ASTM E2595-2007 Standard Guide for Privilege Management Infrastructure《权限管理基础组织的标准指南》.pdf
《ASTM E2595-2007 Standard Guide for Privilege Management Infrastructure《权限管理基础组织的标准指南》.pdf》由会员分享,可在线阅读,更多相关《ASTM E2595-2007 Standard Guide for Privilege Management Infrastructure《权限管理基础组织的标准指南》.pdf(30页珍藏版)》请在麦多课文档分享上搜索。
1、Designation: E 2595 07Standard Guide forPrivilege Management Infrastructure1This standard is issued under the fixed designation E 2595; the number immediately following the designation indicates the year oforiginal adoption or, in the case of revision, the year of last revision. A number in parenthe
2、ses indicates the year of last reapproval. Asuperscript epsilon (e) indicates an editorial change since the last revision or reapproval.INTRODUCTIONThis guide arises from the ongoing development and implementation of privilege managementinfrastructures (PMIs) within the healthcare environment. The h
3、ealthcare environment supported bythis guide is enterprise-wide and extends beyond traditional borders to include external providers,suppliers, and other healthcare partners. This guide supports privilege management within distributedcomputing as well as service-oriented architecture environments. T
4、his guide supports a distributedsecurity environment in which security is also a distributed service.The healthcare sector is continually improving the delivery of care by leveraging technical advancesin computer-based applications. Health professionals are increasingly accessing multiple applicatio
5、nsto schedule, diagnose, and administer patient care. These disparate applications are typicallyconnected to a common network infrastructure that typically supports patient, business, andnonbusiness services, communications, and protocols. Because increased access is made possiblethrough a common ne
6、twork infrastructure, secure access to these distributed, and often looselycoupled applications, is even more important than when these applications were accessed asstand-alone devices.Secure access to legacy computer-based healthcare applications typically involves authentication ofthe user to the
7、application using single-factor identification, such as a password, or multifactoridentification, such as a password combined with a token or biometric devices. After authentication,the application determines the authority that user may have to use aspects of the application.Determining the level of
8、 authority a user has is typically done, if at all, by each application. Theapplication may restrict operations (such as read, write, modify, or delete) to an application-specificgroup or role affiliation. Authenticated users are frequently associated with groups or roles using alocal database or fl
9、at file under the control of an application administrator.The use of a local mechanism for authorization creates a patchwork of approaches difficult toadminister centrally across the breadth of a healthcare enterprise. That is, the software logicdetermining authorization is distinctive to each appli
10、cation. In some cases, applications can be adaptedto use a network database that contains a trusted source of name-value pairs. This information allowsapplications to determine the users group or role affiliation. This approach permits centralized controlover a shared user base. However, the resulti
11、ng granularity of control over user authorization is coarseand shall be interpreted by each application specialist. Granularity of user authority can only beimproved by increasing the number of application-specific groups or roles in the shared database.Storing information specific to each applicati
12、on causes exponential growth of roles per user and resultsin provisioning difficulties. The better solution is to associate industry standard permissions to users.Each application can examine the permissions listed for a user and determine their level ofauthorization regardless of their group affili
13、ation within the healthcare organization.The resulting system is a PMI. By the nature of the problem, the privileges shall be defined in anindustry standard way. This guide will discuss various aspects of identifying a PMI standard tovendors providing healthcare applications to the contemporary heal
14、thcare enterprise.1Copyright ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959, United States.1. Scope1.1 This guide defines interoperable mechanisms to manageprivileges in a distributed environment. This guide is orientedtowards support of a distributed or ser
15、vice-oriented architec-ture (SOA) in which security services are themselves distrib-uted and applications are consumers of distributed services.1.2 This guide incorporates privilege management mecha-nisms alluded to in a number of existing standards (forexample, Guide E 1986 and Specification E 2084
16、). The privi-lege mechanisms in this guide support policy-based accesscontrol (including role-, entity-, and contextual-based accesscontrol) including the application of policy constraints, patient-requested restrictions, and delegation. Finally, this guide sup-ports hierarchical, enterprise-wide pr
17、ivilege management.1.3 The mechanisms defined in this guide may be used tosupport a privilege management infrastructure (PMI) usingexisting public key infrastructure (PKI) technology.1.4 This guide does not specifically support mechanismsbased on secret-key cryptography. Mechanisms involvingprivileg
18、e credentials are specified in ISO 9594-8:2000 (at-tribute certificates) and Organization for the Advancement ofStructured Information Standards (OASIS) Security AssertionMarkup Language (SAML) (attribute assertions); however, thisguide does not mandate or assume the use of such standards.1.5 Many c
19、urrent systems require only local privilege man-agement functionality (on a single computer system). Suchsystems frequently use proprietary mechanisms. This guidedoes not address this type of functionality; rather, it addressesan environment in which privileges and capabilities (authori-zations) sha
20、ll be managed between computer systems acrossthe enterprise and with business partners.1.6 This standard does not purport to address all of thesafety concerns, if any, associated with its use. It is theresponsibility of the user of this standard to establish appro-priate safety and health practices
21、and determine the applica-bility of regulatory limitations prior to use.2. Referenced Documents2.1 ASTM Standards:2E 1762 Guide for Electronic Authentication of Health CareInformationE 1985 Guide for User Authentication and AuthorizationE 1986 Guide for Information Access Privileges to HealthInforma
22、tionE 2084 Specification for Authentication of Healthcare In-formation Using Digital SignaturesE 2212 Practice for Healthcare Certificate Policy2.2 ANSI Standards:3X9.45 Enhanced Management Controls Using Digital Sig-natures and Attribute CertificatesINCITS 359 Role-Based Access Control2.3 HL7 Stand
23、ard:4Health Level 7 Context Management “CCOW” (ClinicalContext Object Workgroup) Standard, Version 1.52.4 IETF Standards:5RFC 3198 Terminology for Policy-Based ManagementRFC 3280 Internet X.509 Public Key Infrastructure Certifi-cate and Certificate Revocation List (CRL) ProfileRFC 3881 Security Audi
24、t and Access Accountability Mes-sage XML Data Definitions for Healthcare Applications2.5 ISO Standards:6ISO 9594-8 The Directory: Public-Key and Attribute Cer-tificate Frameworks; also available as ITU-T X.509: 2000ISO 10181-3-00 Security Frameworks for Open Systems:Access Control Framework; also av
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ASTME25952007STANDARDGUIDEFORPRIVILEGEMANAGEMENTINFRASTRUCTURE 权限 管理 基础 组织 标准 指南 PDF

链接地址:http://www.mydoc123.com/p-531508.html