Role-based authorization in decentralized health care environments

The formation of a distributed system is based on a collection of distributed components and it requires the ability for components to exchange syntactically well-formed messages. To simplify network programming for such interactions and to realize security services for those components, we need a component-based software architecture that enables software components to communicate directly over a network in a reliable and efficient manner. One of those models is Distributed Component Object Model (DCOM) which is used for interacting with distributed components within the local intranet. In this paper, we overview an aspect of DCOM concerning software architecture and access control. And we describe the concept of role-based access control (RBAC) which began with multi-user and multi-application on-line systems pioneered in the 1970s. Also we investigate how we can enforce the role-based access control as a security provider within the critical environment such as health care industry accessing distributed components legitimately. We demonstrate the feasibility of our approach through a proof-of-concept prototype implementation.

[1]  Ravi S. Sandhu,et al.  Rationale for the RBAC96 family of access control models , 1996, RBAC '95.

[2]  Li Gong,et al.  Secure software architectures , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[3]  Paul Ammann,et al.  Data Diversity: An Approach to Software Fault Tolerance , 1988, IEEE Trans. Computers.

[4]  E. B. Steen,et al.  The Computer-Based Patient Record: An Essential Technology for Health Care , 1992, Annals of Internal Medicine.

[5]  Elisa Bertino,et al.  A unified framework for enforcing multiple access control policies , 1997, SIGMOD '97.

[6]  Pierangela Samarati,et al.  Authentication, Access Controls, and Intrusion Detection , 1997, The Computer Science and Engineering Handbook.

[7]  Emil C. Lupu,et al.  Role-based security for distributed object systems , 1996, Proceedings of WET ICE '96. IEEE 5th Workshop on Enabling Technologies; Infrastucture for Collaborative Enterprises.

[8]  Ravi S. Sandhu,et al.  Lattice-based access control models , 1993, Computer.

[9]  Richard Grimes,et al.  Professional Dcom Programming , 1997 .

[10]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[11]  Dale Rogerson,et al.  Inside COM , 1997 .

[12]  Brian Randell System structure for software fault tolerance , 1975 .

[13]  Gail-Joon Ahn Role-based access control in DCOM , 2000, J. Syst. Archit..

[14]  Charles Adams,et al.  Understanding Public-Key Infra-structure: Concepts, Standards, and Deployment Con-siderations , 1999 .