subject to the current context. The access control
mechanism presented in this paper meets the
aforementioned requirements and is embedded into a
Grid portal application, namely HDGPortal. In
particular, the mechanism ensures authorized
execution of BPEL tasks and invocation of relevant
Grid database services in accordance with the
current context. To this end, a number of xoRBAC
instances are integrated at both the BPEL and the
Grid database service level as policy decision points.
Thus, a tight matching of permissions to actual
usage and need is ensured through the specification
of fine-grained context-dependent access control
policies.
Currently, the pieces of information influencing
authorization decisions in xoRBAC are rather
limited. This fact, suggests directions for future
work. In particular, the enrichment of the context
information model used by xoRBAC may enable the
enforcement of even more effective access control
policies in healthcare. Furthermore, certain
disadvantages that appear in the mechanisms that are
currently used for the collection of the context
information may constitute an interesting topic for
further research.
REFERENCES
Koufi, V., Vassilacopoulos, G., 2008. HDGPortal: A Grid
Portal Application for Pervasive Access to Process-
Based Healthcare Systems, In PervasiveHealth’08,
2nd International Conference in Pervasive Computing
Technologies in Healthcare.
Emmerich, W., Butchart, B., Chen, L., Wassermann, B.,
Price, S., 2006. Grid Service Orchestration Using the
Business Process Execution Language (BPEL),
Journal of Grid Computing (2006) 3: 283-304.
Mendling, J, Strembeck, M, Stermsek, G, Neumann, G.,
2004. An Approach to Extract RBAC Models for
BPEL4WS Processes, Proceedings of the 13th IEEE
International Workshops on Enabling Technologies:
Infrastructure for Collaborative Enterprises.
Thomas, J., Paci, F., Bertino, E., Eugster, P., 2007. User
Tasks and Access Control over Web Services,
Proceedings of the 15th IEEE International
Conference on Web Services, 2007.
Bertino, E., Crampton, J., Paci, F., 2006. Access Control
and Authorization Constraints for WS-BPEL,
Proceedings of the IEEE International Conference on
Web Services, 2006.
Open Grid Services Architecture - Data Access and
Integration (OGSA-DAI), http://www.ogsadai.org.uk/.
Adamski, M., Kulczewski, M., Kurowski, K., Nabrzyski,
J., Hume, A., 2007. Security and Performance
Enhancements to OGSA-DAI for Grid Data
Virtualization, Concurrency and Computation.:
Practice and Experience, 2007.
Dou, W., Cheung, SC., Chen, G., Cai, S., 2005.
Certificate-Driven Grid Workflow Paradigm Based on
Service Computing, Lecture Notes in Computer
Science (2005) 3795: 155-160.
Power, D., Slaymaker, M., Politou, E., Simpson, A., 2005.
A Secure Wrapper for OGSA-DAI, Lecture Notes in
Computer Science (2005) 3470: 485-494.
IBM Corporation. IBM Websphere Workflow – Getting
Started with Buildtime V. 3.6, 2005.
Java Authentication and Authorization Service,
http://java.sun.com/javase/6/docs/technotes/guides/sec
urity/jaas/JAASRefGuide.html.
National Institute of Standards and Technology (NIST)
RBAC, http://csrc.nist.gov/groups/SNS/rbac/
Neumann, G., Strembeck, M., 2001. Design and
Implementation of a Flexible RBAC-Service in n
Object-Oriented Scripting Language. Proceedings of
CCS’01, November 5-8, 2001, Philadelphia,
Pennsylvania, USA.
Neumann, G., Strembeck, M., 2003. An Approach to
Engineer and Enforce Context Constraints in an
RBAC Environment, Proceedings of SACMAT’03,
June 2-3, 2003, Como, Italy.
The Globus Toolkit, http://www.globus.org/
xoRBAC, http://wi.wu-
wien.ac.at/home/mark/xoRBAC/index.html
Neumann, G., Strembeck, M., 2003. An Approach to
Engineer and Enforce Context Constraints in an
RBAC Environment, ACM Transactions on
Information and System Security, Vol. 7, No. 3,
August 2004, pp 392-427.
MyProxy Credential Management Service,
http://grid.ncsa.uiuc.edu/myproxy/
Paci, F., Bertino, E., Crampton, J., 2008. An Access-
Control Framework for WS-BPEL, International
Journal of Web Services Research, Vol. 5, Issue 3, pp.
20-43.
Fischer, K.P., Bleimann, U., Fuhrmann, W., Furnell, S.M.,
2007, "Security policy enforcement in BPEL-defined
collaborative business processes", Proceedings of the
1st International Workshop on Security Technologies
for Next Generation Collaborative Business
Applications (SECOBAP'07).
Guth, S., Neumann, G., Strembeck, M., 2003.
“Experiences with the Enforcement of Access Rights
Extracted from ODRL-based Digital Contracts”. In
DRM’03, 3
rd
ACM Workshop on Digital Rights
Management.
AN APPROACH TO ENFORCE CONTEXT-AWARE ACCESS CONTROL TO PROCESS-BASED HEALTHCARE
SYSTEMS BUILD ON A GRID INFRASTRUCTURE
29