Outline for February 13, 2012

Reading: §7.2–7.4

  1. Clinical Information System Security model
    1. Intended for medical records; goals are confidentiality, authentication of annotators, and integrity
    2. Patients, personal health information, clinician
    3. Assumptions and origin of principles
    4. Access principles
    5. Creation principle
    6. Deletion principle
    7. Confinement principle
    8. Aggregation principle
    9. Enforcement principle
    10. Comparison to Bell-LaPadula: lattice structure but different focus
    11. Comparison to Clark-Wilson: specialization
  2. ORCON
    1. Originator controls distribution
    2. DAC, MAC inadequate
    3. Solution is combination
  3. Role-based Access Control (RBAC)
    1. Definition of role
    2. Partitioning as job function
    3. Containment

A PDF version is available here.
UC Davis sigil
ECS 235B, Foundations of Computer and Information Security
Winter Quarter 2012