[XML-DEV Mailing List Archive Home] [By Thread] [By Date] [Recent Entries] [Reply To This Message]

RE: Healthcare and Security/Privacy

  • From: "Bullard, Claude L (Len)" <clbullar@i...>
  • To: KenNorth <KenNorth@e...>, xml-dev@l...
  • Date: Tue, 25 Jul 2000 08:33:52 -0500

police vetting in healthcare
Transferring metadata is one means but you have no 
guarantor it will be applied.  That is unacceptable.  
See below on vetting of organization.  Simply, you 
will not transfer such information in the clear or 
to a non-trusted host unless locally authorized 
(sender is responsible and authoritative).

You have the additional value of the workstation itself 
to associate with the login.  This is another security 
technique where the room the device is in is part of 
the securing method.  In all cases, a separate information 
set is being used to apply security.  These may work in 
combination or singly.   It is not necessary to create 
an orthogonal set of security attributes and use them 
on a per field basis thus replicating that information 
in every part of the database although that is one 
technique.  It depends on where you want to put the 
security overhead.  Yes, you can create a security 
model of authorities and yes that can be transferred 
if applied to record types.  Do you want the secured 
data to be filtered out by the query or the query 
to be filtered?   

There are also the levels of 
security in terms of what is revealed by a negation.  
IOW, if you allow a name plus age on one query, but 
the next query only provides a name, you have a good 
chance that a juvenile has been located.  If the 
crime is rape and a relationship of victim to assailant 
is familial, you have incest and by law, this cannot 
be disseminated.  In some applications, security is 
applied through a separate module, a dissemination module, 
where the rules for filtering vary by such things as 
public requests or investigator requests (your transfer 
module).   

Role-based models must be consistent with the application (eg, 
public safety rules and nuclear security rules only 
have general security models in common).   So the 
model you describe must account for both the securing 
techniques and the content model to which they are 
applied.  Another issue is the medium by which information 
disseminated.  It is easier to secure a report than 
a QBE interface presentation.  

The problem with standard transforms are 
just how standard they can be and the effect on 
the presentation.   This is Walter's pipeline.

Guarantors are harder.  Klingons are notorious for 
their ancient promotion practices.  There is an accepted  
incentive to take out the head klingon, so the usual 
background checking doesn't apply to a culture of 
assasination.  Security includes a notion of vetting 
both the application and the organization.  Because 
of this, vetted organizations can exchange DNA 
records; a non-vetted one can not.  BTW, this is 
probably part of the CARNIVORE dilemma.  It is cheaper 
to put a black box in the loop than to vet all of 
the ISP employees.  The question is who do you 
trust more, the FBI or the ISP?   It has been discovered 
that gangs often try to infiltrate police department 
records organizations by getting girlfriends into 
records management positions.  There are deeper 
problems where internal investigations have to 
be shielded (who polices the police).  Anyone think 
it is easier to get hired at the ISP or the FBI?

Security and system auditing are related.  Every 
system we field has timestamped, user, workstation 
access models to determine if a record is changed 
or inspected, by whom, where and when.  There is 
more but that gives an inkling how deep it goes.

All of the above must be considered when creating a 
secure application.


Len Bullard
Intergraph Public Safety
clbullar@i...
http://fly.hiwaay.net/~cbullard/lensongs.ram

Ekam sat.h, Vipraah bahudhaa vadanti.
Daamyata. Datta. Dayadhvam.h


-----Original Message-----
From: KenNorth [mailto:KenNorth@e...]

Now let's say Federation East has to transfer the patient to Klingon West
Hospital. How do we preserve authorities or privileges to access data if
Klingon West manages database security by user instead of role, or stores
records using a primitive file system.









PURCHASE STYLUS STUDIO ONLINE TODAY!

Purchasing Stylus Studio from our online shop is Easy, Secure and Value Priced!

Buy Stylus Studio Now

Download The World's Best XML IDE!

Accelerate XML development with our award-winning XML IDE - Download a free trial today!

Don't miss another message! Subscribe to this list today.
Email
First Name
Last Name
Company
Subscribe in XML format
RSS 2.0
Atom 0.3
 

Stylus Studio has published XML-DEV in RSS and ATOM formats, enabling users to easily subcribe to the list from their preferred news reader application.


Stylus Studio Sponsored Links are added links designed to provide related and additional information to the visitors of this website. they were not included by the author in the initial post. To view the content without the Sponsor Links please click here.

Site Map | Privacy Policy | Terms of Use | Trademarks
Free Stylus Studio XML Training:
W3C Member
Stylus Studio® and DataDirect XQuery ™are products from DataDirect Technologies, is a registered trademark of Progress Software Corporation, in the U.S. and other countries. © 2004-2013 All Rights Reserved.