Self-sovereign identity provides a feasible alternative to login via username and password through an identity provider to access digital services. It allows identity subjects to control and own ...their data. Although this is an appealing approach, it requires a whole new infrastructure with almost no dependencies on the existing ones. We designed and implemented a solution that combines an existing federated identity access management solution with the new approach by enabling authentication via self-sovereign-identity-based credentials while the identity provider retains verification and communication with the service provider via Security Assertion Mark Up Language. Thanks to the standardized federated systems in the German higher education domain, the solution not only enables a smooth transition to self-sovereign identities but can also be easily transferred to other universities using the same federated identity framework.
Background
We conducted a retrospective survey within the European Society for Blood and Marrow Transplantation (EBMT) registry to assess the outcomes of cord blood transplantation (CBT) in secondary ...acute myeloid leukaemia (sAML).
Methods
Inclusion criteria consisted of ≥18 years of age, sAML, first CBT between 2002 and 2016, and either first complete remission (CR) or active disease at CBT.
Results
One hundred forty‐six patients met the study inclusion criteria. Status at transplantation was first CR (n = 97), primary refractory sAML (n = 30) or relapsed (n = 19) sAML. Neutrophil engraftment was achieved in 118 patients while the remaining 25 patients (17%) failed to engraft. This includes 13% of patients transplanted in first CR versus 30% of those transplanted with active disease (P = 0.008). Two‐year incidences of relapse were 25% in first CR patients versus 36% in those with advanced disease (P = 0.06) while 2‐year incidences of nonrelapse mortality were 35% and 49% (P = 0.03), respectively. At 2‐year overall survival, leukaemia‐free survival and graft‐versus‐host disease (GVHD)‐free relapse‐free survival were 42% vs. 19% (P < 0.001), 40% vs. 16% (P < 0.001), and 26% vs. 12% (P = 0.002) in first CR patients versus those with advanced disease, respectively.
Conclusions
We report here the first study of CBT in a large cohort of sAML patients. Main observation was that CBT rescued approximately 40% of patients with sAML in first CR.
In the last decade or so, we have experienced a tremendous proliferation and popularity of different Social Networks (SNs), resulting more and more user attributes being stored in such SNs. These ...attributes represent a valuable asset and many innovative online services are offered in exchange of such attributes. This particular phenomenon has allured these social networks to act as Identity Providers (IdPs). However, the current setting unnecessarily imposes a restriction: a user can only release attributes from one single IdP in a single session, thereby, limiting the user to aggregate attributes from multiple IdPs within the same session. In addition, our analysis suggests that the manner by which attributes are released from these SNs is extremely privacy-invasive and a user has very limited control to exercise her privacy during this process. In this article, we present Social Anchor, a system for attribute aggregation from social networks in a privacy-friendly fashion. Our proposed Social Anchor system effectively addresses both of these serious issues. Apart from the proposal, we have implemented Social Anchor following a set of security and privacy requirements. We have also examined the associated trust issues using a formal trust analysis model. Besides, we have presented a formal analysis of its protocols using a state-of-the-art formal analysis tool called AVISPA to ensure the security of Social Anchor. Finally, we have provided a performance analysis of Social Anchor.
Many states/transitions formalisms have been proposed in the literature to perform Safety Analyses. In this paper we compare two of them: SAML and AltaRica. These formalisms have been developed by ...different communities. Their “look-and-feel” are thus quite different. Yet, their underlying mathematical foundations are very similar: both of them rely on state automata. It is therefore of interest to study their ability to assess the reliability of systems, their respective advantages and drawbacks and to seek for opportunities of a cross fertilization.
•We compare two modeling formalisms for Safety Analyses: SAML and AltaRica.•We use the same case study to present both modeling languages.•SAML (safety analysis modeling language) uses discrete time model.•AltaRica is based on continuous time model with discrete events.
Secondary acute myeloid leukemia (sAML) is a heterogeneous malignant hematopoietic disease that arises either from an antecedent hematologic disorder (AHD) including myelodysplastic syndromes (MDS), ...myeloproliferative neoplasms (MPN), aplastic anemia (AA), or as a result of exposure to genotoxic chemotherapeutic agents or radiotherapy (therapy related AML, tAML). sAML is diagnosed when the number of blasts is ≥20% in the bone marrow or peripheral blood, and it is characterized by poor prognosis, resistance to therapy and low overall survival rate. With the recent advances in next generation sequencing technologies, our understanding of the molecular events associated with sAML evolution has significantly increased and opened new perspectives for the development of novel therapies. The genetic aberrations that are associated with sAML affect genes involved in processes such as splicing, chromatin modification and genome integrity. Moreover, non-coding RNAs' emerged as an important contributing factor to leukemogenesis. For decades, the standard treatment for secondary AML has been the 7 + 3 regimen of cytarabine and daunorubicin which prolongs survival for several months, but modifications in either dosage or delivery has significantly extended that time. Apart from traditional chemotherapy, hematopoietic stem cell transplantation, CAR-T cell therapy and small molecule inhibitors have also emerged to treat sAML.
Providing access to electronic resources is a core service for most libraries, and for more than two decades librarians have used Internet Protocol (IP) addresses as a way to authenticate users and ...prove they should have access to their institution's licensed materials. But in recent years, IP addresses have become a less accurate method of determining whether a user is affiliated with a particular library. Key players in the publishing industry and academia are working together on a new set of protocols to replace IP authentication called Resource Access for the 21st Century, or RA21. This column will briefly explore what RA21 is, what problems it purports to solve, and what problems it may create. A list of resources for further reading on RA21 is provided.
Storing and accessing the information in the multi-cloud hosting environment becomes popular these days. It offers benefits like the assurance of data protection, preventing information corruption, ...unethical issues from vendors. In this paper, a hybrid approach with the multi-cloud hosting environment is designed and implemented for improved security and privacy of cloud data. The hybrid method consists of three modules (a) Byzantine protocol to tolerant security breaches to server failures cloud, which is independent. (b) DepSky architecture enhances the reliability and secrecy of data preserved in the cloud using encoding and decoding techniques (c) Shamir secret sharing procedure to improve trustiness & privacy of data storage without affecting the performance. The privacy and security issues of the hybrid approach are implemented and compared with the protocols like SAML with proxy re-encryption and Kerberos for different user service requests. The performance of the hybrid approach in terms of memory utilization, encryption/decryption time, total authentication time is improved compared to that of protocol environments SAML, SAML with proxy re-encryption and Kerberos. The results were encouraging in the Hybrid Approach in terms of encryption time/decryption time, Memory utilization and average precision values.
Authentication is crucial although if system which facilitates secure their networks by limiting access to protected resources such as networks, websites, network-based software, databases, and other ...computer systems or services to only authenticated users (or processes). In general, modern authentication protocols such as Security Assertion Markup Language 2.0 (SAML), WS-Fed, OAuth, and OpenID discourage apps from handling user credentials. The aim is to keep an app's authentication method and its functionality separate. Azure Active Directory (Azure AD) manages the login process to keep confidential data (such as passwords) out of the hands of websites and apps. This allows identity providers (IdP) like Azure AD to provide seamless single sign-on experiences, allow users to authenticate using factors other than passwords (phone, face, biometrics), and block or elevate authentication attempts if Azure AD detects, for example, that the user's account has been compromised or that the user is attempting to access an app from an untrusted location. The main goal of the work is Converting Visual Studio from ADAL to MSAL has allowed us to better support Conditional Access and Multi-factor Authentication and other new AAD features which benefit our customers. Visual Studio 2019 and the.NET Core SDK can be used to complete this work. The SAML request–response authentication workflow between these providers is checked to ensure that user login information is accurate and safe.
Introduction
SETBP1
mutations have been established as a diagnostic marker in myeloid malignancies and are associated with inferior survival. Since there is limited data on their clinical impact and ...stability during disease progression, we sought to investigate the relationship between
SETBP1
mutations and disease evolution.
Methods
Bidirectional Sanger sequencing of the
SETBP1
gene was performed for 442 unselected patients with World Health Organization (WHO) defined myeloid disorders. Follow-up analysis was performed on samples from 123/442 patients to investigate
SETBP1
mutation dynamics. Targeted deep next-generation sequencing for a panel of 30 leukemia-associated genes was established to study
SETBP1
cooperating mutations.
Results
10/442 patients (2.3%) had
SETBP1
hotspot mutations (MDS/MPN,
n
= 7, sAML,
n
= 3), whereas four patients (1%) had
SETBP1
non-hotspot mutations (MPN,
n
= 1; MDS,
n
= 2; sAML,
n
= 1). The median overall survival for patients with
SETBP1
hotspot mutations,
SETBP1
non-hotspot mutations, and
SETBP1
wild type was 14 (range 0–31), 50 (range 0–71), and 47 months (range 0–402), respectively. In Kaplan–Meier analysis,
SETBP1
hotspot mutations were significantly associated with reduced overall survival compared to
SETBP1
non-hotspot mutations and the
SETBP1
wild type (
p
< 0.001). All 10 patients with
SETBP1
hotspot mutations died from relapse or disease progression. Three of four patients with
SETBP1
non-hotspot mutations are alive with stable disease. Cooperating
CSF3R
and
TET2
mutations were most frequently observed in patients with
SETBP1
hotspot mutations.
Conclusions
Patients with
SETBP1
hotspot mutations suffered from aggressive disease with rapid evolution and inferior overall survival. Patients with
SETBP1
non-hotspot mutations had less aggressive disease and a more favorable prognosis. Diagnostic screens for
SETBP1
hotspot mutations may help identifying this dismal patient group and treat them in multicenter clinical studies.
Verifying who someone is on the Internet is a prerequisite for online services that process sensitive or valuable information. While this has been solved with national or sectorial electronic ...identification (eID) schemes, general, cross-border solutions are rare. Cross-border eID difficulties have several origins: (i) incompatible national eID models; (ii) different legislations with incompatible objectives; (iii) lack of common language and semantics; (iv) different common procedures, specially in what concerns mandates and delegation; (v) different implementations of the same eID models. These have been addressed by STORK, a project that developed a federated cross-border eID system that was piloted in about twenty European Union Member States in service sectors as sensitive as eBanking and eHealth. STORK designed and implemented a large-scale interoperability framework, allowing different systems of different models to coexist, using a common language with a common semantics and satisfying national privacy legislations. The experience gained from this large-scale pilot fed into EU policy-making, in particular, the recently enacted eIDAS Regulation requiring mutual recognition of eID by 2018 has been directly influenced by STORK and its lessons learned.