skip to main content
10.1145/775412.775428acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article

The tees confidentiality model: an authorisation model for identities and roles

Published:02 June 2003Publication History

ABSTRACT

We present a model of authorisation that is more powerful than Role Based Access Control (RBAC), and is suitable for complex web applications in addition to computer systems administration. It achieves its functionality by combining Identity Based Access Control (IBAC) and RBAC in novel ways. A particular feature of the model is a rigorous definition of override, for granting access to data and resources in exceptional circumstances. Despite its power, the model can be implemented by a single algorithm, as an extension to RBAC. The basis of the model is a new concept of permission, which we call Confidentiality Permission. There are five types of confidentiality permission, for granting access rights for identities and roles; also negative confidentiality permissions, for denying access to data and resources, exist. A single concept of Collection is used for structuring roles, identities, resource and resource type, although the RBAC general and limited role hierarchies can be used if desired. Confidentiality permissions may be defined to inherit within collections, thereby providing a mechanism for confidentiality permission assignment; however confidentiality permissions may be assigned in other ways that do not depend on collections. We use a demanding scenario from Electronic Health Records to illustrate the power of the model. We have produced several demonstrators, one of which utilises the model to control data retrieval from commercial GP and Social Services systems.

References

  1. J J Longstaff, MG Thick, G Capper, MA Lockyer, Eliciting and recording eHR/ePR Patient Consent in the context of the Tees Confidentiality Model, HC2002 Conference, Harrogate, England, March 2002.Google ScholarGoogle Scholar
  2. D F Ferraiolo, R Sandhu, S Gavrila, D R Kuhn, R Chandramouli, Proposed NIST Standard for Role-Based Acess Control, ACM Transactions on Information System Security, Vol 4, No 3, August 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. www.nhsia.nhs.uk/confidentiality/pages/consultation/Google ScholarGoogle Scholar
  4. J J Longstaff, MG Thick, G Capper, MA Lockyer, A Model of Accountability, Confidentiality and Override for Healthcare and other Applications, Fifth ACM Workshop in Role-Based Access Control, Berlin, July 2000, ACM ISBN 1-58113-259-X Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J J Longstaff, MG Thick, G Capper, MA Lockyer, eHR and EPR Confidentiality based on Accountability and Consent:Tools for the Caldicott Guardian, Health Informatics Journal, Vol 6 / No 1 March 2000, ISSN 1460-4582Google ScholarGoogle Scholar
  6. M G Thick, J J Longstaff, G Capper, M A Lockyer, An Authorisation Model Based on Accountability and Consent, Proceedings of TEPR 2001 Conference, Boston, USA, May 2001, Medical Records InstituteGoogle ScholarGoogle Scholar
  7. S Oh, R Sandhu, A Model for Role Administration Using Organization Structure, SACMAT 2002, June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M M Swift et al, Improving the Granularity of Access Control for Windows 2000, ACM TISSEC, vol 5 no 4, November 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Health Record Infrastructure, version 1.3, NHS Information Authority, 15 October 2002Google ScholarGoogle Scholar
  10. www.nhsia.nhs.uk/erdip . (Search on 'Tees', "Confidentiality and Consent", etc).Google ScholarGoogle Scholar
  11. J S Park and R Sandhu G Ahn, Role-Based Access Control on the Web, ACM Transactions on Information and System Security, Vol. 4, No. 1, February 2001, Pages 37--71. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The tees confidentiality model: an authorisation model for identities and roles

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies
          June 2003
          246 pages
          ISBN:1581136811
          DOI:10.1145/775412

          Copyright © 2003 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 2 June 2003

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          SACMAT '03 Paper Acceptance Rate23of63submissions,37%Overall Acceptance Rate177of597submissions,30%

          Upcoming Conference

          SACMAT 2024

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader