Implementing Context and Team Based Access Control in healthcare intranets

被引:8
作者
Georgiadis, CK [1 ]
Mavridis, IK [1 ]
Nikolakopoulou, G [1 ]
Pangalos, GI [1 ]
机构
[1] Aristotle Univ Thessaloniki, Informat Lab, Comp Div, Fac Technol, GR-54006 Thessaloniki, Greece
来源
MEDICAL INFORMATICS AND THE INTERNET IN MEDICINE | 2002年 / 27卷 / 03期
关键词
information systems security; access control; teams; contexts; active security; attribute certificates;
D O I
10.1080/1463923021000042715
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The establishment of an efficient access control system in healthcare intranets is a critical security issue directly related to the protection of patients' privacy. Our C-TMAC (Context and Team-based Access Control) model is an active security access control model that layers dynamic access control concepts on top of RBAC (Role-based) and TMAC (Team-based) access control models. It also extends them in the sense that contextual information concerning collaborative activities is associated with teams of users and user permissions are dynamically filtered during runtime. These features of C-TMAC meet the specific security requirements of healthcare applications. In this paper, an experimental implementation of the C-TMAC model is described. More specifically, we present the operational architecture of the system that is used to implement C-TMAC security components in a healthcare intranet. Based on the technological platform of an Oracle Data Base Management System and Application Server, the application logic is coded with stored PL/SQL procedures that include Dynamic SQL routines for runtime value binding purposes. The resulting active security system adapts to current need-to-know requirements of users during runtime and provides fine-grained permission granularity. Apart from identity certificates for authentication, it uses attribute certificates for communicating critical security metadata, such as role membership and team participation of users.
引用
收藏
页码:185 / 201
页数:17
相关论文
共 20 条
[1]  
[Anonymous], 1997, RBAC 97
[2]  
[Anonymous], 1997, P 2 ACM WORKSH ROL B
[3]  
[Anonymous], PROCEEDINGS OF THE T
[4]  
ARSENAULT A, 2000, UNPUB INTERNET X509
[5]  
BESNOSOV K, 1999, P 4 ACM WORKSH ROL B, P19
[6]  
FARREL S, 2001, UNPUB INTERNET ATTRI
[7]  
GEORGIADIS CK, 2000, P 5 NORD WORKSH SEC, P225
[8]  
GEORGIADIS CK, 2000, P INT WORKSH EM ISS, P25
[9]  
GEPRGIADIS CK, 2001, P 6 ACM S ACC CONTR, P21
[10]  
Grimson J, 2000, COMMUN ACM, V43, P49