Hi Tim,

Might want to add:

Computer Security Basics
http://www.oreilly.de/catalog/csb/toc.html

IEEE; Compartmented Mode Workstation: Prototype Highlights
http://csdl.computer.org/comp/trans/ts/1990/06/e0608abs.htm

CMU; Trusted Operating Systems
http://www.sei.cmu.edu/str/descriptions/trusted_body.html

Operating System Security
http://www.cs.ucd.ie/staff/tahar/home/courses/4thyear/chapter4/ppframe.htm

 From Security protocols to System Security
http://www.hpl.hp.com/techreports/2003/HPL-2003-147.html

Trusted Computing Platforms
http://www.hpl.hp.com/techreports/2002/HPL-2002-221.html

ASPECT - a tool for checking protocol security
http://www.hpl.hp.com/techreports/2002/HPL-2002-246.html

Resilient Infrastructure for Network Security
http://www.hpl.hp.com/techreports/2002/HPL-2002-273.html

Security Infrastructure for A Web Service Based Resource Management  System
http://www.hpl.hp.com/techreports/2002/HPL-2002-297.html

Trusted Solaris Developers Guide
http://docs.sun.com/db/doc/805-8060?q=compartmented+mode+workstation

Trusted Network Environment
http://www.tinfosol.com/lab/lab.html

RFC 1825 - Security Architecture for the Internet Protocol
http://www.faqs.org/rfcs/rfc1825.html

RFC 1827 - IP Encapsulating Security Payload (ESP)
http://www.faqs.org/rfcs/rfc1827.html

Secure Trusted Operating System (STOS) Consortium
http://www.stosdarwin.org/

The Blue Book
http://secinf.net/info/rainbow/tg29.txt

UK Security Citations Bibliography
http://chacs.nrl.navy.mil/xtp1/uksecbib.html

Regards!

-Thomas Clark


Tim Churches wrote:

>On Tue, 2004-03-09 at 23:20, Thompson, Ken wrote:
>  
>
>>2) A mechanism on the patient record itself that displays a list of all
>>users that have accessed the record (with date and time). This will probably
>>be made available to the patient at some point, so they will actually
>>provide a critical part of the checks and balances in the system.
>>    
>>
>
>This is similar to the mechanisms envisaged under the "Consent and
>notification" secion of the now-famous BMA Security Policy, developed by
>Ross Anderson - see
>http://www.cl.cam.ac.uk/users/rja14/policy11/policy11.html
>
>This is still the gold standard for EHR security policies, IMHO, yet
>most people I have met who are involved in EHR work and who know of it
>(curiously many seem ignorant of it) tend to dismiss it, not because the
>policies are unsound (although they do need minor tweaking here and
>there), but because implementing them is very difficult in practice - 
>particularly the multilateral as opposed to multilevel access control
>policy. In fact you need both, but of the two, the former is more
>important. In other words, role-based access control, where the "roles"
>are specific to each patient, as well as to each health professional.
>
>
>  
>


-
If you have any questions about using this list,
please send a message to d.lloyd at openehr.org

Reply via email to