Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/976440.976447dlproceedingsArticle/Chapter ViewAbstractPublication Pagesaus-cswConference Proceedingsconference-collections
Article
Free access

A case study in access control requirements for a Health Information System

Published: 01 January 2004 Publication History
  • Get Citation Alerts
  • Abstract

    We present a detailed examination of the access constraints for a small real-world Health Information System with the aim of achieving minimal access rights for each of the involved principals. We show that, even for such a relatively simple system, the resulting constraints are very complex and cannot be expressed easily or clearly using the static per-method access control lists generally supported by component-based software. We derive general requirements for the expressiveness of access constraints and propose criteria for a more suitable access control mechanism in the context of component-based systems. We describe a two-level mechanism which can fulfil these criteria.

    References

    [1]
    Beznosov, K., Deng, Y. (1999): A Framework for Implementing Role-based Access Control using CORBA Security Service, Proc. 4th ACM Workshop on Role-based access control, Fairfax.]]
    [2]
    Bögeholz, S. (2003): Access Control in a Distributed Health Information System: A Case Study, Masters Thesis, University of New England, Armidale.]]
    [3]
    Blakley, B., Blakley, R., Soley, R. M. (2000): CORBA Security: An Introduction to Safe Computing with Objects, Addison-Wesley.]]
    [4]
    Brose, G. (1999): A View-Based Access Control Model for CORBA, in: Jan Vitek, Christian Jensen (eds.), Secure Internet Programming: Security Issues for Mobile and Distributed Objects, LNCS 1603, Springer.]]
    [5]
    Eddon, G. (1999): The COM+ Security Model Gets You Out of the Security Programming Business, Microsoft Systems Journal, November.]]
    [6]
    Evered, M. (2002): Bracket Capabilities for Distributed Systems Security, Proc. 25th Australasian Computer Science Conference, Melbourne.]]
    [7]
    Evered, M. (2002): Opsis: A Distributed Object Architecture Based on Bracket Capabilities, Proc. Conference on Technology of Object-Oriented Languages and Systems, Sydney.]]
    [8]
    Evered, M. (2003): Flexible Enterprise Access Control with Object-oriented View Specifications, Australasian Information Security Workshop, Adelaide.]]
    [9]
    Fernandez, E. B., Larrondo-Petrie, M. M., Gudes, E., A. (1993): Model of Methods Access Authorization in Object-oriented Databases, Proc. of the 19th VLDB Conference, Dublin.]]
    [10]
    Gamma, E. et al. (1995): Design Patterns, Addison-Wesley.]]
    [11]
    Habermann, A. N., Campbell, R. H. (1974): The specification of process synchronization by path expressions, Lecture Notes on Computer Science, 16.]]
    [12]
    Hartman, B., Flinn, D. J., Benznosov, K. (2001): Enterprise Security with EJB and CORBA, Wiley.]]
    [13]
    Jones, A., Liskov, B. (1978): A language extension for expressing constraints on data access. Communications of the ACM, 21(5):358--367, May.]]
    [14]
    Keedy, J. L., Richards, I. (1982): A Software Engineering View of Files, Australian Computer Journal, 14, 2.]]
    [15]
    Keedy, J. L., et al. (2000): Software Reuse in an Object Oriented Framework: Distinguishing Types from Implementations and Objects from Attributes, Proc. Sixth International Conference on Software Reuse, Vienna.]]
    [16]
    Kiczales, G. et al. (1997): Aspect-oriented programming, Proc. European Conference for Object-Oriented Programming, Finland (Lecture Notes in Computer Science, vol. 1241). Springer.]]
    [17]
    Mishra, P., Eich, M. H. (1994): Taxonomy of views in OODBs, Proc. ACM Computer Science Conference.]]
    [18]
    Richardson, J., Schwarz, P., Cabrera, L. (1992): CACL: Efficient Fine-Grained Protection for Objects, Proc. OOPSLA Conference.]]
    [19]
    Rosenberg, J., Abramson, D. A. (1985): The MONADS Architecture: Motivation and Implementation, Proc. First Pan Pacific Computer Conference, p. 4/10--4/23.]]
    [20]
    Saltzer, J. H. (1973): Protection and the Control of Information Sharing in Multics, Symposium on Operating System Principles, Yorktown Heights, NY.]]
    [21]
    Wilkes, M. V., Needham, R. M. (1979): The Cambridge CAP Computer and its Operating System, North Holland.]]

    Cited By

    View all
    • (2015)Enforcement of privacy requirementsComputers and Security10.1016/j.cose.2015.03.00452:C(164-177)Online publication date: 1-Jul-2015
    • (2013)Heuristic safety analysis of access control modelsProceedings of the 18th ACM symposium on Access control models and technologies10.1145/2462410.2462413(137-148)Online publication date: 12-Jun-2013
    • (2013)A fine-grained access control model for key-value systemsProceedings of the third ACM conference on Data and application security and privacy10.1145/2435349.2435370(161-164)Online publication date: 18-Feb-2013
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image DL Hosted proceedings
    ACSW Frontiers '04: Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
    January 2004
    192 pages

    Publisher

    Australian Computer Society, Inc.

    Australia

    Publication History

    Published: 01 January 2004

    Author Tags

    1. Health Information System
    2. access control
    3. component

    Qualifiers

    • Article

    Conference

    ACSW Frontiers '04

    Acceptance Rates

    Overall Acceptance Rate 204 of 424 submissions, 48%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)72
    • Downloads (Last 6 weeks)14
    Reflects downloads up to 12 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2015)Enforcement of privacy requirementsComputers and Security10.1016/j.cose.2015.03.00452:C(164-177)Online publication date: 1-Jul-2015
    • (2013)Heuristic safety analysis of access control modelsProceedings of the 18th ACM symposium on Access control models and technologies10.1145/2462410.2462413(137-148)Online publication date: 12-Jun-2013
    • (2013)A fine-grained access control model for key-value systemsProceedings of the third ACM conference on Data and application security and privacy10.1145/2435349.2435370(161-164)Online publication date: 18-Feb-2013
    • (2012)A Generative Programming Framework for Context-Aware CSCW ApplicationsACM Transactions on Software Engineering and Methodology10.1145/2089116.208912121:2(1-35)Online publication date: 1-Mar-2012
    • (2011)Combining static analysis and runtime checking in security aspects for distributed tuple spacesProceedings of the 13th international conference on Coordination models and languages10.5555/2022052.2022066(202-218)Online publication date: 6-Jun-2011
    • (2011)Challenges in ehealthProceedings of the First international conference on Foundations of Health Informatics Engineering and Systems10.1007/978-3-642-32355-3_12(195-206)Online publication date: 29-Aug-2011
    • (2010)SecPAL: Design and semantics of a decentralized authorization languageJournal of Computer Security10.5555/1835408.183541118:4(619-665)Online publication date: 1-Dec-2010
    • (2010)Access control caching strategiesProceedings of the 6th International Workshop on Security Measurements and Metrics10.1145/1853919.1853930(1-8)Online publication date: 15-Sep-2010
    • (2009)Trading in riskProceedings of the 2008 New Security Paradigms Workshop10.1145/1595676.1595694(107-125)Online publication date: 21-Aug-2009
    • (2009)Symbolic reachability analysis for parameterized administrative role based access controlProceedings of the 14th ACM symposium on Access control models and technologies10.1145/1542207.1542233(165-174)Online publication date: 3-Jun-2009
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media