Hi Beale, Thanks for these useful comments.
That openEHR is flexible enough to allow versions of the EHR that can each allow a different access control approach/mechanism is quite interesting. Regards --- Kuda On Thu, 2008-04-03 at 09:02 +0100, Thomas Beale wrote: > Kudakwashe Dube wrote: > > > > > > It would be interesting to see role-based security approaches and > > methods within the context of existing EHR standards (e.g., opnEHR) and > > their implementations. > > > > > this is happenin in openEHR. You will note that the current version of > openEHR has an EHR_ACCESS class in it (see > http://www.openehr.org/uml/release-1.0.1/Browsable/_9_0_76d0249_1109004889781_854011_47Report.html) > > whose settings are defined by another class ACCESS_CONTROL_SETTINGS (see > http://www.openehr.org/uml/release-1.0.1/Browsable/_9_5_1_76d0249_1155650882301_836618_5314Report.html). > > In a future release, this latter class will be specialised into classes > representing the CEN EN13606-4 security model, the ISO PMAC model and > other access control models that the EHR community wants to use. Because > of the use of versioning in openEHR, a given EHR can start using one > kind of Access control, and switch to a different model later on. > > The actual implementation of this in a real system of course requires > some security trickery, i.e. to prevent software or users bypassing the > access control settings. It will require at least partial encryption of > the data, based on keys that are provided to certain individuals or > groups according to the access control list. > >> 1. Access control policies must be written at each location in > >> language that an ordinary person can understand - hence the > >> five relative roles. This probably needs to be done in terms > >> of a known standard EHR architecture or it is just words. > >> > > > > To what extent can the RBAC work in SELinux help to inform standard EHR > > implementations? Would these be totally different and is this link way > > off the mark - SELinux being an OS-level implementation of RBAC > > policies? > > > well the roles won't match, and in a distributed environment, it could > easily be the case that some users who access patient X's record at > location B are not known as users at all at location A, where a copy of > patient X's record exists as well. > > > >> 1. That the EHR is divided into three core folders (openEHR > >> speak) > >> 1. a public folder that can be accessed without further > >> patient provided authority (severe allergies or > >> whatever else the person wants) > >> 2. the normal confidential record that requires specific > >> access permission (default location) > >> 3. a highly confidential area where patients can put > >> compositions that require a further authorisation > >> process. > >> > >> > > > > This would probably be a "EHR zone vs Security level" scheme used in > > combination or within the context of the RBAC security scheme. This > > would also probably imply definition of system default "zone/level" > > access rights. I am wondering whether or why RBAC alone is not enough, > > especially, where there is enough flexibility at each level of > > granularity of the EHR. Also to what extent would be the "zoning" of the > > EHR be that clear-cut in terms of privacy and confidentiality? Is this > > not too rigid a structure for the EHR? I was also wondering whether > > flexibility and finer granularity could be achieved by having such a > > security zone/level scheme in each folder/sub-folder such that for each > > folder there are these three levels or altermatively the levels could be > > mutually exclusive tags for each item of the EHR. > > > many people have thought of schemes like this. The problem is not that > they won't work, it's just that they won't work for patients or > physicians. If EHR security is not a) comprehensible to both patients > and carers and b) designed so that it is efficiently settable (i.e. > without wasting much time during consultations) then it just won't be used. > > > > > >> The mechanism for getting to level 1, 2 or 3 access > >> will depend on the service environment, and whether > >> the person carries their own record or it is on a web > >> site somewhere. > >> > > > > Question: Do security and privacy concerns differ with service > > environment and/or physical location of the EHR? > > > not really; the model should allow a patient to regard all health carers > and users of her EHR as just belonging to the one 'health system'. If > local models of access control are going to be used, it won't work for a > distributed patient record. > > > > > This does shade some light on some of what I said above. Would it help > > if access permissions are granted in a durative manner and access rights > > are hierachical, prioritised, role-based and scoped such that there is a > > scheme for auto-granting of rights that ensures that a cardiologist with > > sufficient permissions always gets all the info he needs to create a > > full report? however, auto-granting of rights may imply need for > > decision support. > > > > > or Artificial INtelligence ;-) See what I said above. > > - thomas beale > > > > _______________________________________________ > openEHR-technical mailing list > openEHR-technical at openehr.org > http://lists.chime.ucl.ac.uk/mailman/listinfo/openehr-technical

