et the Clinical Information Systems Security have the following functions: create_record, delete_record, read_record, append_to_record, add_to_acl, and move_from_record_to_record. Given these, show that the Clinical Information System model's principles implement the Clark-Wilson enforcement and certification rules Important:How do we prove the system implements the Clark-Wilson model? Given the principles (access, creation, deletion, etc.) of the clinical system that has the same components (IVPs, TPs, etc.), we need to justify that each of the CRs and ERs is implemented.(show for all 5 CRs and 4 ERs) Principles of Clinical Information Systems Security Policy: Each medical record has an access control list naming the individuals or groups who may read and append information to the record. The system must restrict access to those identified on the access control list.   One of the clinicians on the access control list must have the right to add other clinicians to the access control list. The responsible clinician must notify the patient of the names on the access control list whenever the patient’s medical record is opened.   The name of the clinician, the date, and the time of the access of a medical record must be recorded. Similar information must be kept for deletions.     A clinician may open a record, with the clinician and the patient on the access control list. If a record is opened as a result of a referral, the referring clinician may also be on the access control list.   Clinical information cannot be deleted from a medical record until the appropriate time has passed.     Information from one medical record may be appended to a different medical record if and only if the access control list of the second record is a subset of the access control list of the first.   Measures for preventing aggregation of patient data must be effective. In particular, a patient must be notified if anyone is to be added to the access control list for the patient’s record and if that person has access to a large number of medical records.   Any computer system that handles medical records must have a subsystem that enforces the preceding principles. The effectiveness of this enforcement must be subject to evaluation by independent auditors.  Clark-Wilson enforcement and certification rules: Certification rule 1 (CR1): When any IVP is run, it must ensure that all CDIs are in a valid state. Certification rule 2 (CR2): For some associated set of CDIs, a TP must transform those CDIs in a valid state into a (possibly different) valid state. Enforcement rule 1 (ER1): The system must maintain the certified relations, and must ensure that only TPs certified to run on a CDI manipulate that CDI. Enforcement rule 2 (ER2): The system must associate a user with each TP and set of CDIs. The TP may access those CDIs on behalf of the associated user. If the user is not associated with a particular TP and CDI, then the TP cannot access that CDI on behalf of that user. Certification rule 3 (CR3): The allowed relations must meet the requirements imposed by the principle of separation of duty. Enforcement rule 3 (ER3): The system must authenticate each user attempting to execute a TP. Certification rule 4 (CR4): All TPs must append enough information to reconstruct the operation to an append-only CDI. Certification rule 5 (CR5): Any TP that takes as input a UDI may perform only valid transformations, or no transformations, for all possible values of the UDI. The transformation either rejects the UDI or transforms it into a CDI. Enforcement rule 4 (ER4): Only the certifier of a TP may change the list of entities associated with that TP. No certifier of a TP, or of an entity associated with that TP, may ever have execute permission with respect to that entity.

Fundamentals of Information Systems
9th Edition
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Ralph Stair, George Reynolds
Chapter3: Database Systems And Big Data
Section: Chapter Questions
Problem 4PSE
icon
Related questions
Question

Let the Clinical Information Systems Security have the following functions: create_recorddelete_recordread_recordappend_to_recordadd_to_acl, and move_from_record_to_record. Given these, show that the Clinical Information System model's principles implement the Clark-Wilson enforcement and certification rules

Important:How do we prove the system implements the Clark-Wilson model? Given the principles (access, creation, deletion, etc.) of the clinical system that has the same components (IVPs, TPs, etc.), we need to justify that each of the CRs and ERs is implemented.(show for all 5 CRs and 4 ERs)

Principles of Clinical Information Systems Security Policy:

  • Each medical record has an access control list naming the individuals or groups who may read and append information to the record. The system must restrict access to those identified on the access control list.

 

  • One of the clinicians on the access control list must have the right to add other clinicians to the access control list.
  • The responsible clinician must notify the patient of the names on the access control list whenever the patient’s medical record is opened.

 

  • The name of the clinician, the date, and the time of the access of a medical record must be recorded. Similar information must be kept for deletions.

 

 

  • A clinician may open a record, with the clinician and the patient on the access control list. If a record is opened as a result of a referral, the referring clinician may also be on the access control list.

 

  • Clinical information cannot be deleted from a medical record until the appropriate time has passed.

 

 

  • Information from one medical record may be appended to a different medical record if and only if the access control list of the second record is a subset of the access control list of the first.

 

  • Measures for preventing aggregation of patient data must be effective. In particular, a patient must be notified if anyone is to be added to the access control list for the patient’s record and if that person has access to a large number of medical records.

 

  • Any computer system that handles medical records must have a subsystem that enforces the preceding principles. The effectiveness of this enforcement must be subject to evaluation by independent auditors.

 Clark-Wilson enforcement and certification rules:

Certification rule 1 (CR1): When any IVP is run, it must ensure that all CDIs are in a valid state.

Certification rule 2 (CR2): For some associated set of CDIs, a TP must transform those CDIs in a valid state into a (possibly different) valid state.

Enforcement rule 1 (ER1): The system must maintain the certified relations, and must ensure that only TPs certified to run on a CDI manipulate that CDI.

Enforcement rule 2 (ER2): The system must associate a user with each TP and set of CDIs. The TP may access those CDIs on behalf of the associated user. If the user is not associated with a particular TP and CDI, then the TP cannot access that CDI on behalf of that user.

Certification rule 3 (CR3): The allowed relations must meet the requirements imposed by the principle of separation of duty.

Enforcement rule 3 (ER3): The system must authenticate each user attempting to execute a TP.

Certification rule 4 (CR4): All TPs must append enough information to reconstruct the operation to an append-only CDI.

Certification rule 5 (CR5): Any TP that takes as input a UDI may perform only valid transformations, or no transformations, for all possible values of the UDI. The transformation either rejects the UDI or transforms it into a CDI.

Enforcement rule 4 (ER4): Only the certifier of a TP may change the list of entities associated with that TP. No certifier of a TP, or of an entity associated with that TP, may ever have execute permission with respect to that entity.

Expert Solution
Step 1 Introduction

Clinical information systems security which refers to the one it is the practice of protecting personal health information stored in clinical information systems. This involves using measures such as access control, encryption, audit trails, and other security measures to ensure that only authorized personnel have access to sensitive information. It also involves ensuring that data is accurate, complete, and up-to-date, as well as making sure that data is not modified or deleted without authorization. Finally, it involves regularly monitoring clinical information systems for potential security breaches and responding quickly if any are detected.

 
 
 
 
 
steps

Step by step

Solved in 4 steps

Blurred answer
Knowledge Booster
Introduction to symbols
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781337097536
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781285196145
Author:
Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos Coronel
Publisher:
Cengage Learning