OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

 


 

   RE: Healthcare and Security/Privacy

[ Lists Home | Date Index | Thread Index ]
  • From: "Bullard, Claude L (Len)" <clbullar@ingr.com>
  • To: KenNorth <KenNorth@email.msn.com>, xml-dev@lists.xml.org
  • Date: Tue, 25 Jul 2000 08:33:52 -0500

Transferring metadata is one means but you have no 
guarantor it will be applied.  That is unacceptable.  
See below on vetting of organization.  Simply, you 
will not transfer such information in the clear or 
to a non-trusted host unless locally authorized 
(sender is responsible and authoritative).

You have the additional value of the workstation itself 
to associate with the login.  This is another security 
technique where the room the device is in is part of 
the securing method.  In all cases, a separate information 
set is being used to apply security.  These may work in 
combination or singly.   It is not necessary to create 
an orthogonal set of security attributes and use them 
on a per field basis thus replicating that information 
in every part of the database although that is one 
technique.  It depends on where you want to put the 
security overhead.  Yes, you can create a security 
model of authorities and yes that can be transferred 
if applied to record types.  Do you want the secured 
data to be filtered out by the query or the query 
to be filtered?   

There are also the levels of 
security in terms of what is revealed by a negation.  
IOW, if you allow a name plus age on one query, but 
the next query only provides a name, you have a good 
chance that a juvenile has been located.  If the 
crime is rape and a relationship of victim to assailant 
is familial, you have incest and by law, this cannot 
be disseminated.  In some applications, security is 
applied through a separate module, a dissemination module, 
where the rules for filtering vary by such things as 
public requests or investigator requests (your transfer 
module).   

Role-based models must be consistent with the application (eg, 
public safety rules and nuclear security rules only 
have general security models in common).   So the 
model you describe must account for both the securing 
techniques and the content model to which they are 
applied.  Another issue is the medium by which information 
disseminated.  It is easier to secure a report than 
a QBE interface presentation.  

The problem with standard transforms are 
just how standard they can be and the effect on 
the presentation.   This is Walter's pipeline.

Guarantors are harder.  Klingons are notorious for 
their ancient promotion practices.  There is an accepted  
incentive to take out the head klingon, so the usual 
background checking doesn't apply to a culture of 
assasination.  Security includes a notion of vetting 
both the application and the organization.  Because 
of this, vetted organizations can exchange DNA 
records; a non-vetted one can not.  BTW, this is 
probably part of the CARNIVORE dilemma.  It is cheaper 
to put a black box in the loop than to vet all of 
the ISP employees.  The question is who do you 
trust more, the FBI or the ISP?   It has been discovered 
that gangs often try to infiltrate police department 
records organizations by getting girlfriends into 
records management positions.  There are deeper 
problems where internal investigations have to 
be shielded (who polices the police).  Anyone think 
it is easier to get hired at the ISP or the FBI?

Security and system auditing are related.  Every 
system we field has timestamped, user, workstation 
access models to determine if a record is changed 
or inspected, by whom, where and when.  There is 
more but that gives an inkling how deep it goes.

All of the above must be considered when creating a 
secure application.


Len Bullard
Intergraph Public Safety
clbullar@ingr.com
http://fly.hiwaay.net/~cbullard/lensongs.ram

Ekam sat.h, Vipraah bahudhaa vadanti.
Daamyata. Datta. Dayadhvam.h


-----Original Message-----
From: KenNorth [mailto:KenNorth@email.msn.com]

Now let's say Federation East has to transfer the patient to Klingon West
Hospital. How do we preserve authorities or privileges to access data if
Klingon West manages database security by user instead of role, or stores
records using a primitive file system.












 

News | XML in Industry | Calendar | XML Registry
Marketplace | Resources | MyXML.org | Sponsors | Privacy Statement

Copyright 2001 XML.org. This site is hosted by OASIS