91 resultados para Evaluation model

em Université de Lausanne, Switzerland


Relevância:

70.00% 70.00%

Publicador:

Resumo:

EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

AIMS: We investigated the potential influence of a moderate-to-high cardiovascular (CV) risk (CVR) (defined as a Systematic COronary Risk Evaluation model, or SCORE ≥ 4%), in the absence of an established CV disease, on the duration and cost of CV and non-CV sick leave (SL) resulting from common and occupational accidents or diseases. METHODS AND RESULTS: We conducted a prospective cohort study on 690 135 workers with a 1-year follow-up and examined CV- and non-CV-related SL episodes. To obtain baseline values, CVR factors were initially assessed at the beginning of the year during routine medical examination. The CVR was calculated with the SCORE charts for all subjects. Moderate-to-high CVR was defined as SCORE ≥ 4%. A baseline SCORE ≥ 4% was associated with a higher risk for long-term CV and non-CV SL, as revealed by follow-up assessment. This translated into an increased cost, estimated at euro5 801 464.18 per year. Furthermore, pharmacological treatment for hypertension or hyperlipidaemia was significantly associated with longer SL duration. CONCLUSION: Moderate-to-high CVR in asymptomatic subjects was significantly associated with the duration and cost of CV and non-CV SL. These results constitute the first body of evidence that the SCORE charts can be used to identify people with a non-established CV disease, which might ultimately translate into more lost workdays and therefore increased cost for society.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Background: Bronchopulmonary dysplasia (BPD) remains the leading cause of chronic pulmonary morbidity among preterm neonates. However, the exact pathophysiology is still unknown. Here we present the first results from a new model inteAbstracts, 25th International Workshop on Surfactant Replacement 400 Neonatology 2010;97:395-400 grating the most common risk factors for BPD (lung immaturity, inflammation, mechanical ventilation (MV), oxygen), which allows long-term outcome evaluation due to a non-traumatic intubation procedure. Objectives: To test the feasibility of a new rat model by investigating effects of MV, inflammation and oxygen applied to immature lungs after a ventilation-free interval. Methods: On day 4, 5, or 6 newborn rats were given an intraperitoneal injection of lipopolysaccharides to induce a systemic inflammation. 24 h later they were anesthetized, endotracheally intubated and ventilated for 8 h with 60% oxygen. After weaning of anesthesia and MV the newborn rats were extubated and returned to their mothers. Two days later they were killed and outcome measurements were performed (histology, quantitative RT-PCR) and compared to animals investigated directly after MV. Results: Directly after MV, histological signs of ventilator-induced lung injury were found. After 48 h, the first signs of early BPD were seen with delayed alveolar formation. Expression of inflammatory genes was only transiently increased. After 48 h genes involved in alveolarization, such as matrix metalloproteinase-9 and tropoelastin, showed a significant change of their expression. Conclusion: For the first time we can evaluate in a newborn rat model the effects of MV after a ventilation-free interval. This allows discrimination between immediate response genes and delayed changes of expression of more structural genes involved in alveolarization.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The present study was performed to assess the interlaboratory reproducibility of the molecular detection and identification of species of Zygomycetes from formalin-fixed paraffin-embedded kidney and brain tissues obtained from experimentally infected mice. Animals were infected with one of five species (Rhizopus oryzae, Rhizopus microsporus, Lichtheimia corymbifera, Rhizomucor pusillus, and Mucor circinelloides). Samples with 1, 10, or 30 slide cuts of the tissues were prepared from each paraffin block, the sample identities were blinded for analysis, and the samples were mailed to each of seven laboratories for the assessment of sensitivity. A protocol describing the extraction method and the PCR amplification procedure was provided. The internal transcribed spacer 1 (ITS1) region was amplified by PCR with the fungal universal primers ITS1 and ITS2 and sequenced. As negative results were obtained for 93% of the tissue specimens infected by M. circinelloides, the data for this species were excluded from the analysis. Positive PCR results were obtained for 93% (52/56), 89% (50/56), and 27% (15/56) of the samples with 30, 10, and 1 slide cuts, respectively. There were minor differences, depending on the organ tissue, fungal species, and laboratory. Correct species identification was possible for 100% (30 cuts), 98% (10 cuts), and 93% (1 cut) of the cases. With the protocol used in the present study, the interlaboratory reproducibility of ITS sequencing for the identification of major Zygomycetes species from formalin-fixed paraffin-embedded tissues can reach 100%, when enough material is available.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

WHAT'S KNOWN ON THE SUBJECT? AND WHAT DOES THE STUDY ADD?: The AMS 800 urinary control system is the gold standard for the treatment of urinary incontinence due to sphincter insufficiency. Despite excellent functional outcome and latest technological improvements, the revision rate remains significant. To overcome the shortcomings of the current device, we developed a modern electromechanical artificial urinary sphincter. The results demonstrated that this new sphincter is effective and well tolerated up to 3 months. This preliminary study represents a first step in the clinical application of novel technologies and an alternative compression mechanism to the urethra. OBJECTIVES: To evaluate the effectiveness in continence achievement of a new electromechanical artificial urinary sphincter (emAUS) in an animal model. To assess urethral response and animal general response to short-term and mid-term activation of the emAUS. MATERIALS AND METHODS: The principle of the emAUS is electromechanical induction of alternating compression of successive segments of the urethra by a series of cuffs activated by artificial muscles. Between February 2009 and May 2010 the emAUS was implanted in 17 sheep divided into three groups. The first phase aimed to measure bladder leak point pressure during the activation of the device. The second and third phases aimed to assess tissue response to the presence of the device after 2-9 weeks and after 3 months respectively. Histopathological and immunohistochemistry evaluation of the urethra was performed. RESULTS: Bladder leak point pressure was measured at levels between 1091 ± 30.6 cmH2 O and 1244.1 ± 99 cmH2 O (mean ± standard deviation) depending on the number of cuffs used. At gross examination, the explanted urethra showed no sign of infection, atrophy or stricture. On microscopic examination no significant difference in structure was found between urethral structure surrounded by a cuff and control urethra. In the peripheral tissues, the implanted material elicited a chronic foreign body reaction. Apart from one case, specimens did not show significant presence of lymphocytes, polymorphonuclear leucocytes, necrosis or cell degeneration. Immunohistochemistry confirmed the absence of macrophages in the samples. CONCLUSIONS: This animal study shows that the emAUS can provide continence. This new electronic controlled sequential alternating compression mechanism can avoid damage to urethral vascularity, at least up to 3 months after implantation. After this positive proof of concept, long-term studies are needed before clinical application could be considered.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

OBJECTIVES: Comparison of doxorubicin uptake, leakage and spatial regional blood flow, and drug distribution was made for antegrade, retrograde, combined antegrade and retrograde isolated lung perfusion, and pulmonary artery infusion by endovascular inflow occlusion (blood flow occlusion), as opposed to intravenous administration in a porcine model. METHODS: White pigs underwent single-pass lung perfusion with doxorubicin (320 mug/mL), labeled 99mTc-microspheres, and Indian ink. Visual assessment of the ink distribution and perfusion scintigraphy of the perfused lung was performed. 99mTc activity and doxorubicin levels were measured by gamma counting and high-performance liquid chromatography on 15 tissue samples from each perfused lung at predetermined localizations. RESULTS: Overall doxorubicin uptake in the perfused lung was significantly higher (P = .001) and the plasma concentration was significantly lower (P < .0001) after all isolated lung perfusion techniques, compared with intravenous administration, without differences between them. Pulmonary artery infusion (blood flow occlusion) showed an equally high doxorubicin uptake in the perfused lung but a higher systemic leakage than surgical isolated lung perfusion (P < .0001). The geometric coefficients of variation of the doxorubicin lung tissue levels were 175%, 279%, 226%, and 151% for antegrade, retrograde, combined antegrade and retrograde isolated lung perfusion, and pulmonary artery infusion by endovascular inflow occlusion (blood flow occlusion), respectively, compared with 51% for intravenous administration (P = .09). 99mTc activity measurements of the samples paralleled the doxorubicin level measurements, indicating a trend to a more heterogeneous spatial regional blood flow and drug distribution after isolated lung perfusion and blood flow occlusion compared with intravenous administration. CONCLUSIONS: Cytostatic lung perfusion results in a high overall doxorubicin uptake, which is, however, heterogeneously distributed within the perfused lung.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Background: We demonstrated that DC Bead (Biocompatibles UK, Ltd) could be loaded with sunitinib and injected intra-arterially in the rabbit without unexpected toxicity. The purpose of this study is to evaluate the antitumoral effect of sunitinib eluting beads in the VX2 tumor model of liver cancer. Methods: VX2 tumors were implanted in the left liver lobe of New-Zealand white rabbits. Animals were assigned to 3 groups: Group 1 (n=6) received 1.5mg of sunitinib loaded in 0.05ml of 100-300um DC Bead, group 2 (n=5) received 0.05ml of 100-300um DC Bead, group 3 (n=5) received 0.05ml NaCl 0.9% in the left hepatic artery. One animal in each group was sacrificed at 24 hours and the others were followed for survival until day 15. Liver enzymes were measured daily. In group 1, plasmatic sunitinib concentration were measured daily by LC MS/MS tandem mass spectroscopy. At day 15 all living animals were sacrificed. After sacrifice, the livers were harvested for determination of the VEGF receptor tyrosine kinase activity by western blot and histopathological examination. Results: In group 1, no animals died during follow-up. In group 2, 2 animals died during follow-up on day x. In control group 3, 3 animals died during follow up on day x. In group 1 plasmatic sunitinib levels remained under therapeutic concentration throughout the experiment. Very high concentrations of sunitinib were measured in the liver tissue 24 and 15 days after embolization. Inhibition of the phosphorylation of the RTK was demonstrated at 24h and 15 days in groups 1. Sunitinib eluting beads seemed to penetrate in the tumor more effectively and there was more necrosis around the beads than their bland counterparts. Conclusions: Administration of sunitinib eluting beads in VX2 carrying rabbits resulted invery high drug concentrations at the site of embolization with minimal systemic passage. Despite the very high tissular sunitinib concentration we did not observe any additional toxicity with loaded beads. Sunitinib eluting beads inhibit the activation of RTK's triggered by ischemia and seem to prolong survival of the treated animals. Therefore we consider that local treatment with sunitinib may provide a promising approach for the treatment of liver cancer.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Children psychological abuse is difficult to identify. However, its consequences on child development can be as serious as physical and sexual abuses. It is therefore essential, to implement in our hospitals, structures whose missions are successively to detect victims, evaluate them on somatic and psychological levels, and elaborate a therapy. We propose a model for the achievement of these objectives through collaboration between the Medical Unit of Violence, the Pediatric CAN Team and the Unit of Les Boréales.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

BACKGROUND AND PURPOSE: Endovascular treatment of wide-neck bifurcation aneurysms often results in incomplete occlusion or aneurysm recurrence. The goals of this study were to compare results of coil embolization with or without the assistance of self-expandable stents and to examine how stents may influence neointima formation. MATERIALS AND METHODS: Wide-neck bifurcation aneurysms were constructed in 24 animals and, after 4-6 weeks, were randomly allocated to 1 of 5 groups: 1) coil embolization using the assistance of 1 braided stent (n = 5); 2) coil embolization using the assistance of 2 braided stents in a Y configuration (n = 5); 3) coil embolization without stent assistance (n = 6); 4) Y-stenting alone (n = 4); and 5) untreated controls (n = 4). Angiographic results were compared at baseline and at 12 weeks, by using an ordinal scale. Neointima formation at the neck at 12 weeks was compared among groups by using a semiquantitative grading scale. Bench studies were performed to assess stent porosities. RESULTS: Initial angiographic results were improved with single stent-assisted coiling compared with simple coiling (P = .013). Angiographic results at 12 weeks were improved with any stent assistance (P = .014). Neointimal closure of the aneurysm neck was similar with or without stent assistance (P = .908), with neointima covering coil loops but rarely stent struts. Y-stent placement alone had no therapeutic effect. Bench studies showed that porosities can be decreased with stent compaction, but a relatively stable porous transition zone was a limiting factor. CONCLUSIONS: Stent-assisted coiling may improve results of embolization by allowing more complete initial coiling, but these high-porosity stents did not provide a scaffold for more complete neointimal closure of aneurysms.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Purpose: To study the anti-tumoral effect of sunitinib eluting beads in the rabbit VX2 tumor modelMaterials: VX2 tumor were implanted in the left liver lobe of New-Zealand white rabbits. Seven animals received 0.2ml of DC Beads loaded with 6mg of sunitinb (group 1), 6 animals received 0.2ml of DC Beads (group 2) and 6 animals received NaCl 0.9% intra arterially in the left hepatic artery. One animal in each group was sacrificed at 24 hours and the others were left to survive. Liver enzyme were measured daily. In group 1 plasmatic sunitinib concentration were measured daily by LC MS/MS tandem mass spectroscopy. At day 15 all living animals were sacrficed. After sacrifice, or premature euthanasia the livers were harvested for determination of the VEGF receptor tyrosine kinase activity by western blot and histopathological examination.Results: In group 1, no animal died during follow-up. In group 2 and 3, respectively 2 and 3 animals died during follow-up. In group 1 plasmatic sunitinib level remained under therapeutic concentration during the whole experiment. There was an evident lack of phosphorylation of the RTK In group 1 and there was an augmentation of the RTK phosphorylation in group 2 at 24 hours. No difference in RTK activity was noticable at 15 days. From the histopathological point of view it was unpossible to differentiate treatment induced from spontaneous necrosis of tumors.Conclusions: Administration of sunitinib eluting Beads in VX2 carrying rabbits inhibits the activation of RTK's triggered by ischemia. It also seems to prolong survival of the treated animals.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

To evaluate their toxicity in the developing brain, eight metal compounds, [bismuth sodium tartrate (BiNA-tartrate), CdCl(2), CoCl(2), HgCl(2), dimethyl mercury, NiCl(2), TlCl and triethyltin chloride (TET)] were tested in aggregating cell cultures of foetal rat telencephalon. The compounds were applied to the cultures continuously, either during an early developmental stage (between days 5 and 14) or during and advanced stage of maturation (between days 24 and 34). Changes in the activities of cell type-specific enzymes were used as a criterion for toxicity. A general cytotoxic effect was observed after treatment with either CdCl(2), HgCl(2) or TET at 10(-6)m, and with TlCl at 10(-5)m. Selective effects were found with BiNa-tartrate and dimethylmercury. CoCl(2) did not modify the parameters tested, whereas a stimulant effect was found with NiCl(2). The effects of several compounds were development dependent: HgCl(2), TET and TlCl were more toxic in immature cultures, whereas BiNa-tartrate, dimethylmercury and NiCl(2) were more effective in differentiated cultures.