6 CONCLUSIONS
AND ONGOING WORK
XML plays a pivotal role in the biomedical and
healthcare domains via the creation of standards
such as CDA and CCR. These domains present
challenges in providing a robust security model for
XML to ensure HIPAA compliance in the usage,
transmission, and sharing of protected health
information. To address this problem, our prior work
(De la Rosa Algarín, 2012) presented a security
framework for XML that created UML-like artifacts
for XML schemas and security: the XSCD and the
XRSD. Using these as a basis, this paper has focused
on the automatic generation of XACML policies
from XRSDs (Section 4) that enforce the security
defined on XML schemas against their
corresponding instances. This allows the “same”
instance to appear differently to specific users at a
particular time. To demonstrate the feasibility and
validity of our approach, Section 5 applied the
generated XACML policies to the PHA application
for health information management that allows
patients to grant privileges to medical providers, and
providers to view and update the data. Our
prototype, using Microsoft HealthVault as a backend
with our own middle-layer server to enforce the
generated XACML policies, provides an important
proof of concept to the work presented herein.
Our on-going work is in a number of different
areas. As XACML continues to evolve, with support
for duty delegation and role delegation is being
formalized in both the policy language and
processing model; we are looking at how to model
this with our established XSCD and XRSD artifacts.
We are also looking at applying our security
framework and the work presented in this paper to
other health IT platforms, such as the SMART
Platform (http://smartplatforms.org/), and Open
mHealth (Estrin and Sim, 2010). These new
approaches to healthcare informatics present many
challenges, such as the use of different security
policies based on the data source, and the various
data structure utilized to represent information (e.g.,
JSON, RDF, OWL, etc.), as well as the creation of
more complex systems and/or applications that
result from the combination of different independent
systems and/or applications.
REFERENCES
Baumer, D., Earp, J. and Payton, F. 2000. Privacy of
medical records: IT implications of HIPAA. ACM
SIGCAS Computers and Society, 30, 4, 40-47.
Bertino, E. and Ferrari, E. 2002. Secure and selective
dissemination of XML documents. ACM Transactions
on Information and System Security (TISSEC), 2002,
5, 290-331.
Bertino, E., Castano, S., Ferrari, E. and Mesiti, M. 2002.
Protection and administration of XML data sources.
Data & Knowledge Engineering, Elsevier, 2002, 43,
237-260.
Bertino, E., Carminati, B. and Ferrari, E. 2004. Access
control for XML documents and data. Information
Security Technical Report, Elsevier, 2004, 9, 19-34.
Clark, J. et al. 1999. XSL transformations (xslt) version
1.0. W3C Recommendation, 16, 11, 1999.
Damiani, E., De Capitani di Vimercati, S., Paraboschi, S.
and Samarati, P., 2000. Design and implementation of
an access control processor for xml documents.
Computer Networks, 33, 1, 59–75.
Damiani, E., Fansi, M., Gabillon, A. and Marrara, S. 2008.
A general approach to securely querying xml.
Computer Standards & Interfaces, 30, 6, 379–389.
De la Rosa Algarín, A., Demurjian, S., Berhe, S., Pavlich-
Mariscal, J. 2012. A Security Framework for XML
schemas and Documents for Healthcare. Proceedings
of 2012 International Workshop on Biomedical and
Health Informatics (BHI 2012), 782-789.
Dolin, R.H., Alschuler, L., Boyer, S., Beebe, C., Behlen,
F.M., Biron, P.V. and Shvo, A.S. 2006. HL7 clinical
document architecture, release 2. Journal of the
American Medical Informatics Association, 13, 1, 30-
39.
Estrin, D., and Sim, I. 2010. Open mHealth architecture:
an engine for health care innovation. Science
(Washington), 330 (6005), 759-760.
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R. and
Chandramouli, R. 2001. Proposed nist standard for
role-based access control. ACM Transactions on
Information and System Security (TISSEC), 4, 3, 224-
274.
Kuper, G., Massacci, F. and Rassadko, N. 2005.
Generalized XML security views. Proceedings of the
tenth ACM symposium on Access control models and
technologies, 2005, 77-84.
Leonardi, E., Bhowmick, S. and Iwaihara, M. 2010.
Efficient database-driven evaluation of security
clearance for federated access control of dynamic
XML documents. Database Systems for Advanced
Applications, 2010, 299-306.
Müldner, T., Leighton, G. and Miziołek, J. 2009.
Parameterized Role-Based Access Control Policies for
XML Documents. Information Security Journal: A
Global Perspective, Taylor & Francis, 2009, 18, 282-
296.
Pavlich-Mariscal, J., Demurjian, S. and Michel, L. 2008.
A framework of composable access control definition,
enforcement and assurance. SCCC’08. International
Conference of the IEEE, 2008, 13–22.
DefiningandEnforcingXACMLRole-basedSecurityPolicieswithinanXMLSecurityFramework
25