Pervasive environments are built upon mobile ad-hoc networks. Adaptations and
extensions [14] of classical topology-based routing protocols known from static
networks are coping with the problem of permanent link failures due to device
mobility. Furthermore, except form this adaptation to network protocols design, due
to their unstable architecture, they demand a totally innovative design of their security
management scheme. The large number of users and roles coming from different
domains requires further considerations concerning the deployment and enforcement
of security decisions. Our approach is policy-based, confronting with the RBAC
access control model. Additively, we provided a flexible solution for the multi-
domain role equipollence problem and we redesigned the XACML policy
enforcement scheme in order to become applicable to pervasive environments. We
adjusted the standardized XACML based authorization scheme to a distributed
architecture, suitable for the instability issues that characterize MANET’s
infrastructures.
Another characteristic of our approach is the transparency it provides, based on
the utilization of software agents. The agents were implemented in the JADE
platform, and were used for identification of medical records related to a specific
patient, as well as for performing authorization procedures transparently to the user,
by providing to the PDP the user’s credentials. This transparent identification and
authorization scheme, utilized concepts described in [15]. We plan to expand our
experimentation by utilizing protocols such as these described in [16] [17], and to
apply the scenario on a more complex hardware infrastructure.
Acknowledgments
The authors would like to thank John Varnas for providing assistance with the
drawings. We would also like to thank the anonymous reviewers for their insightful
comments.
This work was co-funded by 75% from E.E. and 25% from the Greek Government
under the framework of the Education and Initial Vocational Training Program –
Archimedes.
References
1. Perkins, C. E., Ad Hoc Networking, 2001 Addison Wesley Longman Inc.
2. A. Choudhri, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, “PatientService : Electronic
Patient Record Redaction and Delivery in Pervasive Environments”, Fifth International
Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom
2003), Santa Monica, June 2003
3. Scott R.E., Jennet P., Yeo M. Access and authorization in a Global e-Health Policy context.
International Journal of Medical Informatics (2004) 73, 259-266.
4. Ruotsalainen P. “A cross platform model for secure Electronic health record
communication”, International Journal of Medical Informatics, (2004) 73, 291-295
5. Kokolakis, S., Gritzalis, D. and Katsikas, S. (1998a). Generic security policies for
healthcare information systems. Health informatics journal, 4(4), 184-195.
108