
 
6 CONCLUSIONS 
AND ONGOING WORK 
XML plays a pivotal role in the biomedical and 
healthcare domains via the creation of standards 
such as CDA and CCR.  These domains present 
challenges in providing a robust security model for 
XML to ensure HIPAA compliance in the usage, 
transmission, and sharing of protected health 
information. To address this problem, our prior work 
(De la Rosa Algarín, 2012) presented a security 
framework for XML that created UML-like artifacts 
for XML schemas and security: the XSCD and the 
XRSD. Using these as a basis, this paper has focused 
on the automatic generation of XACML policies 
from XRSDs (Section 4) that enforce the security 
defined on XML schemas against their 
corresponding instances. This allows the “same” 
instance to appear differently to specific users at a 
particular time. To demonstrate the feasibility and 
validity of our approach, Section 5 applied the 
generated XACML policies to the PHA application 
for health information management that allows 
patients to grant privileges to medical providers, and 
providers to view and update the data.  Our 
prototype, using Microsoft HealthVault as a backend 
with our own middle-layer server to enforce the 
generated XACML policies, provides an important 
proof of concept to the work presented herein. 
Our on-going work is in a number of different 
areas. As XACML continues to evolve, with support 
for duty delegation and role delegation is being 
formalized in both the policy language and 
processing model; we are looking at how to model 
this with our established XSCD and XRSD artifacts. 
We are also looking at applying our security 
framework and the work presented in this paper to 
other health IT platforms, such as the SMART 
Platform (http://smartplatforms.org/), and Open 
mHealth (Estrin and Sim, 2010). These new 
approaches to healthcare informatics present many 
challenges, such as the use of different security 
policies based on the data source, and the various 
data structure utilized to represent information (e.g., 
JSON, RDF, OWL, etc.), as well as the creation of 
more complex systems and/or applications that 
result from the combination of different independent 
systems and/or applications. 
REFERENCES 
Baumer, D., Earp, J. and Payton, F. 2000. Privacy of 
medical records: IT implications of HIPAA. ACM 
SIGCAS Computers and Society, 30, 4, 40-47. 
Bertino, E. and Ferrari, E. 2002. Secure and selective 
dissemination of XML documents. ACM Transactions 
on Information and System Security (TISSEC), 2002, 
5, 290-331. 
Bertino, E., Castano, S., Ferrari, E. and Mesiti, M. 2002. 
Protection and administration of XML data sources. 
Data & Knowledge Engineering, Elsevier, 2002, 43, 
237-260. 
Bertino, E., Carminati, B. and Ferrari, E. 2004. Access 
control for XML documents and data. Information 
Security Technical Report, Elsevier, 2004, 9, 19-34. 
Clark, J. et al. 1999. XSL transformations (xslt) version 
1.0. W3C Recommendation, 16, 11, 1999. 
Damiani, E., De Capitani di Vimercati, S., Paraboschi, S. 
and Samarati, P., 2000. Design and implementation of 
an access control processor for xml documents. 
Computer Networks, 33, 1, 59–75. 
Damiani, E., Fansi, M., Gabillon, A. and Marrara, S. 2008. 
A general approach to securely querying xml. 
Computer Standards & Interfaces, 30, 6, 379–389. 
De la Rosa Algarín, A., Demurjian, S., Berhe, S., Pavlich-
Mariscal, J. 2012. A Security Framework for XML 
schemas and Documents for Healthcare. Proceedings 
of 2012 International Workshop on Biomedical and 
Health Informatics (BHI 2012), 782-789.  
Dolin, R.H., Alschuler, L., Boyer, S., Beebe, C., Behlen, 
F.M., Biron, P.V. and Shvo, A.S. 2006. HL7 clinical 
document architecture, release 2. Journal of the 
American Medical Informatics Association, 13, 1, 30-
39. 
Estrin, D., and Sim, I. 2010. Open mHealth architecture: 
an engine for health care innovation. Science 
(Washington), 330 (6005), 759-760. 
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R. and 
Chandramouli, R. 2001. Proposed nist standard for 
role-based access control. ACM Transactions on 
Information and System Security (TISSEC), 4, 3, 224-
274. 
Kuper, G., Massacci, F. and Rassadko, N. 2005. 
Generalized XML security views. Proceedings of the 
tenth ACM symposium on Access control models and 
technologies, 2005, 77-84. 
Leonardi, E., Bhowmick, S. and Iwaihara, M. 2010. 
Efficient database-driven evaluation of security 
clearance for federated access control of dynamic 
XML documents. Database Systems for Advanced 
Applications, 2010, 299-306. 
Müldner, T., Leighton, G. and Miziołek, J. 2009. 
Parameterized Role-Based Access Control Policies for 
XML Documents. Information Security Journal: A 
Global Perspective, Taylor & Francis, 2009, 18, 282-
296. 
Pavlich-Mariscal, J., Demurjian, S. and Michel, L. 2008. 
A framework of composable access control definition, 
enforcement and assurance. SCCC’08. International 
Conference of the IEEE, 2008, 13–22. 
 
DefiningandEnforcingXACMLRole-basedSecurityPolicieswithinanXMLSecurityFramework
25