Modelling privilege management and access control

被引:41
作者
Blobel, Bernd
Nordberg, Ragnar
Davis, John Mike
Pharow, Peter
机构
[1] Fraunhofer Inst Integrated Circuits IIS, Hlth Telemat Project Grp, D-91058 Erlangen, Germany
[2] Sahlgrens Univ Hosp, S-41345 Gothenburg, Sweden
关键词
EHR; model-driven architecture; components; constraint models; authorisation; privilege management; access control; security infrastructure;
D O I
10.1016/j.ijmedinf.2005.08.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Objectives: For establishing trustworthiness in advanced architectures for future-proof health information systems being open, flexible, scaleable, portable, and semantically interoperabte, security and privacy services needed must be designed as an inherent part of the architecture. Such architecture has to meet the paradigms of distribution, component orientation, format modelling, separation of logical and technological aspects, etc. Methods: In model.-driven architectures components providing security and privacy services have to be specified using the same methodology of format models with meta-languages as expression means, as deployed in computational, technical, or medical domains. The resulting approach must be based on the ISO Reference Model-Open Distributed Processing. Results: Currently, standards developing organisation are defining emerging tasks and standards for semantic interoperabitity and trustworthy collaboration for advanced health information systems. Communication security issues have been specified and implemented, while application security challenges such as privilege management and access control are stilt under development. Therefore, a series of format models have been developed by the authors covering, e.g. domains, service delegation, claims control, policies, rotes, authorisations, and access control. The required models are introduced and interpreted in a generic way. The crucial concept of security policy and its relationship to the other concepts has been considered in detail. Conclusion: Based on format models, security services can be integrated into advanced systems architectures enabling semantic interoperabitity in the context of trustworthiness of communication and co-operation. (c) 2005 Elsevier Ireland Ltd. All rights reserved.
引用
收藏
页码:597 / 623
页数:27
相关论文
共 36 条
[1]  
[Anonymous], 1996, SECURITY CLIN INFORM
[2]  
*ASTM, 2001, E3120 ASTM
[3]  
*ASTM, E221202 ASTM
[4]  
*ASTM, E198698 ASTM
[5]  
BEALE T, 2001, INTEROPERABLE KNOWLE
[6]  
Blobel B, 1996, ST HEAL T, V27, P168
[7]   A systematic approach for analysis and design of secure health information systems [J].
Blobel, B ;
Roger-France, F .
INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2001, 62 (01) :51-78
[8]  
Blobel B, 1997, TOWARD AN ELECTRONIC HEALTH RECORD EUROPE '97 - CONFERENCE ON THE CREATION OF A EUROPEAN ELECTRONIC HEALTH RECORD, CONFERENCE PROCEEDINGS, P221
[9]  
BLOBEL B, 2003, AMIA 2003 S BIOM HLT, V96
[10]  
Blobel Bernd, 2004, Stud Health Technol Inform, V103, P394