1,042 research outputs found
Formation of a carcinogenic aromatic amine from an azo dye by human skin bacteria in vitro
Dieser Beitrag ist mit Zustimmung des Rechteinhabers aufgrund einer (DFG geförderten) Allianz- bzw. Nationallizenz frei zugänglich.This publication is with permission of the rights owner freely accessible due to an Alliance licence and a national licence (funded by the DFG, German Research Foundation) respectively.Azo dyes represent the major class of dyestuffs. They are metabolised to the corresponding amines by liver enzymes and the intestinal microflora following incorporation by both experimental animals and humans. For safety evaluation of the dermal exposure of consumers to azo dyes from wearing coloured textiles, a possible cleavage of azo dyes by the skin microflora should be considered since, in contrast to many dyes, aromatic amines are easily absorbed by the skin. A method for measuring the ability of human skin flora to reduce azo dyes was established. In a standard experiment, 361011 cells of a culture of Staphylococcus aureus wereincubatedinsyntheticsweat (pH 6.8, final volume 20 mL) at 288C for 24 h with Direct Blue 14 (C.I. 23850, DB 14). The reaction products were extracted and analysed using HPLC. The reduction product o-tolidine (3,3'-dimethylbenzidine, OT) could indeed be detected showing that the strain used was able to metabolise DB 14 to the corresponding aromatic amine. In addition to OT, two further metabolites of DB 14 were detected. Using mass spectrometry they were identified as 3,3'-dimethyl-4-amino-4'-hydroxybiphenyl and 3,3'-di methyl-4-aminobiphenyl. The ability to cleave azo dyes seems to be widely distributed among human skin bacteria, as, under these in vitro conditions, bacteria isolated from healthy human skin and human skin bacteria from strain collections also exhibited azo reductase activity. Further studies are in progress in order to include additional azo dyes and coloured textiles. At the moment, the meaning of the results with regard to consumer health cannot be finally assessed
A non-interleaving process calculus for multi-party synchronisation
We introduce the wire calculus. Its dynamic features are inspired by Milner's
CCS: a unary prefix operation, binary choice and a standard recursion
construct. Instead of an interleaving parallel composition operator there are
operators for synchronisation along a common boundary and non-communicating
parallel composition. The (operational) semantics is a labelled transition
system obtained with SOS rules. Bisimilarity is a congruence with respect to
the operators of the language. Quotienting terms by bisimilarity results in a
compact closed category
Growth and glycemic control in children with type 1 diabetes and asymptomatic celiac disease treated with a gluten -free diet for 1 year
To compare growth and glycemic control in children with type 1 diabetes and silent celiac disease treated with a gluten-free diet for 1 year with those of similar age and gender with type 1 diabetes but without celiac disease, 16 type 1 diabetes patients with silent celiac disease were enrolled and each celiac disease-positive case was matched for age, sex, and duration of diabetes with two type 1 diabetes controls with negative serologic markers of celiac disease. All 16 children with positive celiac disease serology had histologic features consistent with celiac disease despite the absence of symptoms. The mean growth and metabolic control values were similar between children with type 1 diabetes and celiac disease and those with type 1 diabetes but without celiac disease. This study seems to suggest that the early diagnosis of celiac disease and initiation of a gluten-free diet may prevent further deterioration in the nutritional status of children with type 1 diabetes and celiac disease and may reduce the prospect of celiac disease complications without any impact on type 1 diabetes control
History-sensitive versus future-sensitive approaches to security in distributed systems
We consider the use of aspect-oriented techniques as a flexible way to deal
with security policies in distributed systems. Recent work suggests to use
aspects for analysing the future behaviour of programs and to make access
control decisions based on this; this gives the flavour of dealing with
information flow rather than mere access control. We show in this paper that it
is beneficial to augment this approach with history-based components as is the
traditional approach in reference monitor-based approaches to mandatory access
control. Our developments are performed in an aspect-oriented coordination
language aiming to describe the Bell-LaPadula policy as elegantly as possible.
Furthermore, the resulting language has the capability of combining both
history- and future-sensitive policies, providing even more flexibility and
power.Comment: In Proceedings ICE 2010, arXiv:1010.530
Port Protocols for Deadlock-Freedom of Component Systems
In component-based development, approaches for property verification exist
that avoid building the global system behavior of the component model.
Typically, these approaches rely on the analysis of the local behavior of fixed
sized subsystems of components. In our approach, we want to avoid not only the
analysis of the global behavior but also of the local behaviors of the
components. Instead, we consider very small parts of the local behaviors called
port protocols that suffice to verify properties.Comment: In Proceedings ICE 2010, arXiv:1010.530
Safer in the Clouds (Extended Abstract)
We outline the design of a framework for modelling cloud computing
systems.The approach is based on a declarative programming model which takes
the form of a lambda-calculus enriched with suitable mechanisms to express and
enforce application-level security policies governing usages of resources
available in the clouds. We will focus on the server side of cloud systems, by
adopting a pro-active approach, where explicit security policies regulate
server's behaviour.Comment: In Proceedings ICE 2010, arXiv:1010.530
- …