In this paper, an approach is presented to modelling the security policy of a health care department by means of a deductive database tool. The goal of a security policy is to provide a reliable mechanism for information sharing, at the same time ensuring its confidentiality, integrity and availability. Once a policy has been defined, it is essential to be able to verify that it really meets the security requirements and prevents any undesired situations. The aim here is to build a tool to help the security administrator of a health care organisation to handle (define, verify, modify) its security policy. After investigating a number of available security policy models, a role-based approach has been considered and specified in a logical form handled by a logic database management system. Thus, the role-based model specification becomes executable and various properties of the policy can be verified together with its adequacy with respect to the expected behaviour. The approach has been inspired by the security policy for the Radiological Department of the "Lotti" Hospital in Pontedera, Pisa.

Role-based security policies management: a health care example

Asirelli P;Coco A;Fabbrini F
2001

Abstract

In this paper, an approach is presented to modelling the security policy of a health care department by means of a deductive database tool. The goal of a security policy is to provide a reliable mechanism for information sharing, at the same time ensuring its confidentiality, integrity and availability. Once a policy has been defined, it is essential to be able to verify that it really meets the security requirements and prevents any undesired situations. The aim here is to build a tool to help the security administrator of a health care organisation to handle (define, verify, modify) its security policy. After investigating a number of available security policy models, a role-based approach has been considered and specified in a logical form handled by a logic database management system. Thus, the role-based model specification becomes executable and various properties of the policy can be verified together with its adequacy with respect to the expected behaviour. The approach has been inspired by the security policy for the Radiological Department of the "Lotti" Hospital in Pontedera, Pisa.
2001
Istituto di Scienza e Tecnologie dell'Informazione "Alessandro Faedo" - ISTI
Information flow controls
Logic programming
Security and protection: access controls
Security kerne
General: security
integrity and protection
Deduction and theorem proving: deduction
Life and medical sciences: health
Public policy issues: privacy
Security and protection: physical security
File in questo prodotto:
File Dimensione Formato  
prod_160513-doc_141445.pdf

accesso aperto

Descrizione: Role-based security policies management: a health care example
Dimensione 419.32 kB
Formato Adobe PDF
419.32 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/148869
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact