attributes as XML text. There are two types of
public key and attribute certificates: the Clinicians’
and Patients’ as distribution rules contain a flag
which denotes if the Architectural Component is
allowed to be read from a patient.
3.2 Access Control
In a complex distributed system, such as MEDIS,
access control is consequently very complex and has
to satisfy both fine grained access control and
administrative simplicity. This can be realised using
plugable, component based authorisation policies
(Beznosov, 2004). An authorisation policy is the
complex of legal, ethical, social, organisational,
psychological, functional and technical implications
for trustworthiness of health information system .
One common way to express policy definition is
XML schemadata. These schemes should be
standardised for inter-operatibility purposes (Blobel,
2004). The MEDIS project aims at developing the
authorisation policy definitions, using XML scheme,
which are based on CEN ENV 13 606 Distribution
Rules (CEN 2002).
The MEDIS project has adopted XML as the
language for developing constrained hierarchical
Role Based Access Control and, at the same time,
has focus on decomposing policy engines into
components (Beznosov, 2004), (Zhou, 2004),
(Blobel, 2004), (Chadwick, 2003), (Joshi, 2004).
The MEDIS project authorisation policy has several
components (MEDIS Technical Report, 2005).
First, there is an XML schema of user attributes that
corresponds to the attribute certificate attributes.
User attributes are transfered in SOAP Headers.
Secondly, there are Distribution Rules attached to
each Architectural Component (Fig. 3). Third, there
is an Authorisation Policy on the clinical server. It
defines hierarchies of How, When, Where, Why and
Who attributes (hierarchy of Roles, Professions,
Regions etc). In that way, a hierarchical RBAC can
be implemented, with constraints defined by security
attributes (software security, physical security rating
etc.) and non-security attributes (profession,
specialisation etc.). There are, also, two master
Authorisation Policies. The Master Authorisation
Policy for Hierarchy defines which combination of,
for example, role hierarchy and profession hierarchy
is valid. There is another master Authorisation
Policy – the Master Authorisation Policy for DRs: it
defines which combinations of attributes in a
Distribution Rule are allowed in general and for an
archetype. There is an enable/disable flag, which
defines if the given combination of hierarchies is
enabled or disabled (for the first master
Authorisation Policy) and if the given combination
of attributes in a Distribution Rule has been allowed
or forbidden (for the second master Authorisation
Policy). There are in fact, two administrators: one on
the clinical server and another on the central LDAP
server. In that way, this approach provides flexibility
and administrative simplicity.
As in (Joshi, 2004) grouping information content
into concept clusters reduces complexity of the
specification process and security administration. In
the MEDIS project there is a content based access
control specification on three levels: conceptual,
archetype and instance, i.e. master authorisation
policies can be defined on the conceptual and
archetype level while there are Distribution Rules
related to the Architectural Component, as access
control specification on instance level.
Smart Card
Clinical Server I
Clinical Server II
Clinical Server N
Central
Server
LDAP
Attribute
Certificate
LDAP
Master Authorisation Policy
Figure 1: MEDIS architecture.
ICEIS 2006 - INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION
162