A case study in access control requirements for a Health Information System

  • Authors:
  • Mark Evered;Serge Bögeholz

  • Affiliations:
  • University of New England, Armidale, NSW, Australia;University of New England, Armidale, NSW, Australia

  • Venue:
  • ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
  • Year:
  • 2004

Quantified Score

Hi-index 0.01

Visualization

Abstract

We present a detailed examination of the access constraints for a small real-world Health Information System with the aim of achieving minimal access rights for each of the involved principals. We show that, even for such a relatively simple system, the resulting constraints are very complex and cannot be expressed easily or clearly using the static per-method access control lists generally supported by component-based software. We derive general requirements for the expressiveness of access constraints and propose criteria for a more suitable access control mechanism in the context of component-based systems. We describe a two-level mechanism which can fulfil these criteria.