Learn More
An elevated number of Gr-1+CD11b+ myeloid-derived suppression cells (MDSCs) has been described in mice and human bearing tumor and associated with immune suppression. Arginase I production by MDSCs in the tumor environment may be a central mechanism for immunosuppression and tumor evasion. In this study and before, we found that Gr-1+CD11b+ MDSCs from(More)
To enable secure content trade between peers with good scalability and efficiency in Peer-to-Peer (P2P) file-sharing systems, we propose a decentralized authorization scheme for Digital Rights Management (DRM). Based on proxy re-encryption mechanism, our scheme deploys authorization functions on semi-trusted authorization proxy peers who re-encrypt the(More)
Dendritic cell (DC) function is negatively affected by tumors and tumor-derived factors, but little is known about the underlying mechanisms. Here, we show that intracellular SOCS3 in DCs binds to pyruvate kinase type M2 (M2-PK), which plays a critical role in ATP production through glycolysis. The interaction of SOCS3 with M2-PK reduced ATP production and(More)
Hierarchical cryptographic key management of access control can be modeled as a partially ordered set in which a high security class can derive its descendant encryption keys, but not vice versa. In this paper, we propose a practical key management scheme for our segment-based document which is a novel XML-based document format for web publishing, called(More)
Carcinoembryonic antigen-related cell adhesion molecule 6 (CEACAM6) shows increased expression in a wide variety of human cancers, and its over-expression is associated with enhanced migration, invasion, and in vivo metastasis. Here, we reported that CEACAM6 was up-regulated in gastric cancer (GC) cell lines and tumor tissues. Over-expression of CEACAM6 in(More)
This paper presents a rights management method for the multiple devices of end-user. In recent years, most existing contents sharing solutions are based on Authorized Domain where legally acquired copyrighted content can seamlessly move from device to device. However, Authorized Domain systems are relatively complex and will usually increase the usage cost.(More)
This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on(More)
Sensitive information leakage in files is one of the biggest concerns in people's life. Considering this situation, people have designed lots of tools to protect sensitive files. However, these specialized tools are not applicable when the user amount is small. This paper proposes a novel light-weight mechanism that provides efficient and fast(More)