Abstract

Human cytomegalovirus (HCMV) is the most common cause of congenital infections and is an important pathogen in immunocompromised individuals. Despite a robust host immune system, HCMV able to replicate, evade host defenses, establish latency for life. A significant portion of HCMV genome dedicated to encode gene products for modulation of host immune response. Growing number of HCMV gene products are being recognized to play role in immune evasion. Information on viral immune evasion mechanisms by which HCMV persists in host will be useful in devising antiviral intervention strategies and development of new vaccines. This minireview provides a brief overview of immune evasion strategy adapted by HCMV by utilizing its gene products in modulation of host immune response.

Highlights

  • The human cytomegalovirus (HCMV) is a ubiquitous β-herpesvirus that establishes lifelong persistent infection following introduction to an immunocompetent host

  • Primary infection in a healthy individual leads to mild febrile illness, whereas HCMV causes serious complications in immunosuppressed subjects, especially in transplant recipients and in immunocompromised patients [1, 2]

  • Information on viral immune evasion mechanisms by which HCMV persists in host will be useful in devising antiviral intervention strategies and development of new vaccines

Read more

Summary

Raj Kumar Patro*

Despite a robust host immune system, HCMV able to replicate, evade host defenses, establish latency for life. A significant portion of HCMV genome dedicated to encode gene products for modulation of host immune response. Growing number of HCMV gene products are being recognized to play role in immune evasion. Information on viral immune evasion mechanisms by which HCMV persists in host will be useful in devising antiviral intervention strategies and development of new vaccines. This minireview provides a brief overview of immune evasion strategy adapted by HCMV by utilizing its gene products in modulation of host immune response.

INTRODUCTION
CONCLUSIONS
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.