Moussa Ouedraogo

Learn More
Activated human neuropeptide Y Y(1) receptors rapidly desensitize and internalize through clathrin-coated pits and recycle from early and recycling endosomes, unlike Y(2) receptors that neither internalize nor desensitize. To identify motifs implicated in Y(1) receptor desensitization and trafficking, mutants with varying C-terminal truncations or a(More)
In this paper we discuss the issues relating the evaluation and reporting of security assurance of runtime systems. We first highlight the shortcomings of current initiatives in analyzing, evaluating and reporting security assurance information. Then, the paper proposes a set of metrics to help capture and foster a better understanding of the security(More)
Assurance is commonly considered as “something said or done to inspire confidence” (Webster dictionary). However, the level of confidence inspired from a statement or an action depends on the quality of its source. Similarly, the assurance that the deployed security mechanisms exhibit an appropriate posture depends on the quality of the verification process(More)
Current approaches to evaluating security assurance either focus on the software development stage or at the end product software. However, most often, it is after the deployment or implementation phase that specified security requirements may be violated. This may be due to improper deployment of the security measures, environmental hazards or to the fact(More)
Oxidative stress due to abnormal production of reactive oxygen species has been implicated in the nephrotoxicity induced by gentamicin. The nephroprotective effect of aqueous-ethanolic extract of Moringa oleifera leaves (150 and 300 mg/kg) was evaluated against gentamicin-induced (80 mg/kg) renal injury in rabbits. Serum urea and creatinine levels were(More)
Fruit trees play an important nutritional role for livelihoods of rural people in the West African Sahel through provision of energy and nutrients such as vitamins, minerals, and proteins. Research on the domestication of local fruit trees has started recently through projects concentrating on some of the most important indigenous species of dry West(More)
In today's world, where most of the critical infrastructures are based on distributed systems, security failures have become very common, even within large corporations. A system with security loopholes can be damaging for companies, both in terms of reputation and finances, while customers are reluctant to use such systems. In that respect, providing(More)
Systematic and practical approaches to risk-driven operational security evidence help ensure the effectiveness and efficiency of security controls in business-critical applications and services. This paper introduces an enhanced methodology to develop security effectiveness metrics that can be used in connection with correctness assurance of security(More)