Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

IHE IT-Infrastructure White Paper - Access Control

: Caumanns, J.; Kuhlisch, R.; Pfaff, O.; Rode, O.

Fulltext urn:nbn:de:0011-n-1185887 (1.4 MByte PDF)
MD5 Fingerprint: e88d635af4b949420f5ee32bb6d75e3c
Created on: 23.2.2010

Dortmund: Fraunhofer ISST, 2009, 78 pp.
Report, Electronic Publication
Fraunhofer ISST ()

This document looks at the issues of how to define and implement access control in healthcare networks that might even span across communities. The focus is mainly on issues that relate to the IT architecture and the flow of messages that are required for a distributed access control scenario. Therefore this paper will deal with the problems of (1) how to apply established principles of secure design and SOA security on the design of access control systems and, (2) how to model an access control solution in a way that is well suited for reasoning and evaluation. It also begins the discussion of how to deploy an access control solution using well understood patterns and interoperable system components as seen in appendix C. Given the strong focus on models and methodologies for designi ng access control solutions for cross-enterprise data exchange in healthcare, the primary intended audience are system architects and developers who are involved in the planning, design, and realization of regional healthcare networks and comparable infrastructures where the secure exchange of patient related data among enterprises is an issue. The concepts presented in this paper are evolving rapidly and are subject to manifold national and international standardization efforts. The goal is to expose the common concepts from all of these activities, match them with experiences from existing healthcare networks, and define common design methodologies and technological building blocks which allow for a variety of strategies and policies to be used. The building blocks are described on a conceptual level and on an integration level based on current state-of-the-art in security token handling. It is assumed that the design of the overall healthcare data exchange infrastructure is aligned to the principles of a service-oriented architecture (SOA). It is furthermore assumed that a dedicated security architecture is set up which provides a circle of trust among the security and business services which are deployed among independent XDS Affinity Domains. Nevertheless even if the focus is on cross-enterprise health information exchange (HIE) all concepts provided by this white paper can be scaled down to the organization or even department level.