scholarly journals Do Cells use Passwords in Cell-State Transitions? Is Cell Signaling sometimes Encrypted?

2018 ◽  
Author(s):  
Alex Root

AbstractOrganisms must maintain proper regulation including defense and healing. Life-threatening problems may be caused by pathogens or by a multicellular organism’s own cells through cancer or auto-immune disorders. Life evolved solutions to these problems that can be conceptualized through the lens of information security, which is a well-developed field in computer science. Here I argue that taking an information security view of cells is not merely semantics, but useful to explain features of signaling, regulation, and defense. An information security perspective also offers a conduit for cross-fertilization of advanced ideas from computer science, and the potential for biology to inform computer science. First, I consider whether cells use passwords, i.e., initiation sequences that are required for subsequent signals to have effects, by analyzing the concept of pioneer transcription factors in chromatin regulation and cellular reprogramming. Second, I consider whether cells may encrypt signal transduction cascades. Encryption could benefit cells by making it more difficult for pathogens or oncogenes to hijack cell networks. By using numerous molecules cells may gain a security advantage in particular against viruses, whose genome sizes are typically under selection pressure. I provide a simple conceptual argument for how cells may peform encryption through post-translational modifications, complex formation, and chromatin accessibility. I invoke information theory to provide a criterion of an entropy spike to assess whether a signaling cascade has encryption-like features. I discuss how the frequently invoked concept of context-dependency may over-simplify more advanced features of cell signaling networks, such as encryption. Therefore, by considering that biochemical networks may be even more complex than commonly realized we may be better able to understand defenses against pathogens and pathologies.

2007 ◽  
Vol 23 (3) ◽  
pp. 428-434 ◽  
Author(s):  
Irina Strizh ◽  
Alexei Joutchkov ◽  
Nikolay Tverdokhlebov ◽  
Sergey Golitsyn

2016 ◽  
Vol 2 (4) ◽  
pp. 428
Author(s):  
Sufyan T. Al-Janabi

Information security now is considered to be cross-disciplinary and comprehensive field. It integrates the accumulation of knowledge in many disciplines like computer science, mathematics, communications, electronics, physics, etc. Thus, there has been an ongoing effort to improve the experiences in information security experimentation. Many international institutions are investigating enhanced approaches to provide hands-on learning and research environments. However, academic institutions are facing with the difficult challenge of providing lab infrastructuresthat meet the increasingly growing needs of cybersecurity training. In this paper, we report on the necessity and importance of building an effective national testbed for cybersecurity experimentation. We also present a general top-level architecture for this testbed emphasizing the most important enabling technologies.


2006 ◽  
Vol 3 (1) ◽  
pp. 124-130
Author(s):  
Baghdad Science Journal

in recent years cryptography has played a big role especially in computer science for information security block cipher and public


2018 ◽  
Vol 25 (10) ◽  
pp. 2355-2372 ◽  
Author(s):  
Santiago G. Lago ◽  
Jakub Tomasik ◽  
Geertje F. van Rees ◽  
Jordan M. Ramsey ◽  
Frieder Haenisch ◽  
...  

Author(s):  
Ann E. Cowan ◽  
Ion I. Moraru ◽  
James C. Schaff ◽  
Boris M. Slepchenko ◽  
Leslie M. Loew

2020 ◽  
Vol 6 (37) ◽  
pp. eaba1190
Author(s):  
Q. R. Xing ◽  
C. A. El Farran ◽  
P. Gautam ◽  
Y. S. Chuah ◽  
T. Warrier ◽  
...  

Cellular reprogramming suffers from low efficiency especially for the human cells. To deconstruct the heterogeneity and unravel the mechanisms for successful reprogramming, we adopted single-cell RNA sequencing (scRNA-Seq) and single-cell assay for transposase-accessible chromatin (scATAC-Seq) to profile reprogramming cells across various time points. Our analysis revealed that reprogramming cells proceed in an asynchronous trajectory and diversify into heterogeneous subpopulations. We identified fluorescent probes and surface markers to enrich for the early reprogrammed human cells. Furthermore, combinatory usage of the surface markers enabled the fine segregation of the early-intermediate cells with diverse reprogramming propensities. scATAC-Seq analysis further uncovered the genomic partitions and transcription factors responsible for the regulatory phasing of reprogramming process. Binary choice between a FOSL1 and a TEAD4-centric regulatory network determines the outcome of a successful reprogramming. Together, our study illuminates the multitude of diverse routes transversed by individual reprogramming cells and presents an integrative roadmap for identifying the mechanistic part list of the reprogramming machinery.


Author(s):  
Lech J. Janczewski ◽  
Andrew M. Colarik

The current state of the information security domain in the United States and much of the rest of the industrialized world can best be characterized as overly optimistic. The protection of computing systems and telecommunication infrastructures from unauthorized usage, manipulation, and sabotage faces serious challenges to ensure ongoing serviceability. This is especially true when we consider our growing dependence on these infrastructures. The state of affairs regarding the security aspects of these systems is even worse. Peter G. Neumann of the Computer Science Laboratory at SRI International in Menlo Park, California states:


Sign in / Sign up

Export Citation Format

Share Document