Granted Access

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 25575 Experts worldwide ranked by ideXlab platform

Mandeep R Mehra - One of the best experts on this subject based on the ideXlab platform.

Nalini Singh - One of the best experts on this subject based on the ideXlab platform.

  • high treatment success rate for multidrug resistant and extensively drug resistant tuberculosis using a bedaquiline containing treatment regimen
    European Respiratory Journal, 2018
    Co-Authors: Norbert Ndjeka, Kathryn Schnippel, Iqbal Master, Rodolfo Romero, Martin Enwerem, Sunitha Chotoo, Xavier Padanilam, Gary Maartens, Graeme Meintjes, Nalini Singh
    Abstract:

    South African patients with rifampicin-resistant tuberculosis (TB) and resistance to fluoroquinolones and/or injectable drugs (extensively drug-resistant (XDR) and preXDR-TB) were Granted Access to bedaquiline through a clinical Access programme with strict inclusion and exclusion criteria. PreXDR-TB and XDR-TB patients were treated with 24 weeks of bedaquiline within an optimised, individualised background regimen that could include levofloxacin, linezolid and clofazimine as needed. 200 patients were enrolled: 87 (43.9%) had XDR-TB, 99 (49.3%) were female and the median age was 34 years (interquartile range (IQR) 27–42). 134 (67.0%) were living with HIV; the median CD4+ count was 281 cells·μL−1 (IQR 130–467) and all were on antiretroviral therapy. 16 out of 200 patients (8.0%) did not complete 6 months of bedaquiline: eight were lost to follow-up, six died, one stopped owing to side effects and one was diagnosed with drug-sensitive TB. 146 out of 200 patients (73.0%) had favourable outcomes: 139 (69.5%) were cured and seven (3.5%) completed treatment. 25 patients (12.5%) died, 20 (10.0%) were lost from treatment and nine (4.5%) had treatment failure. 22 adverse events were attributed to bedaquiline, including a QT interval corrected using the Fridericia formula (QTcF) >500 ms (n=5), QTcF increase >50 ms from baseline (n=11) and paroxysmal atrial flutter (n=1). Bedaquiline added to an optimised background regimen was associated with a high rate of successful treatment outcomes for this preXDR-TB and XDR-TB cohort.

Amit N. Patel - One of the best experts on this subject based on the ideXlab platform.

Amit Patel - One of the best experts on this subject based on the ideXlab platform.

Nickolai Zeldovich - One of the best experts on this subject based on the ideXlab platform.

  • nemesis preventing authentication Access control vulnerabilities in web applications
    USENIX Security Symposium, 2009
    Co-Authors: Michael Dalton, Christos Kozyrakis, Nickolai Zeldovich
    Abstract:

    This paper presents Nemesis, a novel methodology for mitigating authentication bypass and Access control vulnerabilities in existing web applications. Authentication attacks occur when a web application authenticates users unsafely, granting Access to web clients that lack the appropriate credentials. Access control attacks occur when an Access control check in the web application is incorrect or missing, allowing users unauthorized Access to privileged resources such as databases and files. Such attacks are becoming increasingly common, and have occurred in many high-profile applications, such as IIS [10] and WordPress [31], as well as 14% of surveyed web sites [30]. Nevertheless, none of the currently available tools can fully mitigate these attacks. Nemesis automatically determines when an application safely and correctly authenticates users, by using Dynamic Information Flow Tracking (DIFT) techniques to track the flow of user credentials through the application's language runtime. Nemesis combines authentication information with programmer-supplied Access control rules on files and database entries to automatically ensure that only properly authenticated users are Granted Access to any privileged resources or data. A study of seven popular web applications demonstrates that a prototype of Nemesis is effective at mitigating attacks, requires little programmer effort, and imposes minimal runtime overhead. Finally, we show that Nemesis can also improve the precision of existing security tools, such as DIFT analyses for SQL injection prevention, by providing runtime information about user authentication.