The Trojan exosome hypothesis.
نویسندگان
چکیده
We propose that retroviruses exploit a cell-encoded pathway of intercellular vesicle traffic, exosome exchange, for both the biogenesis of retroviral particles and a low-efficiency but mechanistically important mode of infection. This Trojan exosome hypothesis reconciles current paradigms of retrovirus-directed transmission with the unique lipid composition of retroviral particles, the host cell proteins present in retroviral particles, the complex cell biology of retroviral release, and the ability of retroviruses to infect cells independently of Envelope protein-receptor interactions. An exosomal origin also predicts that retroviruses pose an unsolvable paradox for adaptive immune responses, that retroviral antigen vaccines are unlikely to provide prophylactic protection, and that alloimmunity is a central component of antiretroviral immunity. Finally, the Trojan exosome hypothesis has important implications for the fight against HIV and AIDS, including how to develop new antiretroviral therapies, assess the risk of retroviral infection, and generate effective antiretroviral vaccines.
منابع مشابه
HIV and Mature Dendritic Cells: Trojan Exosomes Riding the Trojan Horse?
Exosomes are secreted cellular vesicles that can induce specific CD4(+) T cell responses in vivo when they interact with competent antigen-presenting cells like mature dendritic cells (mDCs). The Trojan exosome hypothesis proposes that retroviruses can take advantage of the cell-encoded intercellular vesicle traffic and exosome exchange pathway, moving between cells in the absence of fusion eve...
متن کاملHIV As Trojan Exosome: Immunological Paradox Explained?
The HIV pandemic is still a major global challenge, despite the widespread availability of antiretroviral drugs. An effective vaccine would be the ideal approach to bringing the pandemic to an end. However, developing an effective HIV vaccine has proven to be an elusive goal. Three major human HIV vaccine trials revealed a strong trend toward greater risk of infection among vaccine recipients v...
متن کاملSecurity-aware register placement to hinder malicious hardware updating and improve Trojan detectability
Nowadays, bulk of the designers prefer to outsource some parts of their design and fabrication process to the third-part companies due to the reliability problems, manufacturing cost and time-to-market limitations. In this situation, there are a lot of opportunities for malicious alterations by the off-shore companies. In this paper, we proposed a new placement algorithm that hinders the hardwa...
متن کاملHardwar Trojan classification and implementation and offer a new detection approach
A hardware attack that enables the attacker to alter the main circuit with malicious hardware during either design or the fabrication process is studied and analyzed. This attack, known as the hardware Trojan, has different objectives such as destroying hardware, changing circuit characteristics or extracting sensitive information. So hardware Trojan detection and hardware security are critical...
متن کاملToward Exosome-Based Therapeutics: Isolation, Heterogeneity, and Fit-for-Purpose Potency
Exosomes are defined as submicron (30-150 nm), lipid bilayer-enclosed extracellular vesicles (EVs), specifically generated by the late endosomal compartment through fusion of multivesicular bodies with the plasma membrane. Produced by almost all cells, exosomes were originally considered to represent just a mechanism for jettisoning unwanted cellular moieties. Although this may be a major funct...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Proceedings of the National Academy of Sciences of the United States of America
دوره 100 19 شماره
صفحات -
تاریخ انتشار 2003