Collections are used for all structuring purposes in
the TCM, e.g. forming identities into teams, and
positioning roles into role hierarchies. A discussion
of collections, and the use of permissions for
collections, is given in section 5.3 below.
The preferred TCM mechanism for confidentiality
permission assignment is based on the concept of
collection. However, it is possible to assign
confidentiality permissions to Roles using general
and limited role hierarchies in the established
RBAC ways (Ferraiolo, 2001), (ANSI-INCITS),
2005).
3.2 TCM Applications Design
We introduce the following TCM concepts by
indicating their role in application development.
The development of a TCM application involves
the following steps:
• Establishing identities (users), and protected
objects (objects accessed and used).
For the EHR projects, the identities are Health
Care Practitioners (HCPs, e.g. doctors,
nurses), and patients. The protected objects are
patients’ EHRs, with authorisations specified
to the granularity of their constituent parts
(which we call EHRobjects).
• Determining the identifiers for both identities
and protected objects.
Patients in the UK are identified by NHS
Number; HCPs by various national and local
registration codes. Identifiers for EHRobjects
are determined by the designers of EHR
software.
• Specifying authorisation classifiers (or
classifiers), which are criteria to be used in
authorisation.
Authorisations are specified and enforced for
members of collections conforming to
classifiers, by confidentiality permissions.
Names for classifiers are chosen by the
application designer.
The classifiers associated with identities we
will call Identity, Role, and LegRel, and for
protected objects EHRobjectID,
EHRobjectType.
• Defining the practically useful confidentiality
permission types (CPTs), generated from the
full range of previously-specified classifiers
(see below for details)
• Choosing the required overrides from the full
range generated from the previously-specified
confidentiality permission types (see below).
It is also possible to have classifiers for operations
on protected objects, but here we just consider a
single operation classifier corresponding to the
read operation.
3.3 Confidentiality Permissions
Classifiers are used to specify confidentiality
permission types (CPTs), which must contain at
least one Identity Classifier, one Operation
Classifier, and one Protected Object Classifier.
We will now describe an example of a CPT, and its
corresponding instances, which we call
confidentiality permissions (CPs). (Note that we
present an informal description, which assumes
downward inheritance for classifier collections.)
The notation we use for this CPT is as follows:
CPT2 (IdentityID, LegRel || R || EHRobjectID)
A CP which is an instance of the CPT2 type
specifies a read authorisation involving an Identity
Collection (e.g. a clinical team, workgroup or just
a single identity), for which a Legitimate
Relationship exists with the patient, and an
EHRobjectCollection (e.g. psychosis data for this
patient, including any subcollections such as
medication prescribed for psychosis). It therefore
grants or denies access to identities having
Legitimate Relationships to specific collections of
data.
CPs are processed in order of precedence
according to complexity (ie the number of
classifiers present in the CPT specification). If two
CPTs exist with the same number of classifiers,
then the CPT with a higher precedence classifier
(as specified by the applications designer) is
processed first.
Now we are able to suggest a TCM for healthcare.
From the range of all possible CPTs, the following
might be selected as being practically useful as a
base set for the CRS. (Note that a final set of
permissions would only be arrived at following a
detailed TCM design exercise, which is to be
ICETE 2005 - GLOBAL COMMUNICATION INFORMATION SYSTEMS AND SERVICES
76