel therapeutic targets and new biomarkers for diagnosis and prognosis of metabolic diseases, inflammation, tissue damage and cancers.

  8. Dual personality of Mad1: regulation of nuclear import by a spindle assembly checkpoint protein.

    Science.gov (United States)

    Cairo, Lucas V; Ptak, Christopher; Wozniak, Richard W

    2013-01-01

    Nuclear transport is a dynamic process that can be modulated in response to changes in cellular physiology. We recently reported that the transport activity of yeast nuclear pore complexes (NPCs) is altered in response to kinetochore-microtubule (KT-MT) interaction defects. Specifically, KT detachment from MTs activates a signaling pathway that prevents the nuclear import of cargos by the nuclear transport factor Kap121p. This loss of Kap121p-mediated import is thought to influence the nuclear environment, including the phosphorylation state of nuclear proteins. A key regulator of this process is the spindle assembly checkpoint protein Mad1p. In response to unattached KTs, Mad1p dynamically cycles between NPCs and KTs. This cycling appears to induce NPC molecular rearrangements that prevent the nuclear import of Kap121p-cargo complexes. Here, we discuss the underlying mechanisms and the physiological relevance of Mad1p cycling and the inhibition of Kap121p-mediated nuclear import, focusing on outstanding questions within the pathway.

  9. Adventures in Scaffold Morphing: Discovery of Fused Ring Heterocyclic Checkpoint Kinase 1 (CHK1) Inhibitors.

    Science.gov (United States)

    Yang, Bin; Vasbinder, Melissa M; Hird, Alexander W; Su, Qibin; Wang, Haixia; Yu, Yan; Toader, Dorin; Lyne, Paul D; Read, Jon A; Breed, Jason; Ioannidis, Stephanos; Deng, Chun; Grondine, Michael; DeGrace, Nancy; Whitston, David; Brassil, Patrick; Janetka, James W

    2018-02-08

    Checkpoint kinase 1 (CHK1) inhibitors are potential cancer therapeutics that can be utilized for enhancing the efficacy of DNA damaging agents. Multiple small molecule CHK1 inhibitors from different chemical scaffolds have been developed and evaluated in clinical trials in combination with chemotherapeutics and radiation treatment. Scaffold morphing of thiophene carboxamide ureas (TCUs), such as AZD7762 (1) and a related series of triazoloquinolines (TZQs), led to the identification of fused-ring bicyclic CHK1 inhibitors, 7-carboxamide thienopyridines (7-CTPs), and 7-carboxamide indoles. X-ray crystal structures reveal a key intramolecular noncovalent sulfur-oxygen interaction in aligning the hinge-binding carboxamide group to the thienopyridine core in a coplanar fashion. An intramolecular hydrogen bond to an indole NH was also effective in locking the carboxamide in the preferred bound conformation to CHK1. Optimization on the 7-CTP series resulted in the identification of lead compound 44, which displayed respectable drug-like properties and good in vitro and in vivo potency.

  10. Cell-cycle dependent expression of a translocation-mediated fusion oncogene mediates checkpoint adaptation in rhabdomyosarcoma.

    Directory of Open Access Journals (Sweden)

    Ken Kikuchi

    2014-01-01

    Full Text Available Rhabdomyosarcoma is the most commonly occurring soft-tissue sarcoma in childhood. Most rhabdomyosarcoma falls into one of two biologically distinct subgroups represented by alveolar or embryonal histology. The alveolar subtype harbors a translocation-mediated PAX3:FOXO1A fusion gene and has an extremely poor prognosis. However, tumor cells have heterogeneous expression for the fusion gene. Using a conditional genetic mouse model as well as human tumor cell lines, we show that that Pax3:Foxo1a expression is enriched in G2 and triggers a transcriptional program conducive to checkpoint adaptation under stress conditions such as irradiation in vitro and in vivo. Pax3:Foxo1a also tolerizes tumor cells to clinically-established chemotherapy agents and emerging molecularly-targeted agents. Thus, the surprisingly dynamic regulation of the Pax3:Foxo1a locus is a paradigm that has important implications for the way in which oncogenes are modeled in cancer cells.

  11. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  12. Evidence for a transketolase-mediated metabolic checkpoint governing biotrophic growth in rice cells by the blast fungus Magnaporthe oryzae.

    Directory of Open Access Journals (Sweden)

    Jessie Fernandez

    2014-09-01

    Full Text Available The blast fungus Magnaporthe oryzae threatens global food security through the widespread destruction of cultivated rice. Foliar infection requires a specialized cell called an appressorium that generates turgor to force a thin penetration hypha through the rice cuticle and into the underlying epidermal cells, where the fungus grows for the first days of infection as a symptomless biotroph. Understanding what controls biotrophic growth could open new avenues for developing sustainable blast intervention programs. Here, using molecular genetics and live-cell imaging, we dismantled M. oryzae glucose-metabolizing pathways to reveal that the transketolase enzyme, encoded by TKL1, plays an essential role in facilitating host colonization during rice blast disease. In the absence of transketolase, Δtkl1 mutant strains formed functional appressoria that penetrated rice cuticles successfully and developed invasive hyphae (IH in rice cells from primary hyphae. However, Δtkl1 could not undertake sustained biotrophic growth or cell-to-cell movement. Transcript data and observations using fluorescently labeled histone H1:RFP fusion proteins indicated Δtkl1 mutant strains were alive in host cells but were delayed in mitosis. Mitotic delay could be reversed and IH growth restored by the addition of exogenous ATP, a metabolite depleted in Δtkl1 mutant strains. We show that ATP might act via the TOR signaling pathway, and TOR is likely a downstream target of activation for TKL1. TKL1 is also involved in controlling the migration of appressorial nuclei into primary hyphae in host cells. When taken together, our results indicate transketolase has a novel role in mediating--via ATP and TOR signaling--an in planta-specific metabolic checkpoint that controls nuclear migration from appressoria into primary hyphae, prevents mitotic delay in early IH and promotes biotrophic growth. This work thus provides new information about the metabolic strategies employed by M

  13. The flavonoid eupatorin inactivates the mitotic checkpoint leading to polyploidy and apoptosis

    Energy Technology Data Exchange (ETDEWEB)

    Salmela, Anna-Leena [VTT Technical Research Centre of Finland, Medical Biotechnology, P.O. Box 106, Turku (Finland); Turku Graduate School of Biomedical Sciences, Turku (Finland); Turku Centre for Biotechnology, P.O. Box 123, University of Turku (Finland); Pouwels, Jeroen; Kukkonen-Macchi, Anu [VTT Technical Research Centre of Finland, Medical Biotechnology, P.O. Box 106, Turku (Finland); Waris, Sinikka; Toivonen, Pauliina [Turku Centre for Biotechnology, P.O. Box 123, University of Turku (Finland); Jaakkola, Kimmo [VTT Technical Research Centre of Finland, Medical Biotechnology, P.O. Box 106, Turku (Finland); Maeki-Jouppila, Jenni [VTT Technical Research Centre of Finland, Medical Biotechnology, P.O. Box 106, Turku (Finland); Turku Centre for Biotechnology, P.O. Box 123, University of Turku (Finland); Drug Discovery Graduate School, University of Turku (Finland); Kallio, Lila, E-mail: lila.kallio@vtt.fi [VTT Technical Research Centre of Finland, Medical Biotechnology, P.O. Box 106, Turku (Finland); Kallio, Marko J. [VTT Technical Research Centre of Finland, Medical Biotechnology, P.O. Box 106, Turku (Finland); Turku Centre for Biotechnology, P.O. Box 123, University of Turku (Finland); Centre of Excellence for Translational Genome-Scale Biology, P.O. Box 106, Academy of Finland (Finland)

    2012-03-10

    The spindle assembly checkpoint (SAC) is a conserved mechanism that ensures the fidelity of chromosome distribution in mitosis by preventing anaphase onset until the correct bipolar microtubule-kinetochore attachments are formed. Errors in SAC function may contribute to tumorigenesis by inducing numerical chromosome anomalies (aneuploidy). On the other hand, total disruption of SAC can lead to massive genomic imbalance followed by cell death, a phenomena that has therapeutic potency. We performed a cell-based high-throughput screen with a compound library of 2000 bioactives for novel SAC inhibitors and discovered a plant-derived phenolic compound eupatorin (3 Prime ,5-dihydroxy-4 Prime ,6,7-trimethoxyflavone) as an anti-mitotic flavonoid. The premature override of the microtubule drug-imposed mitotic arrest by eupatorin is dependent on microtubule-kinetochore attachments but not interkinetochore tension. Aurora B kinase activity, which is essential for maintenance of normal SAC signaling, is diminished by eupatorin in cells and in vitro providing a mechanistic explanation for the observed forced mitotic exit. Eupatorin likely has additional targets since eupatorin treatment of pre-mitotic cells causes spindle anomalies triggering a transient M phase delay followed by impaired cytokinesis and polyploidy. Finally, eupatorin potently induces apoptosis in multiple cancer cell lines and suppresses cancer cell proliferation in organotypic 3D cell culture model.

  14. Checkpoint Kinase Rad53 Couples Leading- and Lagging-Strand DNA Synthesis under Replication Stress.

    Science.gov (United States)

    Gan, Haiyun; Yu, Chuanhe; Devbhandari, Sujan; Sharma, Sushma; Han, Junhong; Chabes, Andrei; Remus, Dirk; Zhang, Zhiguo

    2017-10-19

    The checkpoint kinase Rad53 is activated during replication stress to prevent fork collapse, an essential but poorly understood process. Here we show that Rad53 couples leading- and lagging-strand synthesis under replication stress. In rad53-1 cells stressed by dNTP depletion, the replicative DNA helicase, MCM, and the leading-strand DNA polymerase, Pol ε, move beyond the site of DNA synthesis, likely unwinding template DNA. Remarkably, DNA synthesis progresses further along the lagging strand than the leading strand, resulting in the exposure of long stretches of single-stranded leading-strand template. The asymmetric DNA synthesis in rad53-1 cells is suppressed by elevated levels of dNTPs in vivo, and the activity of Pol ε is compromised more than lagging-strand polymerase Pol δ at low dNTP concentrations in vitro. Therefore, we propose that Rad53 prevents the generation of excessive ssDNA under replication stress by coordinating DNA unwinding with synthesis of both strands. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. The intelligence-security services and national security

    OpenAIRE

    Mijalković, Saša

    2011-01-01

    Since their inception, states have been trying to protect their vital interests and values more effectively, in which they are often impeded by other countries. At the same time, they seek to protect the internal order and security against the so-called internal enemy. Therefore, the states organize (national) security systems within their (state) systems, in which they form some specialized security entities. Among them, however, intelligence and security services are the ones that stand out...

  16. 49 CFR 1544.409 - Integrity of screener tests.

    Science.gov (United States)

    2010-10-01

    ... screening location, TSA may authorize an employee of one or more of the aircraft operators or foreign air..., screener, screener-in-charge, checkpoint security supervisor, or other screening supervisor. The employee... AND COMMERCIAL OPERATORS Screener Qualifications When the Aircraft Operator Performs Screening § 1544...

  17. Immune checkpoint inhibitor-induced gastrointestinal and hepatic injury: pathologists' perspective.

    Science.gov (United States)

    Karamchandani, Dipti M; Chetty, Runjan

    2018-04-27

    Immune checkpoint inhibitors (CPIs) are a relatively new class of 'miracle' dugs that have revolutionised the treatment and prognosis of some advanced-stage malignancies, and have increased the survival rates significantly. This class of drugs includes cytotoxic T lymphocyte antigen-4 inhibitors such as ipilimumab; programmed cell death protein-1 inhibitors such as nivolumab, pembrolizumab and avelumab; and programmed cell death protein ligand-1 inhibitors such as atezolizumab. These drugs stimulate the immune system by blocking the coinhibitory receptors on the T cells and lead to antitumoural response. However, a flip side of these novel drugs is immune-related adverse events (irAEs), secondary to immune-mediated process due to disrupted self-tolerance. The irAEs in the gastrointestinal (GI) tract/liver may result in diarrhoea, colitis or hepatitis. An accurate diagnosis of CPI-induced colitis and/or hepatitis is essential for optimal patient management. As we anticipate greater use of these drugs in the future given the significant clinical response, pathologists need to be aware of the spectrum of histological findings that may be encountered in GI and/or liver biopsies received from these patients, as well as differentiate them from its histopathological mimics. This present review discusses the clinical features, detailed histopathological features, management and the differential diagnosis of the luminal GI and hepatic irAEs that may be encountered secondary to CPI therapy. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  18. Calreticulin reveals a critical Ca2+ checkpoint in cardiac myofibrillogenesis

    Science.gov (United States)

    Li, Jian; Pucéat, Michel; Perez-Terzic, Carmen; Mery, Annabelle; Nakamura, Kimitoshi; Michalak, Marek; Krause, Karl-Heinz; Jaconi, Marisa E.

    2002-01-01

    Calreticulin (crt) is an ubiquitously expressed and multifunctional Ca2+-binding protein that regulates diverse vital cell functions, including Ca2+ storage in the ER and protein folding. Calreticulin deficiency in mice is lethal in utero due to defects in heart development and function. Herein, we used crt − / − embryonic stem (ES) cells differentiated in vitro into cardiac cells to investigate the molecular mechanisms underlying heart failure of knockout embryos. After 8 d of differentiation, beating areas were prominent in ES-derived wild-type (wt) embryoid bodies (EBs), but not in ES-derived crt − / − EBs, despite normal expression levels of cardiac transcription factors. Crt − / − EBs exhibited a severe decrease in expression and a lack of phosphorylation of ventricular myosin light chain 2 (MLC2v), resulting in an impaired organization of myofibrils. Crt − / − phenotype could be recreated in wt cells by chelating extracellular or cytoplasmic Ca2+ with EGTA or BAPTA, or by inhibiting Ca2+/calmodulin-dependent kinases (CaMKs). An imposed ionomycin-triggered cystolic-free Ca2+ concentration ([Ca2+]c) elevation restored the expression, phosphorylation, and insertion of MLC2v into sarcomeric structures and in turn the myofibrillogenesis. The transcription factor myocyte enhancer factor C2 failed to accumulate into nuclei of crt − / − cardiac cells in the absence of ionomycin-triggered [Ca2+]c increase. We conclude that the absence of calreticulin interferes with myofibril formation. Most importantly, calreticulin deficiency revealed the importance of a Ca2+-dependent checkpoint critical for early events during cardiac myofibrillogenesis. PMID:12105184

  19. Security intelligence a practitioner's guide to solving enterprise security challenges

    CERN Document Server

    Li, Qing

    2015-01-01

    Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo

  20. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  1. Security dialogues: building better relationships between security and business

    OpenAIRE

    Ashenden, Debi; Lawrence, Darren

    2016-01-01

    In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes. By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff.

  2. Enterprise security IT security solutions : concepts, practical experiences, technologies

    CERN Document Server

    Fumy, Walter

    2013-01-01

    Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cr

  3. Securing Chinese nuclear power development: further strengthening nuclear security

    International Nuclear Information System (INIS)

    Zhang Hui

    2014-01-01

    Chinese President Xi Jinping addresses China's new concept of nuclear security with four 'equal emphasis' at the third Nuclear Security Summit, and makes four commitments to strengthen nuclear security in the future. To convert President Xi's political commitments into practical, sustainable reality, China should take further steps to install a complete, reliable, and effective security system to ensure that all its nuclear materials and nuclear facilities are effectively protected against the full spectrum of plausible terrorist and criminal threats. This paper suggests the following measures be taken to improve China's existing nuclear security system, including updating and clarifying the requirements for a national level DBT; updating and enforcing existing regulations; further promoting nuclear security culture; balancing the costs of nuclear security, and further strengthening international cooperation on nuclear security. (author)

  4. To The Question Of The Concepts "National Security", "Information Security", "National Information Security" Meanings

    OpenAIRE

    Alexander A. Galushkin

    2015-01-01

    In the present article author analyzes value of the concepts "national security", "information security", "national information security". Author gives opinions of scientists-jurists, definitions given by legislators and normotvorets in various regulations.

  5. Parallel reorganization of protein function in the spindle checkpoint pathway through evolutionary paths in the fitness landscape that appear neutral in laboratory experiments.

    Directory of Open Access Journals (Sweden)

    Alex N Nguyen Ba

    2017-04-01

    Full Text Available Regulatory networks often increase in complexity during evolution through gene duplication and divergence of component proteins. Two models that explain this increase in complexity are: 1 adaptive changes after gene duplication, such as resolution of adaptive conflicts, and 2 non-adaptive processes such as duplication, degeneration and complementation. Both of these models predict complementary changes in the retained duplicates, but they can be distinguished by direct fitness measurements in organisms with short generation times. Previously, it has been observed that repeated duplication of an essential protein in the spindle checkpoint pathway has occurred multiple times over the eukaryotic tree of life, leading to convergent protein domain organization in its duplicates. Here, we replace the paralog pair in S. cerevisiae with a single-copy protein from a species that did not undergo gene duplication. Surprisingly, using quantitative fitness measurements in laboratory conditions stressful for the spindle-checkpoint pathway, we find no evidence that reorganization of protein function after gene duplication is beneficial. We then reconstruct several evolutionary intermediates from the inferred ancestral network to the extant one, and find that, at the resolution of our assay, there exist stepwise mutational paths from the single protein to the divergent pair of extant proteins with no apparent fitness defects. Parallel evolution has been taken as strong evidence for natural selection, but our results suggest that even in these cases, reorganization of protein function after gene duplication may be explained by neutral processes.

  6. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  7. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  8. Security patterns in practice designing secure architectures using software patterns

    CERN Document Server

    Fernandez-Buglioni, Eduardo

    2013-01-01

    Learn to combine security theory and code to produce secure systems Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. Written by the authority on security patterns, this unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML. Provides

  9. Database and applications security integrating information security and data management

    CERN Document Server

    Thuraisingham, Bhavani

    2005-01-01

    This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections, each of which focuses on a key concept of secure databases and applications, this book deals with all aspects of technology, including secure relational databases, inference problems, secure object databases, secure distributed databases and emerging

  10. The House of Security: Stakeholder Perceptions of Security Assessment and Importance

    OpenAIRE

    Ang, Wee Horng; Deng, Vicki; Lee, Yang; Madnick, Stuart; Mistree, Dinsha; Siegel, Michael; Strong, Diane

    2007-01-01

    In this paper we introduce a methodology for analyzing differences regarding security perceptions within and between stakeholders, and the elements which affect these perceptions. We have designed the €܈ouse of Security€ݬ a security assessment model that provides the basic framework for considering eight different constructs of security: Vulnerability, Accessibility, Confidentiality, Technology Resources for Security, Financial Resources for Security, Business Strategy for Security, Secur...

  11. Arabidopsis pdr2 reveals a phosphate-sensitive checkpoint in root development.

    Science.gov (United States)

    Ticconi, Carla A; Delatorre, Carla A; Lahner, Brett; Salt, David E; Abel, Steffen

    2004-03-01

    Plants have evolved complex strategies to maintain phosphate (Pi) homeostasis and to maximize Pi acquisition when the macronutrient is limiting. Adjustment of root system architecture via changes in meristem initiation and activity is integral to the acclimation process. However, the mechanisms that monitor external Pi status and interpret the nutritional signal remain to be elucidated. Here, we present evidence that the Pi deficiency response, pdr2, mutation disrupts local Pi sensing. The sensitivity and amplitude of metabolic Pi-starvation responses, such as Pi-responsive gene expression or accumulation of anthocyanins and starch, are enhanced in pdr2 seedlings. However, the most conspicuous alteration of pdr2 is a conditional short-root phenotype that is specific for Pi deficiency and caused by selective inhibition of root cell division followed by cell death below a threshold concentration of about 0.1 mm external Pi. Measurements of general Pi uptake and of total phosphorus (P) in root tips exclude a defect in high-affinity Pi acquisition. Rescue of root meristem activity in Pi-starved pdr2 by phosphite (Phi), a non-metabolizable Pi analog, and divided-root experiments suggest that pdr2 disrupts sensing of low external Pi availability. Thus, PDR2 is proposed to function at a Pi-sensitive checkpoint in root development, which monitors environmental Pi status, maintains and fine-tunes meristematic activity, and finally adjusts root system architecture to maximize Pi acquisition.

  12. The kinetochore proteins CENP-E and CENP-F directly and specifically interact with distinct BUB mitotic checkpoint Ser/Thr kinases.

    Science.gov (United States)

    Ciossani, Giuseppe; Overlack, Katharina; Petrovic, Arsen; Huis In 't Veld, Pim J; Koerner, Carolin; Wohlgemuth, Sabine; Maffini, Stefano; Musacchio, Andrea

    2018-05-10

    The segregation of chromosomes during cell division relies on the function of the kinetochores, protein complexes that physically connect chromosomes with microtubules of the spindle. The metazoan proteins, centromere protein E (CENP-E) and CENP-F, are components of a fibrous layer of mitotic kinetochores named the corona. Several of their features suggest that CENP-E and CENP-F are paralogs: they are very large (comprising approximately 2700 and 3200 residues, respectively), contain abundant predicted coiled-coil structures, are C-terminally prenylated, and are endowed with microtubule-binding sites at their termini. Moreover, CENP-E contains an ATP-hydrolyzing motor domain that promotes microtubule plus end-directed motion. Here, we show that both CENP-E and CENP-F are recruited to mitotic kinetochores independently of the main corona constituent, the Rod-Zwilch-ZW10 (RZZ) complex. We identified specific interactions of CENP-F and CENP-E with budding uninhibited by benzimidazole 1 (BUB1) and BUB1-related (BUBR1) mitotic checkpoint Ser/Thr kinases, respectively, paralogous proteins involved in mitotic checkpoint control and chromosome alignment. Whereas BUBR1 was dispensable for kinetochore localization of CENP-E, BUB1 was stringently required for CENP-F localization. Through biochemical reconstitution, we demonstrated that the CENP-E-BUBR1 and CENP-F-BUB1 interactions are direct and require similar determinants, a dimeric coiled-coil in CENP-E or CENP-F and a kinase domain in BUBR1 or BUB1. Our findings are consistent with the existence of structurally similar BUB1-CENP-F and BUBR1-CENP-E complexes, supporting the notion that CENP-E and CENP-F are evolutionarily related. Published under license by The American Society for Biochemistry and Molecular Biology, Inc.

  13. Securing Land Tenure, Improving Food Security and Reducing ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Securing Land Tenure, Improving Food Security and Reducing Poverty in Rural ... land tenure regimes as obstacles to food security, economic integration and ... its 2017 call for proposals to establish Cyber Policy Centres in the Global South.

  14. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  15. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  16. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  17. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  18. Enterprise Mac Security Mac OS X Snow Leopard Security

    CERN Document Server

    Edge, Stephen Charles; Hunter, Beau; Sullivan, Gene; LeBlanc, Dee-Ann

    2010-01-01

    A common misconception in the Mac community is that Mac's operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats. Enterprise Mac Security: Mac OS X Snow Leopard is a definitive, expert-driven update of the popular, slash-dotted first edition and was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing s

  19. Leveraging the checkpoint-restart technique for optimizing CPU efficiency of ATLAS production applications on opportunistic platforms

    CERN Document Server

    Cameron, David; The ATLAS collaboration

    2017-01-01

    Data processing applications of the ATLAS experiment, such as event simulation and reconstruction, spend considerable amount of time in the initialization phase. This phase includes loading a large number of shared libraries, reading detector geometry and condition data from external databases, building a transient representation of the detector geometry and initializing various algorithms and services. In some cases the initialization step can take as long as 10-15 minutes. Such slow initialization, being inherently serial, has a significant negative impact on overall CPU efficiency of the production job, especially when the job is executed on opportunistic, often short-lived, resources such as commercial clouds or volunteer computing. In order to improve this situation, we can take advantage of the fact that ATLAS runs large numbers of production jobs with similar configuration parameters (e.g. jobs within the same production task). This allows us to checkpoint one job at the end of its configuration step a...

  20. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  1. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  2. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  3. Inhibition of checkpoint kinase 1 sensitizes lung cancer brain metastases to radiotherapy

    International Nuclear Information System (INIS)

    Yang, Heekyoung; Yoon, Su Jin; Jin, Juyoun; Choi, Seung Ho; Seol, Ho Jun; Lee, Jung-Il

    2011-01-01

    Research highlights: → The most important therapeutic tool in brain metastasis is radiation therapy. → Radiosensitivity of cancer cells was enhanced with treatment of Chk1 inhibitor. → Depletion of Chk1 in cancer cells showed an enhancement of sensitivity to radiation. → Chk1 can be a good target for enhancement of radiosensitivity. -- Abstract: The most important therapeutic tool in brain metastasis is radiation therapy. However, resistance to radiation is a possible cause of recurrence or treatment failure. Recently, signal pathways about DNA damage checkpoints after irradiation have been noticed. We investigated the radiosensitivity can be enhanced with treatment of Chk1 inhibitor, AZD7762 in lung cancer cell lines and xenograft models of lung cancer brain metastasis. Clonogenic survival assays showed enhancement of radiosensitivity with AZD7762 after irradiation of various doses. AZD7762 increased ATR/ATM-mediated Chk1 phosphorylation and stabilized Cdc25A, suppressed cyclin A expression in lung cancer cell lines. In xenograft models of lung cancer (PC14PE6) brain metastasis, AZD7762 significantly prolonged the median survival time in response to radiation. Depletion of Chk1 using shRNA also showed an enhancement of sensitivity to radiation in PC14PE6 cells. The results of this study support that Chk1 can be a good target for enhancement of radiosensitivity.

  4. Checkpoint Kinase 1 Expression Predicts Poor Prognosis in Nigerian Breast Cancer Patients.

    Science.gov (United States)

    Ebili, Henry Okuchukwu; Iyawe, Victoria O; Adeleke, Kikelomo Rachel; Salami, Babatunde Abayomi; Banjo, Adekunbiola Aina; Nolan, Chris; Rakha, Emad; Ellis, Ian; Green, Andrew; Agboola, Ayodeji Olayinka Johnson

    2018-02-01

    Checkpoint kinase 1 (CHEK1), a DNA damage sensor and cell death pathway stimulator, is regarded as an oncogene in tumours, where its activities are considered essential for tumourigenesis and the survival of cancer cells treated with chemotherapy and radiotherapy. In breast cancer, CHEK1 expression has been associated with an aggressive tumour phenotype, the triple-negative breast cancer subtype, an aberrant response to tamoxifen, and poor prognosis. However, the relevance of CHEK1 expression has, hitherto, not been investigated in an indigenous African population. We therefore aimed to investigate the clinicopathological, biological, and prognostic significance of CHEK1 expression in a cohort of Nigerian breast cancer cases. Tissue microarrays of 207 Nigerian breast cancer cases were tested for CHEK1 expression using immunohistochemistry. The clinicopathological, molecular, and prognostic characteristics of CHEK1-positive tumours were determined using the Chi-squared test and Kaplan-Meier and Cox regression analyses in SPSS Version 16. Nuclear expression of CHEK1 was present in 61% of breast tumours and was associated with tumour size, triple-negative cancer, basal-like phenotype, the epithelial-mesenchymal transition, p53 over-expression, DNA homologous repair pathway dysfunction, and poor prognosis. The rate expression of CHEK1 is high in Nigerian breast cancer cases and is associated with an aggressive phenotype and poor prognosis.

  5. Pattern and security requirements engineering-based establishment of security standards

    CERN Document Server

    Beckers, Kristian

    2015-01-01

    Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standard

  6. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  7. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  8. The Role Of Commercially Provided Security in Africa's Patrimonial Security Complexes

    OpenAIRE

    Kinsey, Christopher; Krieg, Andreas

    2014-01-01

    With the concept of public security generally absent in Africa and a factionalized security sector of both state and non-state actors delivering security exclusively to certain groups affiliated with patrimonial elites, this paper examines the role of commercial providers of security within African security sectors. In factionalized security sectors with limited territorial reach, the state unable or unwilling to provide security as a public good within its boundaries has long lost its monopo...

  9. Drosophila Polo regulates the spindle assembly checkpoint through Mps1-dependent BubR1 phosphorylation.

    Science.gov (United States)

    Conde, Carlos; Osswald, Mariana; Barbosa, João; Moutinho-Santos, Tatiana; Pinheiro, Diana; Guimarães, Sofia; Matos, Irina; Maiato, Helder; Sunkel, Claudio E

    2013-06-12

    Maintenance of genomic stability during eukaryotic cell division relies on the spindle assembly checkpoint (SAC) that prevents mitotic exit until all chromosomes are properly attached to the spindle. Polo is a mitotic kinase proposed to be involved in SAC function, but its role has remained elusive. We demonstrate that Polo and Aurora B functional interdependency comprises a positive feedback loop that promotes Mps1 kinetochore localization and activity. Expression of constitutively active Polo restores normal Mps1 kinetochore levels even after Aurora B inhibition, highlighting a role for Polo in Mps1 recruitment to unattached kinetochores downstream of Aurora B. We also show that Mps1 kinetochore localization is required for BubR1 hyperphosphorylation and formation of the 3F3/2 phosphoepitope. This is essential to allow recruitment of Cdc20 to unattached kinetochores and the assembly of anaphase-promoting complex/cyclosome-inhibitory complexes to levels that ensure long-term SAC activity. We propose a model in which Polo controls Mps1-dependent BubR1 phosphorylation to promote Cdc20 kinetochore recruitment and sustained SAC function.

  10. A Development Framework for Software Security in Nuclear Safety Systems: Integrating Secure Development and System Security Activities

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jaekwan; Suh, Yongsuk [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-02-15

    The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

  11. Securing the Cloud Cloud Computer Security Techniques and Tactics

    CERN Document Server

    Winkler, Vic (JR)

    2011-01-01

    As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, o

  12. Requirement of Sequences outside the Conserved Kinase Domain of Fission Yeast Rad3p for Checkpoint Control

    Science.gov (United States)

    Chapman, Carolyn Riley; Evans, Sarah Tyler; Carr, Antony M.; Enoch, Tamar

    1999-01-01

    The fission yeast Rad3p checkpoint protein is a member of the phosphatidylinositol 3-kinase-related family of protein kinases, which includes human ATMp. Mutation of the ATM gene is responsible for the disease ataxia-telangiectasia. The kinase domain of Rad3p has previously been shown to be essential for function. Here, we show that although this domain is necessary, it is not sufficient, because the isolated kinase domain does not have kinase activity in vitro and cannot complement a rad3 deletion strain. Using dominant negative alleles of rad3, we have identified two sites N-terminal to the conserved kinase domain that are essential for Rad3p function. One of these sites is the putative leucine zipper, which is conserved in other phosphatidylinositol 3-kinase-related family members. The other is a novel motif, which may also mediate Rad3p protein–protein interactions. PMID:10512862

  13. The bacterial cell cycle checkpoint protein Obg and its role in programmed cell death

    Directory of Open Access Journals (Sweden)

    Liselot Dewachter

    2016-03-01

    Full Text Available The phenomenon of programmed cell death (PCD, in which cells initiate their own demise, is not restricted to multicellular organisms. Unicellular organisms, both eukaryotes and prokaryotes, also possess pathways that mediate PCD. We recently identified a PCD mechanism in Escherichia coli that is triggered by a mutant isoform of the essential GTPase ObgE (Obg of E. coli. Importantly, the PCD pathway mediated by mutant Obg (Obg* differs fundamentally from other previously described bacterial PCD pathways and thus constitutes a new mode of PCD. ObgE was previously proposed to act as a cell cycle checkpoint protein able to halt cell division. The implication of ObgE in the regulation of PCD further increases the similarity between this protein and eukaryotic cell cycle regulators that are capable of doing both. Moreover, since Obg is conserved in eukaryotes, the elucidation of this cell death mechanism might contribute to the understanding of PCD in higher organisms. Additionally, if Obg*-mediated PCD is conserved among different bacterial species, it will be a prime target for the development of innovative antibacterials that artificially induce this pathway.

  14. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    Science.gov (United States)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  15. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    Full Text Available According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-governmental organisations, communities, and individual citizens. This has immediate bearing on the everyday security reality of the Czech Republic. In international context, the “security frontier” of the Czech Republic is expanding, e.g. through the country’s involvement in UN and NATO security missions in conflict-ridden regions of Europe and the world. The country also helps enhance the internal security of the European Union, whose strength depends on its Member States’ willingness to “harmonise” the pursuit of their respective national security interests. This approach is especially important with regard to the principal security threats Europe faces and will continue to face in the future: terrorism and organised crime. It is vital that the Czech Republic have a well-working security system capable of responding effectively to a broad range of threats. This requirement applies first and foremost to the Police, the Fire and Rescue Service, and intelligence services. Unfortunately, with the present effectiveness of the Czech security system, much remains wishful thinking and, due to the lack of a comprehensive framework, a comparatively low level of protection against emergencies exists. Fight against crime is hampered by inefficient operation of the Police and judiciary. A thorough analysis of the aforementioned problems could provide basis for a broader public debate over the priorities and goals of Czech security policy, which should

  16. Modulation of dendritic cell and T cell cross-talk during aging: The potential role of checkpoint inhibitory molecules.

    Science.gov (United States)

    Gardner, Joanne K; Mamotte, Cyril D S; Jackaman, Connie; Nelson, Delia J

    2017-09-01

    Dendritic cells (DCs) undergo continuous changes throughout life, and there is evidence that elderly DCs have a reduced capacity to stimulate T cells, which may contribute to impaired anti-tumour immune responses in elderly people with cancer. Changes in checkpoint inhibitory molecules/pathways during aging may be one mechanism that impairs the ability of elderly DCs to activate T cells. However, little is currently known regarding the combined effects of aging and cancer on DC and T cell inhibitory molecules/pathways. In this review, we discuss our current understanding of the influence of aging and cancer on key DC and T cell inhibitory molecules/pathways, the potential underlying cellular and molecular mechanisms contributing to their modulation, and the possibility of therapeutically targeting inhibitory molecules in elderly cancer patients. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. Process Control/SCADA system vendor security awareness and security posture.

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Lüders, S.

    2009-01-01

    A starting point for the adequate security of process control/SCADA systems is the security awareness and security posture by the manufacturers, vendors, system integrators, and service organisations. The results of a short set of questions indicate that major security improvements are required in

  18. Information Security Service Branding – beyond information security awareness

    Directory of Open Access Journals (Sweden)

    Rahul Rastogi

    2012-12-01

    Full Text Available End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls and the resultant behavior and actions of end-users. However, end-users often have negative perception of information security in the organization and exhibit non-compliance. In order to improve compliance levels, it is vital to improve the image of information security in the minds of end-users. This paper borrows the concepts of brands and branding from the domain of marketing to achieve this objective and applies these concepts to information security. The paper also describes a process for creating the information security service brand in the organization.

  19. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  20. When the genome plays dice: circumvention of the spindle assembly checkpoint and near-random chromosome segregation in multipolar cancer cell mitoses.

    Science.gov (United States)

    Gisselsson, David; Håkanson, Ulf; Stoller, Patrick; Marti, Dominik; Jin, Yuesheng; Rosengren, Anders H; Stewénius, Ylva; Kahl, Fredrik; Panagopoulos, Ioannis

    2008-04-02

    Normal cell division is coordinated by a bipolar mitotic spindle, ensuring symmetrical segregation of chromosomes. Cancer cells, however, occasionally divide into three or more directions. Such multipolar mitoses have been proposed to generate genetic diversity and thereby contribute to clonal evolution. However, this notion has been little validated experimentally. Chromosome segregation and DNA content in daughter cells from multipolar mitoses were assessed by multiphoton cross sectioning and fluorescence in situ hybridization in cancer cells and non-neoplastic transformed cells. The DNA distribution resulting from multipolar cell division was found to be highly variable, with frequent nullisomies in the daughter cells. Time-lapse imaging of H2B/GFP-labelled multipolar mitoses revealed that the time from the initiation of metaphase to the beginning of anaphase was prolonged and that the metaphase plates often switched polarity several times before metaphase-anaphase transition. The multipolar metaphase-anaphase transition was accompanied by a normal reduction of cellular cyclin B levels, but typically occurred before completion of the normal separase activity cycle. Centromeric AURKB and MAD2 foci were observed frequently to remain on the centromeres of multipolar ana-telophase chromosomes, indicating that multipolar mitoses were able to circumvent the spindle assembly checkpoint with some sister chromatids remaining unseparated after anaphase. Accordingly, scoring the distribution of individual chromosomes in multipolar daughter nuclei revealed a high frequency of nondisjunction events, resulting in a near-binomial allotment of sister chromatids to the daughter cells. The capability of multipolar mitoses to circumvent the spindle assembly checkpoint system typically results in a near-random distribution of chromosomes to daughter cells. Spindle multipolarity could thus be a highly efficient generator of genetically diverse minority clones in transformed cell

  1. Case report on the role of radiofrequency-assisted spleen-preserving surgery for splenic metastasis in the era of check-point inhibitors.

    Science.gov (United States)

    Mudan, Satvinder; Kumar, Jayant; Mafalda, Neves C; Kusano, Tomokazu; Reccia, Isabella; Zanallato, Artur; Dalgleish, Angus; Habib, Nagy

    2017-12-01

    An isolated splenic metastasis is a rare phenomenon noted in advanced stage melanoma. We report the role of radiofrequency (RF) -based splenic-preserving splenectomy in a patient with a solitary splenic metastasis from advanced stage melanoma that was managed with checkpoint inhibitors. We report a case of a 60-year-old man who presented with multiple lung metastases and a solitary splenic metastasis with advanced stage melanoma following excision of primary from his trunk 2.3 years back. Considering the diagnosis of advanced stage melanoma with multiple lung metastases and a solitary splenic metastasis, and its ongoing progressive nature. This case was discussed in the tumour board meeting. A decision was made to commence treatment with immunotherapy in the form of PD-1 inhibitor (programmed cell death 1 receptor) pembrolizumab. Follow-up restaging computer tomography (CT) scan of the abdomen and chest showed a significant reduction in the lung and chest wall lesions, but the splenic lesion remained unchanged. Given the lack of response to treatment in the splenic metastasis and the significant decrease in lung metastases, the multidisciplinary team decided that a partial splenectomy combined with continued immunotherapy treatment would be appropriate as the success of immunotherapy was imminent within the splenic preservation. The postoperative recovery was smooth and the patient was discharged from hospital on the sixth postoperative day with normal platelets and white blood cells. The histopathological analysis of the resected specimen showed a metastatic melanoma with negative margins.At 10-month follow-up after the splenic resection the patient had not experienced further tumour recurrences. Spleen-preserving resection for an isolated, solitary splenic metastasis of melanoma is a feasible approach as it not only preserves the ongoing efficacy of checkpoint inhibitors by preserving the physiological T cell milieu, but the immunomodulation properties of RF can

  2. When the genome plays dice: circumvention of the spindle assembly checkpoint and near-random chromosome segregation in multipolar cancer cell mitoses.

    Directory of Open Access Journals (Sweden)

    David Gisselsson

    Full Text Available BACKGROUND: Normal cell division is coordinated by a bipolar mitotic spindle, ensuring symmetrical segregation of chromosomes. Cancer cells, however, occasionally divide into three or more directions. Such multipolar mitoses have been proposed to generate genetic diversity and thereby contribute to clonal evolution. However, this notion has been little validated experimentally. PRINCIPAL FINDINGS: Chromosome segregation and DNA content in daughter cells from multipolar mitoses were assessed by multiphoton cross sectioning and fluorescence in situ hybridization in cancer cells and non-neoplastic transformed cells. The DNA distribution resulting from multipolar cell division was found to be highly variable, with frequent nullisomies in the daughter cells. Time-lapse imaging of H2B/GFP-labelled multipolar mitoses revealed that the time from the initiation of metaphase to the beginning of anaphase was prolonged and that the metaphase plates often switched polarity several times before metaphase-anaphase transition. The multipolar metaphase-anaphase transition was accompanied by a normal reduction of cellular cyclin B levels, but typically occurred before completion of the normal separase activity cycle. Centromeric AURKB and MAD2 foci were observed frequently to remain on the centromeres of multipolar ana-telophase chromosomes, indicating that multipolar mitoses were able to circumvent the spindle assembly checkpoint with some sister chromatids remaining unseparated after anaphase. Accordingly, scoring the distribution of individual chromosomes in multipolar daughter nuclei revealed a high frequency of nondisjunction events, resulting in a near-binomial allotment of sister chromatids to the daughter cells. CONCLUSION: The capability of multipolar mitoses to circumvent the spindle assembly checkpoint system typically results in a near-random distribution of chromosomes to daughter cells. Spindle multipolarity could thus be a highly efficient

  3. Tousled-like kinase-dependent phosphorylation of Rad9 plays a role in cell cycle progression and G2/M checkpoint exit.

    Directory of Open Access Journals (Sweden)

    Ryan Kelly

    Full Text Available Genomic integrity is preserved by checkpoints, which act to delay cell cycle progression in the presence of DNA damage or replication stress. The heterotrimeric Rad9-Rad1-Hus1 (9-1-1 complex is a PCNA-like clamp that is loaded onto DNA at structures resulting from damage and is important for initiating and maintaining the checkpoint response. Rad9 possesses a C-terminal tail that is phosphorylated constitutively and in response to cell cycle position and DNA damage. Previous studies have identified tousled-like kinase 1 (TLK1 as a kinase that may modify Rad9. Here we show that Rad9 is phosphorylated in a TLK-dependent manner in vitro and in vivo, and that T355 within the C-terminal tail is the primary targeted residue. Phosphorylation of Rad9 at T355 is quickly reduced upon exposure to ionizing radiation before returning to baseline later in the damage response. We also show that TLK1 and Rad9 interact constitutively, and that this interaction is enhanced in chromatin-bound Rad9 at later stages of the damage response. Furthermore, we demonstrate via siRNA-mediated depletion that TLK1 is required for progression through S-phase in normally cycling cells, and that cells lacking TLK1 display a prolonged G2/M arrest upon exposure to ionizing radiation, a phenotype that is mimicked by over-expression of a Rad9-T355A mutant. Given that TLK1 has previously been shown to be transiently inactivated upon phosphorylation by Chk1 in response to DNA damage, we propose that TLK1 and Chk1 act in concert to modulate the phosphorylation status of Rad9, which in turn serves to regulate the DNA damage response.

  4. TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS

    OpenAIRE

    Sen-Tarng Lai

    2015-01-01

    E-commerce is an important information system in the network and digital age. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. How to improve ecommerce security has become a topic worthy of further exploration. Combining routine security test and security event detection procedures, this paper proposes the Two-Layer Secure ...

  5. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  6. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    Science.gov (United States)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  7. SecurID

    CERN Multimedia

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  8. A Security Audit Framework to Manage Information System Security

    Science.gov (United States)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  9. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  10. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    Science.gov (United States)

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  11. ICT security management

    OpenAIRE

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  12. Relaxing Chosen-Ciphertext Security

    DEFF Research Database (Denmark)

    Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper Buus

    2003-01-01

    Security against adaptive chosen ciphertext attacks (or, CCA security) has been accepted as the standard requirement from encryption schemes that need to withstand active attacks. In particular, it is regarded as the appropriate security notion for encryption schemes used as components within...... general protocols and applications. Indeed, CCA security was shown to suffice in a large variety of contexts. However, CCA security often appears to be somewhat too strong: there exist encryption schemes (some of which come up naturally in practice) that are not CCA secure, but seem sufficiently secure...... “for most practical purposes.” We propose a relaxed variant of CCA security, called Replayable CCA (RCCA) security. RCCA security accepts as secure the non-CCA (yet arguably secure) schemes mentioned above; furthermore, it suffices for most existing applications of CCA security. We provide three...

  13. Cyber security awareness toolkit for national security: an approach to South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives...

  14. Information security architecture an integrated approach to security in the organization

    CERN Document Server

    Killmeyer, Jan

    2000-01-01

    An information security architecture is made up of several components. Each component in the architecture focuses on establishing acceptable levels of control. These controls are then applied to the operating environment of an organization. Functionally, information security architecture combines technical, practical, and cost-effective solutions to provide an adequate and appropriate level of security.Information Security Architecture: An Integrated Approach to Security in the Organization details the five key components of an information security architecture. It provides C-level executives

  15. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  16. Security threads: effective security devices in the past, present, and future

    Science.gov (United States)

    Wolpert, Gary R.

    2002-04-01

    Security threads were first used to secure banknotes in the mid 1800's. The key to their anti-counterfeiting success was the fact that by being embedded in the paper, they became an integral part of the banknote substrate. Today, all major currencies still utilize this effective security feature. Technological developments have allowed security threads to evolve from a feature authenticated by only visual means to devices that incorporate both visual and machine detectable components. When viewed from the perspective of a thread being a carrier of various security technologies and the fact that they can be incorporated into the core substrate of banknotes, documents, labels, packaging and some high valued articles, it is clear that security threads will remain as effective security devices well into the future. This paper discusses a brief historical background of security threads, current visual and machine authentication technologies incorporated into threads today and a look to the future of threads as effective security devices.

  17. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  18. Human papillomavirus type 16 E7 oncoprotein engages but does not abrogate the mitotic spindle assembly checkpoint

    Energy Technology Data Exchange (ETDEWEB)

    Yu, Yueyang [Division of Infectious Diseases, Brigham and Women' s Hospital and Biological and Biomedical Sciences Program, Harvard Medical School, Boston, MA 02115 (United States); Munger, Karl, E-mail: kmunger@rics.bwh.harvard.edu [Division of Infectious Diseases, Brigham and Women' s Hospital and Biological and Biomedical Sciences Program, Harvard Medical School, Boston, MA 02115 (United States)

    2012-10-10

    The mitotic spindle assembly checkpoint (SAC) ensures faithful chromosome segregation during mitosis by censoring kinetochore-microtubule interactions. It is frequently rendered dysfunctional during carcinogenesis causing chromosome missegregation and genomic instability. There are conflicting reports whether the HPV16 E7 oncoprotein drives chromosomal instability by abolishing the SAC. Here we report that degradation of mitotic cyclins is impaired in cells with HPV16 E7 expression. RNAi-mediated depletion of Mad2 or BubR1 indicated the involvement of the SAC, suggesting that HPV16 E7 expression causes sustained SAC engagement. Mutational analyses revealed that HPV16 E7 sequences that are necessary for retinoblastoma tumor suppressor protein binding as well as sequences previously implicated in binding the nuclear and mitotic apparatus (NuMA) protein and in delocalizing dynein from the mitotic spindle contribute to SAC engagement. Importantly, however, HPV16 E7 does not markedly compromise the SAC response to microtubule poisons.

  19. Molecular Checkpoint Decisions Made by Subverted Vascular Niche Transform Indolent Tumor Cells into Chemoresistant Cancer Stem Cells.

    Science.gov (United States)

    Cao, Zhongwei; Scandura, Joseph M; Inghirami, Giorgio G; Shido, Koji; Ding, Bi-Sen; Rafii, Shahin

    2017-01-09

    Tumor-associated endothelial cells (TECs) regulate tumor cell aggressiveness. However, the core mechanism by which TECs confer stem cell-like activity to indolent tumors is unknown. Here, we used in vivo murine and human tumor models to identify the tumor-suppressive checkpoint role of TEC-expressed insulin growth factor (IGF) binding protein-7 (IGFBP7/angiomodulin). During tumorigenesis, IGFBP7 blocks IGF1 and inhibits expansion and aggresiveness of tumor stem-like cells (TSCs) expressing IGF1 receptor (IGF1R). However, chemotherapy triggers TECs to suppress IGFBP7, and this stimulates IGF1R + TSCs to express FGF4, inducing a feedforward FGFR1-ETS2 angiocrine cascade that obviates TEC IGFBP7. Thus, loss of IGFBP7 and upregulation of IGF1 activates the FGF4-FGFR1-ETS2 pathway in TECs and converts naive tumor cells to chemoresistant TSCs, thereby facilitating their invasiveness and progression. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  1. Obsessive-Compulsive Homeland Security: Insights from the Neurobiological Security Motivation System

    Science.gov (United States)

    2018-03-01

    HOMELAND SECURITY: INSIGHTS FROM THE NEUROBIOLOGICAL SECURITY MOTIVATION SYSTEM by Marissa D. Madrigal March 2018 Thesis Advisor...FROM THE NEUROBIOLOGICAL SECURITY MOTIVATION SYSTEM 5. FUNDING NUMBERS 6. AUTHOR(S) Marissa D. Madrigal 7. PERFORMING ORGANIZATION NAME(S) AND...how activation of the neurobiological security- motivation system can lead to securitization in response to a security speech act. It explores the model

  2. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  3. Software Security and the "Building Security in Maturity" Model

    CERN Document Server

    CERN. Geneva

    2011-01-01

    Using the framework described in my book "Software Security: Building Security In" I will discuss and describe the state of the practice in software security. This talk is peppered with real data from the field, based on my work with several large companies as a Cigital consultant. As a discipline, software security has made great progress over the last decade. Of the sixty large-scale software security initiatives we are aware of, thirty-two---all household names---are currently included in the BSIMM study. Those companies among the thirty-two who graciously agreed to be identified include: Adobe, Aon, Bank of America, Capital One, The Depository Trust & Clearing Corporation (DTCC), EMC, Google, Intel, Intuit, McKesson, Microsoft, Nokia, QUALCOMM, Sallie Mae, Standard Life, SWIFT, Symantec, Telecom Italia, Thomson Reuters, VMware, and Wells Fargo. The BSIMM was created by observing and analyzing real-world data from thirty-two leading software security initiatives. The BSIMM can...

  4. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  5. Critical Perspective on ASEAN's Security Policy Under ASEAN Political and Security Community

    Directory of Open Access Journals (Sweden)

    Irawan Jati

    2016-03-01

    Full Text Available   Despite economic integration challenges, ASEAN faces greater security challenges. It is obvious to assert that a stable economic development requires a secure regional atmosphere. The most probable threats against ASEAN are ranging from hostile foreign entities infiltration, intra and inter states disputes, radical religious movements, human trafficking, drugs and narcotics smuggling, cybercrimes and environmental disasters. In 2009, ASEAN established the ASEAN Political and Security Community as the umbrella of ASEAN’s political and security initiatives. APSC slots in some significant fora; ASEAN Intergovernmental Commission on Human Rights (AICHR, ASEAN Foreign Ministers Meeting (AMM,  ASEAN Regional Forum (ARF, ASEAN Defense Minister’s Meeting (ADMM, ASEAN Law Ministers Meeting (ALAWMM, and ASEAN Ministerial Meeting on Transnational Crimes (AMMTC. The wide array of these forums signify ASEAN efforts to confront double features of security; the traditional and nontraditional or critical security. The traditional security considers state security as the primary object security. While the critical security tends to focus on non-state aspects such as individual human being as its referent object. Even though some argue that APSC has been able to preserve the stability in the region, it still lack of confidence in solving critical issues such as territorial disputes and irregular migrants problems.Therefore, this piece would examine the fundamental questions: How does ASEAN address beyond state security issues in its security policy through APSC? To search for the answer this paper would apply critical security studies approach. Critical security posits that threats are not always for the states but in many cases for the people. Based on the examination of ASEAN security policies, this paper argues that ASEAN’s security policy has touched the non-traditional security issues but showing slow progress on its development and application. 

  6. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  7. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  8. Job security or employment security : What's in a name?

    NARCIS (Netherlands)

    Zekic, Nuna

    2016-01-01

    The main aim of the article is to survey and conceptualize the place of employment security in labour law, and to explore a number of important legal questions relating to this concept. After scrutinizing the notion of employment security, the author endorses the view that job security that exists

  9. Unification of Information Security Policies for Network Security Solutions

    Directory of Open Access Journals (Sweden)

    D.S. Chernyavskiy

    2012-03-01

    Full Text Available Diversity of command languages on network security solutions’ (NSS interfaces causes problems in a process of information security policy (ISP deployment. Unified model for security policy representation and implementation in NSS could aid to avoid such problems and consequently enhance efficiency of the process. The proposed solution is Unified language for network security policy (ULNSP. The language is based on formal languages theory, and being coupled with its translator, ULNSP makes it possible to formalize and implement ISP independently of particular NSS.

  10. Computers, business, and security the new role for security

    CERN Document Server

    Schweitzer, James A

    1987-01-01

    Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the total security programs.Organized into three parts encompassing 10 chapters, this book begins with an overview of how the developing information age is affecting business management, operations, and organization. This text then examines a number of vulnerabilities that arise in the process of using business computing and communicat

  11. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    National Research Council Canada - National Science Library

    Ganger, Gregory R

    2007-01-01

    This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security...

  12. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Science.gov (United States)

    2010-10-01

    ... requirements-national security contracts. 1352.237-72 Section 1352.237-72 Federal Acquisition Regulations... Provisions and Clauses 1352.237-72 Security processing requirements—national security contracts. As prescribed in 48 CFR 1337.110-70(d), use the following clause: Security Processing Requirements—National...

  13. RPA mediates recombination repair during replication stress and is displaced from DNA by checkpoint signalling in human cells

    DEFF Research Database (Denmark)

    Sleeth, Kate M; Sørensen, Claus Storgaard; Issaeva, Natalia

    2007-01-01

    The replication protein A (RPA) is involved in most, if not all, nuclear metabolism involving single-stranded DNA. Here, we show that RPA is involved in genome maintenance at stalled replication forks by the homologous recombination repair system in humans. Depletion of the RPA protein inhibited...... the formation of RAD51 nuclear foci after hydroxyurea-induced replication stalling leading to persistent unrepaired DNA double-strand breaks (DSBs). We demonstrate a direct role of RPA in homology directed recombination repair. We find that RPA is dispensable for checkpoint kinase 1 (Chk1) activation...... and that RPA directly binds RAD52 upon replication stress, suggesting a direct role in recombination repair. In addition we show that inhibition of Chk1 with UCN-01 decreases dissociation of RPA from the chromatin and inhibits association of RAD51 and RAD52 with DNA. Altogether, our data suggest a direct role...

  14. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  15. Securing collaborative environments

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  16. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  17. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  18. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  19. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  20. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation

    Directory of Open Access Journals (Sweden)

    Triana Mugia Rahayu

    2015-06-01

    Full Text Available The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

  1. Windows 2012 Server network security securing your Windows network systems and infrastructure

    CERN Document Server

    Rountree, Derrick

    2013-01-01

    Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall

  2. Using the safety/security interface to the security manager's advantage

    International Nuclear Information System (INIS)

    Stapleton, B.W.

    1993-01-01

    Two aspects of the safety/security interface are discussed: (1) the personal safety of nuclear security officers; and (2) how the security manager can effectively deal with the safety/security interface in solving today's requirements yet supporting the overall mission of the facility. The basis of this presentation is the result of interviews, document analyses, and observations. The conclusion is that proper planning and communication between the players involved in the security/safety interface can benefit the two programs and help achieve overall system integration, ultimately contributing to the bottom line. This is especially important in today's cost conscious environment

  3. Is there a role for immune checkpoint blockade with ipilimumab in prostate cancer?

    International Nuclear Information System (INIS)

    Cha, Edward; Small, Eric J

    2013-01-01

    Treatment for advanced prostate cancer has and will continue to grow increasingly complex, owing to the introduction of multiple new therapeutic approaches with the potential to substantially improve outcomes for this disease. Agents that modulate the patient's immune system to fight prostate cancer – immunotherapeutics – are among the most exciting of these new approaches. The addition of antigen-specific immunotherapy to the treatment of castration-resistant prostate cancer (CRPC) has paved the way for additional research that seeks to augment the activity of the immune system itself. The monoclonal antibody ipilimumab, approved in over 40 countries to treat advanced melanoma and currently under phase 2 and 3 investigation in prostate cancer, is thought to act by augmenting immune responses to tumors through blockade of cytotoxic T-lymphocyte antigen 4, an inhibitory immune checkpoint molecule. Ipilimumab has been studied in seven phase 1 and 2 clinical trials that evaluated various doses, schedules, and combinations across the spectrum of patients with advanced prostate cancer. The CRPC studies of ipilimumab to date suggest that the agent is active in prostate cancer as monotherapy or in combination with radiotherapy, docetaxel, or other immunotherapeutics, and that the adverse event profile is as expected given the safety data in advanced melanoma. The ongoing phase 3 program will further characterize the risk/benefit profile of ipilimumab in chemotherapy-naïve and -pretreated CRPC

  4. What kind of cyber security? Theorising cyber security and mapping approaches

    OpenAIRE

    Laura Fichtner

    2018-01-01

    Building on conceptual work on security and cyber security, the paper explores how different approaches to cyber security are constructed. It outlines structural components and presents four common approaches. Each of them suggests a different role for the actors involved and is motivated and justified by different values such as privacy, economic order and national security. When a cyber security policy or initiative is chosen by policymakers, the analysis of the underlying approach enhances...

  5. 17 CFR 404.5 - Securities counts by registered government securities brokers and dealers.

    Science.gov (United States)

    2010-04-01

    ... registered government securities brokers and dealers. 404.5 Section 404.5 Commodity and Securities Exchanges... AND PRESERVATION OF RECORDS § 404.5 Securities counts by registered government securities brokers and dealers. (a) Securities counts. Every registered government securities broker or dealer shall comply with...

  6. 12 CFR 615.5454 - Creation of participant's security entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Creation of participant's security entitlement... Procedures for Farm Credit Securities § 615.5454 Creation of participant's security entitlement; security... public money, including without limitation deposits to the Treasury tax and loan accounts, or other...

  7. 12 CFR 1511.4 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Creation of Participant's Security Entitlement... CORPORATION BOOK-ENTRY PROCEDURE § 1511.4 Creation of Participant's Security Entitlement; security interests... to secure deposits of public money, including without limitation deposits to the Treasury tax and...

  8. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    Science.gov (United States)

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  9. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  10. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  11. Polish Security Printing Works in the system of public and economic security

    OpenAIRE

    Remigiusz Lewandowski

    2013-01-01

    The article raises the issue of placing PWPW in the system of economic and public security. Two particular categories of security connected with PWPW business activity, i.e. identification and transactional security, have been defined and discussed in the article. The most essential factors affecting the above security categories as well as relations between identification/transactional security and economic/public security. The article indicates that PWPW plays an important role in the state...

  12. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  13. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Creation of Participant's Security... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's... Entitlement of a Participant in favor of the United States to secure deposits of public money, including...

  14. G2 checkpoint abrogator abates the antagonistic interaction between antimicrotubule drugs and radiation therapy

    International Nuclear Information System (INIS)

    Sui Meihua; Zhang Hongfang; Di Xiaoyun; Chang Jinjia; Shen Youqing; Fan Weimin

    2012-01-01

    Background and purpose: We previously demonstrated that radiation may arrest tumor cells at G2 phase, which in turn prevents the cytotoxicity of antimicrotubule drugs and results in antagonistic interaction between these two modalities. Herein we tested whether G2 abrogators would attenuate the above antagonistic interaction and improve the therapeutic efficacy of combination therapy between radiation and antimicrotubule drugs. Materials and methods: Breast cancer BCap37 and epidermoid carcinoma KB cell lines were administered with radiation, UCN-01 (a model drug of G2 abrogator), paclitaxel or vincristine, alone or in combinations. The antitumor activities of single and combined treatments were analyzed by a series of cytotoxic, apoptotic, cell cycle, morphological and biochemical assays. Results: UCN-01 significantly enhanced the cytotoxicity of radiation, antimitotic drugs, and their combined treatments in vitro. Further investigations demonstrated that UCN-01 attenuated radiation-induced G2 arrest, and subsequently repressed the inhibitory effect of radiation on drug-induced mitotic arrest and apoptosis. Conclusions: This is the first report demonstrating that G2 checkpoint abrogation represses the inhibitory effect of radiation on antimicrotubule drugs, which may be implicated in cancer combination therapy. Considering that G2 abrogators are under extensive evaluation for cancer treatment, our findings provide valuable information for this class of promising compounds.

  15. 6 CFR 7.10 - Authority of the Chief Security Officer, Office of Security.

    Science.gov (United States)

    2010-01-01

    ...) Direct and administer DHS implementation and compliance with the National Industrial Security Program in... 6 Domestic Security 1 2010-01-01 2010-01-01 false Authority of the Chief Security Officer, Office of Security. 7.10 Section 7.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE...

  16. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  17. Leptin Regulation of Gonadotrope Gonadotropin-Releasing Hormone Receptors As a Metabolic Checkpoint and Gateway to Reproductive Competence

    Directory of Open Access Journals (Sweden)

    Angela K. Odle

    2018-01-01

    Full Text Available The adipokine leptin signals the body’s nutritional status to the brain, and particularly, the hypothalamus. However, leptin receptors (LEPRs can be found all throughout the body and brain, including the pituitary. It is known that leptin is permissive for reproduction, and mice that cannot produce leptin (Lep/Lep are infertile. Many studies have pinpointed leptin’s regulation of reproduction to the hypothalamus. However, LEPRs exist at all levels of the hypothalamic–pituitary–gonadal axis. We have previously shown that deleting the signaling portion of the LEPR specifically in gonadotropes impairs fertility in female mice. Our recent studies have targeted this regulation to the control of gonadotropin releasing hormone receptor (GnRHR expression. The hypotheses presented here are twofold: (1 cyclic regulation of pituitary GnRHR levels sets up a target metabolic checkpoint for control of the reproductive axis and (2 multiple checkpoints are required for the metabolic signaling that regulates the reproductive axis. Here, we emphasize and explore the relationship between the hypothalamus and the pituitary with regard to the regulation of GnRHR. The original data we present strengthen these hypotheses and build on our previous studies. We show that we can cause infertility in 70% of female mice by deleting all isoforms of LEPR specifically in gonadotropes. Our findings implicate activin subunit (InhBa mRNA as a potential leptin target in gonadotropes. We further show gonadotrope-specific upregulation of GnRHR protein (but not mRNA levels following leptin stimulation. In order to try and understand this post-transcriptional regulation, we tested candidate miRNAs (identified with in silico analysis that may be binding the Gnrhr mRNA. We show significant upregulation of one of these miRNAs in our gonadotrope-Lepr-null females. The evidence provided here, combined with our previous work, lay the foundation for metabolically regulated post

  18. Center for Homeland Defense and Security Homeland Security Affairs Journal

    OpenAIRE

    2015-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  19. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  20. 18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Creation of Participant... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A... Security Entitlement of a Participant in favor of the United States to secure deposits of public money...

  1. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  2. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  3. Pro PHP Security From Application Security Principles to the Implementation of XSS Defenses

    CERN Document Server

    Snyder, Chris; Southwell, Michael

    2010-01-01

    PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also dive into recent developments like mobile security, the impact of Javascript, and the advantages of recent PHP hardening efforts. Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a l

  4. The Extended Concept of Security and the Czech Security Practice

    OpenAIRE

    Libor Stejskal; Antonín Rašek; Miloš Balabán

    2008-01-01

    According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-govern...

  5. Information technology - Security techniques - Information security management systems - Requirements

    CERN Document Server

    International Organization for Standardization. Geneva

    2005-01-01

    ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

  6. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  7. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  8. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  9. Audit Teknologiinformasiatas Physical Security Control Dan Logical Security Control Serta Penentuan Kondisi Security Risk Studi Kasus: PT Talc Indonesia

    OpenAIRE

    Inggrid; Arfianti, Rizka I; Utami, Viany

    2009-01-01

    Abstract The fast growth of technology has an impact to the accounting field. This relates to the term of information technology (17) auditing. One of the risI6 of using information technology in business which can be fatal enough i fignored is security risk Security risk can be reduced by security controls which include physical security control and logical security contra Information technology auditing is the process of collecting and evaluating evidence to determine whether or not a co...

  10. PCI DSS: Security Standard and Security in Fact

    OpenAIRE

    M. V. Kuzin

    2011-01-01

    The article focuses on Payment Card Industry Data Security Standard (PCI DSS) requirements and practices, especially it’s issues and disadvantages to achieve the main goal — security of payment cards infrastructure.

  11. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  12. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  13. Smart grid security

    Energy Technology Data Exchange (ETDEWEB)

    Cuellar, Jorge (ed.) [Siemens AG, Muenchen (Germany). Corporate Technology

    2013-11-01

    The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains the following papers: 1. IT Security Architecture Approaches for Smart Metering and Smart Grid. 2. Smart Grid Information Exchange - Securing the Smart Grid from the Ground. 3. A Tool Set for the Evaluation of Security and Reliability in Smart Grids. 4. A Holistic View of Security and Privacy Issues in Smart Grids. 5. Hardware Security for Device Authentication in the Smart Grid. 6. Maintaining Privacy in Data Rich Demand Response Applications. 7. Data Protection in a Cloud-Enabled Smart Grid. 8. Formal Analysis of a Privacy-Preserving Billing Protocol. 9. Privacy in Smart Metering Ecosystems. 10. Energy rate at home Leveraging ZigBee to Enable Smart Grid in Residential Environment.

  14. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  15. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  16. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  17. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  18. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  19. Security Inequalities in North America: Reassessing Regional Security Complex Theory

    Directory of Open Access Journals (Sweden)

    Richard Kilroy

    2017-12-01

    Full Text Available This article re-evaluates earlier work done by the authors on Regional Security Complex Theory (RSCT in North America, using sectoral analysis initially developed by Buzan and Waever, but also adding the variables of institutions, identity, and interests. These variables are assessed qualitatively in the contemporary context on how they currently impress upon the process of securitization within sectoral relations between Canada, Mexico, and the United States. The article reviews the movement from bilateral security relations between these states to the development of a trilateral response to regional security challenges post- 9/11. It further addresses the present period and what appears to be a security process derailed by recent political changes and security inequalities, heightened by the election of Donald Trump in 2016. The article argues that while these three states initially evinced a convergence of regional security interests after 9/11, which did create new institutional responses, under the current conditions, divergence in political interests and security inequalities have reduced the explanatory power of RSCT in North America. Relations between states in North American are becoming less characterized by the role of institutions and interests and more by identity politics in the region.

  20. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  1. PCI DSS: Security Standard and Security in Fact

    Directory of Open Access Journals (Sweden)

    M. V. Kuzin

    2011-12-01

    Full Text Available The article focuses on Payment Card Industry Data Security Standard (PCI DSS requirements and practices, especially it’s issues and disadvantages to achieve the main goal — security of payment cards infrastructure.

  2. Why SCADA security is NOT like Computer Centre Security

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    Today, the industralized world lives in symbiosis with control systems (aka SCADA systems): it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and discuss the differences (or not) between computer center cyber-security and control system cyber-security.

  3. European [Security] Union

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three...... of these policies involved the navigation and negotiation of security, borders and governance in and by the European Union (EU). This article analyses these practices of bordering and governance through a five-fold security framework. The article argues that a richer understanding of EU security discourses can...

  4. Final Report: Migration Mechanisms for Large-scale Parallel Applications

    Energy Technology Data Exchange (ETDEWEB)

    Jason Nieh

    2009-10-30

    software environments, (4) network checkpoint-restart and migration of distributed and parallel applications, (5) a utility computing infrastructure for mobile desktop cloud computing based on process checkpoint-restart and migration functionality, (6) a process migration security architecture for protecting applications and infrastructure from denial-of-service attacks, and (7) a checkpoint-restart mobile computing system using portable storage devices.

  5. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t ... in the universal composability (UC) framework (based on a network of secure channels, a broadcast channel, and a common reference string). It achieves the bound on the trade-off between robustness and privacy shown by Ishai et al. [CRYPTO'06] and Katz [STOC'07], the bound on fairness shown by Cleve [STOC'86...

  6. The Aurora-B-dependent NoCut checkpoint prevents damage of anaphase bridges after DNA replication stress.

    Science.gov (United States)

    Amaral, Nuno; Vendrell, Alexandre; Funaya, Charlotta; Idrissi, Fatima-Zahra; Maier, Michael; Kumar, Arun; Neurohr, Gabriel; Colomina, Neus; Torres-Rosell, Jordi; Geli, María-Isabel; Mendoza, Manuel

    2016-05-01

    Anaphase chromatin bridges can lead to chromosome breakage if not properly resolved before completion of cytokinesis. The NoCut checkpoint, which depends on Aurora B at the spindle midzone, delays abscission in response to chromosome segregation defects in yeast and animal cells. How chromatin bridges are detected, and whether abscission inhibition prevents their damage, remain key unresolved questions. We find that bridges induced by DNA replication stress and by condensation or decatenation defects, but not dicentric chromosomes, delay abscission in a NoCut-dependent manner. Decatenation and condensation defects lead to spindle stabilization during cytokinesis, allowing bridge detection by Aurora B. NoCut does not prevent DNA damage following condensin or topoisomerase II inactivation; however, it protects anaphase bridges and promotes cellular viability after replication stress. Therefore, the molecular origin of chromatin bridges is critical for activation of NoCut, which plays a key role in the maintenance of genome stability after replicative stress.

  7. The Spindle Assembly Checkpoint Is Not Essential for Viability of Human Cells with Genetically Lowered APC/C Activity

    DEFF Research Database (Denmark)

    Wild, Thomas; Larsen, Marie Sofie Yoo; Narita, Takeo

    2016-01-01

    The anaphase-promoting complex/cyclosome (APC/C) and the spindle assembly checkpoint (SAC), which inhibits the APC/C, are essential determinants of mitotic timing and faithful division of genetic material. Activation of the APC/C is known to depend on two APC/C-interacting E2 ubiquitin......-conjugating enzymes-UBE2C and UBE2S. We show that APC/C activity in human cells is tuned by the combinatorial use of three E2s, namely UBE2C, UBE2S, and UBE2D. Genetic deletion of UBE2C and UBE2S, individually or in combination, leads to discriminative reduction in APC/C function and sensitizes cells to UBE2D...... depletion. Reduction of APC/C activity results in loss of switch-like metaphase-to-anaphase transition and, strikingly, renders cells insensitive to chemical inhibition of MPS1 and genetic ablation of MAD2, both of which are essential for the SAC. These results provide insights into the regulation of APC...

  8. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  9. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  10. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  11. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security background checks for secure transfer of nuclear... PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security background checks for secure transfer of nuclear materials. Licensees are excepted from the security...

  12. Finance/security/life.

    OpenAIRE

    Langley, P.

    2017-01-01

    What is the contemporary relation between finance and security? This essay encourages further research into the securitization of finance by developing the notion of ‘finance/security/life’. A focus on the intersections of finance/security/life will be shown to prompt a broadened range of critical, cross-disciplinary concerns with the various ways in which financial markets are positioned as vital to securing wealth, welfare and wellbeing.

  13. Rethinking energy security in Asia. A non-traditional view of human security

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  14. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  15. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  16. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  17. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  18. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  19. Computer Security: SAHARA - Security As High As Reasonably Achievable

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    History has shown us time and again that our computer systems, computing services and control systems have digital security deficiencies. Too often we deploy stop-gap solutions and improvised hacks, or we just accept that it is too late to change things.    In my opinion, this blatantly contradicts the professionalism we show in our daily work. Other priorities and time pressure force us to ignore security or to consider it too late to do anything… but we can do better. Just look at how “safety” is dealt with at CERN! “ALARA” (As Low As Reasonably Achievable) is the objective set by the CERN HSE group when considering our individual radiological exposure. Following this paradigm, and shifting it from CERN safety to CERN computer security, would give us “SAHARA”: “Security As High As Reasonably Achievable”. In other words, all possible computer security measures must be applied, so long as ...

  20. What kind of cyber security? Theorising cyber security and mapping approaches

    Directory of Open Access Journals (Sweden)

    Laura Fichtner

    2018-05-01

    Full Text Available Building on conceptual work on security and cyber security, the paper explores how different approaches to cyber security are constructed. It outlines structural components and presents four common approaches. Each of them suggests a different role for the actors involved and is motivated and justified by different values such as privacy, economic order and national security. When a cyber security policy or initiative is chosen by policymakers, the analysis of the underlying approach enhances our understanding of how this shapes relationships between actors and of the values prioritised, promoted and inscribed into the concerned technologies.

  1. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  2. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  3. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  4. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  5. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Science.gov (United States)

    2010-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  6. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  7. Lecture 1: General Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  8. CLOUD SECURITY AND COMPLIANCE - A SEMANTIC APPROACH IN END TO END SECURITY

    OpenAIRE

    Kalaiprasath, R.; Elankavi, R.; Udayakumar, R.

    2017-01-01

    The Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere to security and privacy policies to ensure their users' data remains confidential and secure. Though there are some ongoing efforts on developing cloud security standards, most cloud providers are implementing a mish-mash of security and privacy controls. This has led to confusion among cloud consumers as to what security measures they should expect from the cloud services, and whether thes...

  9. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  10. Game based cyber security training: are serious games suitable for cyber security training?

    OpenAIRE

    Hendrix, Maurice; Al-Sherbaz, Ali; Victoria, Bloom

    2016-01-01

    Security research and training is attracting a lot of investment and interest from governments and the private sector. Most efforts have focused on physical security, while cyber security or digital security has been given less importance. With recent high-profile attacks it has become clear that training in cyber security is needed. Serious Games have the capability to be effective tools for public engagement and behavioural change and role play games, are already used by security profession...

  11. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  12. Developing a secured social networking site using information security awareness techniques

    Directory of Open Access Journals (Sweden)

    Julius O. Okesola

    2014-11-01

    Full Text Available Background: Ever since social network sites (SNS became a global phenomenon in almost every industry, security has become a major concern to many SNS stakeholders. Several security techniques have been invented towards addressing SNS security, but information security awareness (ISA remains a critical point. Whilst very few users have used social circles and applications because of a lack of users’ awareness, the majority have found it difficult to determine the basis of categorising friends in a meaningful way for privacy and security policies settings. This has confirmed that technical control is just part of the security solutions and not necessarily a total solution. Changing human behaviour on SNSs is essential; hence the need for a privately enhanced ISA SNS. Objective: This article presented sOcialistOnline – a newly developed SNS, duly secured and platform independent with various ISA techniques fully implemented. Method: Following a detailed literature review of the related works, the SNS was developed on the basis of Object Oriented Programming (OOP approach, using PhP as the coding language with the MySQL database engine at the back end. Result: This study addressed the SNS requirements of privacy, security and services, and attributed them as the basis of architectural design for sOcialistOnline. SNS users are more aware of potential risk and the possible consequences of unsecured behaviours. Conclusion: ISA is focussed on the users who are often the greatest security risk on SNSs, regardless of technical securities implemented. Therefore SNSs are required to incorporate effective ISA into their platform and ensure users are motivated to embrace it.

  13. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  14. The Security Gap in Syria: Individual and Collective Security in ‘Rebel-held’ Territories

    OpenAIRE

    Ali, Ali Abdul Kadir

    2015-01-01

    This paper examines security in Syria through the conceptual lens of the security gap, understood as the gap between security practices and objectives which have implications for individual and collective security. Practices of security can be the state apparatus, the military, and militias. The objective – safety – can refer to the safety or security of a range of collectives including the state, political parties, and ethnic groups, while individual security re...

  15. Water System Security and Resilience in Homeland Security Research

    Science.gov (United States)

    EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.

  16. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  17. Critical Security Studies in the 21st Century: Any Directions for Lithuanian Security Studies?

    Directory of Open Access Journals (Sweden)

    Jakniūnaitė Dovilė

    2014-12-01

    Full Text Available This article focuses on recent developments and discussions in the field of security studies and aims to suggest new guidelines for the research of Lithuanian security policy. First it covers the main subjects of contemporary security discourse; next it provides evaluation and review of the critical tradition in security studies that frames presuppositions and is the means for analyzing specific security issues as well as that which fosters reflexive thinking about security. The third part deals with three topics of security research (analysis of security through the concepts of risk, exceptionality and media which have become talking-points in recent years and which have provided innovative insights in security studies.

  18. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  19. SOCIAL MEDIA SECURITY

    Science.gov (United States)

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  20. VMware vCloud security

    CERN Document Server

    Sarkar, Prasenjit

    2013-01-01

    VMware vCloud Security provides the reader with in depth knowledge and practical exercises sufficient to implement a secured private cloud using VMware vCloud Director and vCloud Networking and Security.This book is primarily for technical professionals with system administration and security administration skills with significant VMware vCloud experience who want to learn about advanced concepts of vCloud security and compliance.

  1. X-ray diffraction imaging with the Multiple Inverse Fan Beam topology: Principles, performance and potential for security screening

    Energy Technology Data Exchange (ETDEWEB)

    Harding, G., E-mail: Geoffrey.Harding@Morphodetection.com [Morpho Detection Germany GmbH, Heselstuecken 3, 22453 Hamburg (Germany); Fleckenstein, H.; Kosciesza, D.; Olesinski, S.; Strecker, H.; Theedt, T.; Zienert, G. [Morpho Detection Germany GmbH, Heselstuecken 3, 22453 Hamburg (Germany)

    2012-07-15

    The steadily increasing number of explosive threat classes, including home-made explosives (HMEs), liquids, amorphous and gels (LAGs), is forcing up the false-alarm rates of security screening equipment. This development can best be countered by increasing the number of features available for classification. X-ray diffraction intrinsically offers multiple features for both solid and LAGs explosive detection, and is thus becoming increasingly important for false-alarm and cost reduction in both carry-on and checked baggage security screening. Following a brief introduction to X-ray diffraction imaging (XDI), which synthesizes in a single modality the image-forming and material-analysis capabilities of X-rays, the Multiple Inverse Fan Beam (MIFB) XDI topology is described. Physical relationships obtaining in such MIFB XDI components as the radiation source, collimators and room-temperature detectors are presented with experimental performances that have been achieved. Representative X-ray diffraction profiles of threat substances measured with a laboratory MIFB XDI system are displayed. The performance of Next-Generation (MIFB) XDI relative to that of the 2nd Generation XRD 3500{sup TM} screener (Morpho Detection Germany GmbH) is assessed. The potential of MIFB XDI, both for reducing the exorbitant cost of false alarms in hold baggage screening (HBS), as well as for combining 'in situ' liquid and solid explosive detection in carry-on luggage screening is outlined. - Highlights: Black-Right-Pointing-Pointer X-ray diffraction imaging (XDI) synthesizes analysis and imaging in one x-ray modality. Black-Right-Pointing-Pointer A novel XDI beam topology comprising multiple inverse fan-beams (MIFB) is described. Black-Right-Pointing-Pointer The MIFB topology is technically easy to realize and has high photon collection efficiency. Black-Right-Pointing-Pointer Applications are envisaged in checkpoint, hold baggage and cargo screening.

  2. Big data, little security: Addressing security issues in your platform

    Science.gov (United States)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  3. Usable Security and E-Banking: ease of use vis-a-vis security

    Directory of Open Access Journals (Sweden)

    Morten Hertzum

    2004-05-01

    Full Text Available Electronic banking must be secure and easy to use. An evaluation of six Danish web-based electronic banking systems indicates that the systems have serious weaknesses with respect to ease of use. Our analysis of the weaknesses suggests that security requirements are among their causes and that the weaknesses may in turn cause decreased security. We view the conflict between ease of use and security in the context of usable security, a concept that is intended to match security principles and demands against user knowledge and motivation. Automation, instruction, and understanding can be identified as different approaches to usable security. Instruction is the main approach of the systems evaluated; automation relieves the user from involvement in security, as far as possible; and understanding goes beyond step-by-step instructions, to enable users to act competently and safely in situations that transcend preconceived instructions. We discuss the pros and cons of automation and understanding as alternative approaches to the design of web-based e-banking systems.

  4. Computer security at ukrainian nuclear facilities: interface between nuclear safety and security

    International Nuclear Information System (INIS)

    Chumak, D.; Klevtsov, O.

    2015-01-01

    Active introduction of information technology, computer instrumentation and control systems (I and C systems) in the nuclear field leads to a greater efficiency and management of technological processes at nuclear facilities. However, this trend brings a number of challenges related to cyber-attacks on the above elements, which violates computer security as well as nuclear safety and security of a nuclear facility. This paper considers regulatory support to computer security at the nuclear facilities in Ukraine. The issue of computer and information security considered in the context of physical protection, because it is an integral component. The paper focuses on the computer security of I and C systems important to nuclear safety. These systems are potentially vulnerable to cyber threats and, in case of cyber-attacks, the potential negative impact on the normal operational processes can lead to a breach of the nuclear facility security. While ensuring nuclear security of I and C systems, it interacts with nuclear safety, therefore, the paper considers an example of an integrated approach to the requirements of nuclear safety and security

  5. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  6. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  7. Zwint-1 is required for spindle assembly checkpoint function and kinetochore-microtubule attachment during oocyte meiosis.

    Science.gov (United States)

    Woo Seo, Dong; Yeop You, Seung; Chung, Woo-Jae; Cho, Dong-Hyung; Kim, Jae-Sung; Su Oh, Jeong

    2015-10-21

    The key step for faithful chromosome segregation during meiosis is kinetochore assembly. Defects in this process result in aneuploidy, leading to miscarriages, infertility and various birth defects. However, the roles of kinetochores in homologous chromosome segregation during meiosis are ill-defined. Here we found that Zwint-1 is required for homologous chromosome segregation during meiosis. Knockdown of Zwint-1 accelerated the first meiosis by abrogating the kinetochore recruitment of Mad2, leading to chromosome misalignment and a high incidence of aneuploidy. Although Zwint-1 knockdown did not affect Aurora C kinase activity, the meiotic defects following Zwint-1 knockdown were similar to those observed with ZM447439 treatment. Importantly, the chromosome misalignment following Aurora C kinase inhibition was not restored after removing the inhibitor in Zwint-1-knockdown oocytes, whereas the defect was rescued after the inhibitor washout in the control oocytes. These results suggest that Aurora C kinase-mediated correction of erroneous kinetochore-microtubule attachment is primarily regulated by Zwint-1. Our results provide the first evidence that Zwint-1 is required to correct erroneous kinetochore-microtubule attachment and regulate spindle checkpoint function during meiosis.

  8. Morphogenesis checkpoint kinase Swe1 is the executor of lipolysis-dependent cell-cycle progression.

    Science.gov (United States)

    Chauhan, Neha; Visram, Myriam; Cristobal-Sarramian, Alvaro; Sarkleti, Florian; Kohlwein, Sepp D

    2015-03-10

    Cell growth and division requires the precise duplication of cellular DNA content but also of membranes and organelles. Knowledge about the cell-cycle-dependent regulation of membrane and storage lipid homeostasis is only rudimentary. Previous work from our laboratory has shown that the breakdown of triacylglycerols (TGs) is regulated in a cell-cycle-dependent manner, by activation of the Tgl4 lipase by the major cyclin-dependent kinase Cdc28. The lipases Tgl3 and Tgl4 are required for efficient cell-cycle progression during the G1/S (Gap1/replication phase) transition, at the onset of bud formation, and their absence leads to a cell-cycle delay. We now show that defective lipolysis activates the Swe1 morphogenesis checkpoint kinase that halts cell-cycle progression by phosphorylation of Cdc28 at tyrosine residue 19. Saturated long-chain fatty acids and phytosphingosine supplementation rescue the cell-cycle delay in the Tgl3/Tgl4 lipase-deficient strain, suggesting that Swe1 activity responds to imbalanced sphingolipid metabolism, in the absence of TG degradation. We propose a model by which TG-derived sphingolipids are required to activate the protein phosphatase 2A (PP2A(Cdc55)) to attenuate Swe1 phosphorylation and its inhibitory effect on Cdc28 at the G1/S transition of the cell cycle.

  9. Web security a whitehat perspective

    CERN Document Server

    Wu, Hanqing

    2015-01-01

    MY VIEW OF THE SECURITY WORLDView of the IT Security WorldBrief History of Web SecurityBrief History of Chinese HackersDevelopment Process of Hacking TechniquesRise of Web SecurityBlack Hat, White HatBack to Nature: The Essence of Secret SecuritySuperstition: There Is No Silver BulletSecurity Is an Ongoing ProcessSecurity ElementsHow to Implement Safety AssessmentAsset ClassificationThreat AnalysisRisk AnalysisDesign of Security ProgramsArt of War of White HatPrinciples of Secure by DefaultBlacklist, WhitelistPrinciple of Least PrivilegePrinciple of Defense in DepthPrinciples of Data and Code

  10. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  11. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  12. 12 CFR 987.4 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Creation of Participant's Security Entitlement... BOOK-ENTRY PROCEDURE FOR CONSOLIDATED OBLIGATIONS § 987.4 Creation of Participant's Security... of the United States to secure deposits of public money, including, without limitation, deposits to...

  13. VoIP Security

    OpenAIRE

    Fontanini, Piero

    2008-01-01

    VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no general solution for VoIP Security. The security in VoIP systems today are often non existing or in best case weak and often based on proprietary solutions. This master thesis investigates threats to VoIP system and describes existing alternatives for securing Vo...

  14. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  15. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  16. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  17. 21st Century Security Manager

    Directory of Open Access Journals (Sweden)

    Stelian ARION

    2010-11-01

    Full Text Available We live in world of uncertainty that generates major paradigms changing that affect security risk management. Modern organization’s security risks management can’t be done without a profound knowlegde and daily practice for security governance, security risk management and resilience. 21st Century security manager need to deal with several areas of konwledge in order to succesfully manage security risks. The document presents the advantages, disadvantages and challenges for security managers thah have government backgroud, or IT security backgroud, or are promoted from organization’s inside leaders. There are six different areas of knowledge that successful security programs of the future must incorporate, either in the knowledge base of their leaders or in the collective knowledge of the leading staff. They are government elements, security organization, emerging issue awareness, IT security, business elements and executive leadership.

  18. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  19. Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security

    Science.gov (United States)

    2015-09-01

    security enterprise NAFTA North American Free Trade Agreement NATO North Atlantic Treaty Organization NS national security NSS National Security...all hazards, outcome driven, national security) of the person being asked. Some advocate a more holistic description that encompasses law enforcement...department rather than maintaining the artificial separation. 3. Create a Department of Prosperity The Preamble to the Constitution defines our federal

  20. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...