RDF/XMLNTriplesTurtleShow queryShare
SubjectPredicateObject
http://purl.uniprot.org/keywords/1258http://www.w3.org/1999/02/22-rdf-syntax-ns#typehttp://purl.uniprot.org/core/Concept
http://purl.uniprot.org/keywords/1258http://www.w3.org/2000/01/rdf-schema#subClassOfhttp://purl.uniprot.org/keywords/945
http://purl.uniprot.org/keywords/1258http://www.w3.org/2000/01/rdf-schema#subClassOfhttp://purl.uniprot.org/keywords/1090
http://purl.uniprot.org/keywords/1258http://www.w3.org/2000/01/rdf-schema#subClassOfhttp://purl.uniprot.org/keywords/899
http://purl.uniprot.org/keywords/1258http://www.w3.org/2000/01/rdf-schema#subClassOfhttp://purl.uniprot.org/core/Concept
http://purl.uniprot.org/keywords/1258http://www.w3.org/2000/01/rdf-schema#subClassOfhttp://purl.uniprot.org/keywords/9999
http://purl.uniprot.org/keywords/1258http://www.w3.org/2000/01/rdf-schema#comment"Viral anti-restriction protein that counteracts the host restriction-modification (R-M) system. R-M system is a prokaryotic host defense system that recognizes incoming unmodified viral DNA and rapidly degrades it. Methylation and phosphorothioation (S-modification) are two known modifications used by the host to to label its genomic DNA as 'self'. Many prokaryotic viruses have evolved antirestriction strategies such as expressing their own methylase, stimulating the host methylase so that it confers protection to the virus genome or shutting down host restriction endonuclease."xsd:string
http://purl.uniprot.org/keywords/1258http://www.w3.org/2000/01/rdf-schema#seeAlsohttp://purl.obolibrary.org/obo/GO_0099018
http://purl.uniprot.org/keywords/1258http://www.w3.org/2004/02/skos/core#prefLabel"Restriction-modification system evasion by virus"xsd:string
http://purl.uniprot.org/keywords/1258http://purl.uniprot.org/core/categoryhttp://purl.uniprot.org/keywords/9999
http://purl.uniprot.org/uniprot/A0A8S5LP00http://purl.uniprot.org/core/classifiedWithhttp://purl.uniprot.org/keywords/1258
http://purl.uniprot.org/uniprot/A0A8S5N8I0http://purl.uniprot.org/core/classifiedWithhttp://purl.uniprot.org/keywords/1258
http://purl.uniprot.org/uniprot/A0A8S5PU96http://purl.uniprot.org/core/classifiedWithhttp://purl.uniprot.org/keywords/1258
http://purl.uniprot.org/uniprot/Q855N3http://purl.uniprot.org/core/classifiedWithhttp://purl.uniprot.org/keywords/1258
http://purl.uniprot.org/uniprot/Q38156http://purl.uniprot.org/core/classifiedWithhttp://purl.uniprot.org/keywords/1258
http://purl.uniprot.org/uniprot/A0A1S5SFF5http://purl.uniprot.org/core/classifiedWithhttp://purl.uniprot.org/keywords/1258
http://purl.uniprot.org/uniprot/D9ICI0http://purl.uniprot.org/core/classifiedWithhttp://purl.uniprot.org/keywords/1258
http://purl.uniprot.org/uniprot/A0A1X9I6Y5http://purl.uniprot.org/core/classifiedWithhttp://purl.uniprot.org/keywords/1258
http://purl.uniprot.org/uniprot/A7XX34http://purl.uniprot.org/core/classifiedWithhttp://purl.uniprot.org/keywords/1258
http://purl.uniprot.org/uniprot/A7XXH6http://purl.uniprot.org/core/classifiedWithhttp://purl.uniprot.org/keywords/1258
http://purl.uniprot.org/uniprot/G8I9T0http://purl.uniprot.org/core/classifiedWithhttp://purl.uniprot.org/keywords/1258
http://purl.uniprot.org/uniprot/A0A1S5S8B6http://purl.uniprot.org/core/classifiedWithhttp://purl.uniprot.org/keywords/1258
http://purl.uniprot.org/uniprot/A0A1W5N1F7http://purl.uniprot.org/core/classifiedWithhttp://purl.uniprot.org/keywords/1258
http://purl.uniprot.org/uniprot/A0A076YL25http://purl.uniprot.org/core/classifiedWithhttp://purl.uniprot.org/keywords/1258
http://purl.uniprot.org/uniprot/A0A1P8DUA7http://purl.uniprot.org/core/classifiedWithhttp://purl.uniprot.org/keywords/1258