1,035 research outputs found

    Formation of a carcinogenic aromatic amine from an azo dye by human skin bacteria in vitro

    Get PDF
    Dieser Beitrag ist mit Zustimmung des Rechteinhabers aufgrund einer (DFG geförderten) Allianz- bzw. Nationallizenz frei zugänglich.This publication is with permission of the rights owner freely accessible due to an Alliance licence and a national licence (funded by the DFG, German Research Foundation) respectively.Azo dyes represent the major class of dyestuffs. They are metabolised to the corresponding amines by liver enzymes and the intestinal microflora following incorporation by both experimental animals and humans. For safety evaluation of the dermal exposure of consumers to azo dyes from wearing coloured textiles, a possible cleavage of azo dyes by the skin microflora should be considered since, in contrast to many dyes, aromatic amines are easily absorbed by the skin. A method for measuring the ability of human skin flora to reduce azo dyes was established. In a standard experiment, 361011 cells of a culture of Staphylococcus aureus wereincubatedinsyntheticsweat (pH 6.8, final volume 20 mL) at 288C for 24 h with Direct Blue 14 (C.I. 23850, DB 14). The reaction products were extracted and analysed using HPLC. The reduction product o-tolidine (3,3'-dimethylbenzidine, OT) could indeed be detected showing that the strain used was able to metabolise DB 14 to the corresponding aromatic amine. In addition to OT, two further metabolites of DB 14 were detected. Using mass spectrometry they were identified as 3,3'-dimethyl-4-amino-4'-hydroxybiphenyl and 3,3'-di methyl-4-aminobiphenyl. The ability to cleave azo dyes seems to be widely distributed among human skin bacteria, as, under these in vitro conditions, bacteria isolated from healthy human skin and human skin bacteria from strain collections also exhibited azo reductase activity. Further studies are in progress in order to include additional azo dyes and coloured textiles. At the moment, the meaning of the results with regard to consumer health cannot be finally assessed

    A non-interleaving process calculus for multi-party synchronisation

    Full text link
    We introduce the wire calculus. Its dynamic features are inspired by Milner's CCS: a unary prefix operation, binary choice and a standard recursion construct. Instead of an interleaving parallel composition operator there are operators for synchronisation along a common boundary and non-communicating parallel composition. The (operational) semantics is a labelled transition system obtained with SOS rules. Bisimilarity is a congruence with respect to the operators of the language. Quotienting terms by bisimilarity results in a compact closed category

    Growth and glycemic control in children with type 1 diabetes and asymptomatic celiac disease treated with a gluten -free diet for 1 year

    Get PDF
    To compare growth and glycemic control in children with type 1 diabetes and silent celiac disease treated with a gluten-free diet for 1 year with those of similar age and gender with type 1 diabetes but without celiac disease, 16 type 1 diabetes patients with silent celiac disease were enrolled and each celiac disease-positive case was matched for age, sex, and duration of diabetes with two type 1 diabetes controls with negative serologic markers of celiac disease. All 16 children with positive celiac disease serology had histologic features consistent with celiac disease despite the absence of symptoms. The mean growth and metabolic control values were similar between children with type 1 diabetes and celiac disease and those with type 1 diabetes but without celiac disease. This study seems to suggest that the early diagnosis of celiac disease and initiation of a gluten-free diet may prevent further deterioration in the nutritional status of children with type 1 diabetes and celiac disease and may reduce the prospect of celiac disease complications without any impact on type 1 diabetes control

    History-sensitive versus future-sensitive approaches to security in distributed systems

    Full text link
    We consider the use of aspect-oriented techniques as a flexible way to deal with security policies in distributed systems. Recent work suggests to use aspects for analysing the future behaviour of programs and to make access control decisions based on this; this gives the flavour of dealing with information flow rather than mere access control. We show in this paper that it is beneficial to augment this approach with history-based components as is the traditional approach in reference monitor-based approaches to mandatory access control. Our developments are performed in an aspect-oriented coordination language aiming to describe the Bell-LaPadula policy as elegantly as possible. Furthermore, the resulting language has the capability of combining both history- and future-sensitive policies, providing even more flexibility and power.Comment: In Proceedings ICE 2010, arXiv:1010.530

    Port Protocols for Deadlock-Freedom of Component Systems

    Full text link
    In component-based development, approaches for property verification exist that avoid building the global system behavior of the component model. Typically, these approaches rely on the analysis of the local behavior of fixed sized subsystems of components. In our approach, we want to avoid not only the analysis of the global behavior but also of the local behaviors of the components. Instead, we consider very small parts of the local behaviors called port protocols that suffice to verify properties.Comment: In Proceedings ICE 2010, arXiv:1010.530

    Safer in the Clouds (Extended Abstract)

    Full text link
    We outline the design of a framework for modelling cloud computing systems.The approach is based on a declarative programming model which takes the form of a lambda-calculus enriched with suitable mechanisms to express and enforce application-level security policies governing usages of resources available in the clouds. We will focus on the server side of cloud systems, by adopting a pro-active approach, where explicit security policies regulate server's behaviour.Comment: In Proceedings ICE 2010, arXiv:1010.530
    • …
    corecore