Document Type
Article
Date of Original Version
2014
Abstract
High strain sequence variability, interference with innate immune mechanisms, and epitope deletion are all examples of strategies that pathogens have evolved to subvert host defenses. To this list we would add another strategy: immune camouflage. Pathogens whose epitope sequences are cross-conserved with multiple human proteins at the TCR-facing residues may be exploiting "ignorance and tolerance," which are mechanisms by which mature T cells avoid immune responses to self-antigens. By adopting amino acid configurations that may be recognized by autologous regulatory T cells, pathogens may be actively suppressing protective immunity. Using the new JanusMatrix TCR-homology-mapping tool, we have identified several such 'camouflaged' tolerizing epitopes that are present in the viral genomes of pathogens such as emerging H7N9 influenza. Thus in addition to the overall low number of T helper epitopes that is present in H7 hemaglutinin (as described previously, see http://dx.doi.org/10.4161/hv.24939), the presence of such tolerizing epitopes in H7N9 could explain why, in recent vaccine trials, whole H7N9-HA was poorly immunogenic and associated with low seroconversion rates (see http://dx.doi.org/10.4161/hv.28135). In this commentary, we provide an overview of the immunoinformatics process leading to the discovery of tolerizing epitopes in pathogen genomic sequences, provide a brief summary of laboratory data that validates the discovery, and point the way forward. Removal of viral, bacterial and parasite tolerizing epitopes may permit researchers to develop more effective vaccines and immunotherapeutics in the future.
Citation/Publisher Attribution
De Groot, A. S., Moise, L., Liu, R., Gutierrez A. H., Tassone, R., Bailey-Kellog, C., & Martin, W. (2014). Immune Camouflage: Relevance to Vaccine Design to Human Immunology. Human Vaccines & Immunotherapeutics, 10(12), 3570-3575.
Available at: http://www.tandfonline.com/doi/full/10.4161/hv.36134
Author Manuscript
This is a pre-publication author manuscript of the final, published article.
Terms of Use
This article is made available under the terms and conditions applicable
towards Open Access Policy Articles, as set forth in our Terms of Use.