Outline for February 13, 2012
Reading:
§7.2–7.4
Clinical Information System Security model
Intended for medical records; goals are confidentiality, authentication of annotators, and integrity
Patients, personal health information, clinician
Assumptions and origin of principles
Access principles
Creation principle
Deletion principle
Confinement principle
Aggregation principle
Enforcement principle
Comparison to Bell-LaPadula: lattice structure but different focus
Comparison to Clark-Wilson: specialization
ORCON
Originator controls distribution
DAC, MAC inadequate
Solution is combination
Role-based Access Control (RBAC)
Definition of role
Partitioning as job function
Containment
A PDF version is available here.
ECS 235B, Foundations of Computer and Information Security
Winter Quarter 2012