[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
minutes: submitters meeting on Monday 9/15
Attached are minutes (in RTF and plain text) taken by Tad Davis.
Konstantin
HRAC
HRAC Meeting Minutes – September 15, 1998 4:00PM -- 8:00PM
Konstantin Beznosov – facilitator,
This minutes are taken by Tad Davis and slightly edited by Konstantin Beznosov
Attendees:
Bret Hartman Concept Five
Carol Burt 2AB
Dave Forslund LANL
Tim Brinson Protocol
Dan Sterne TIS Labs & Network Assoc.
Dave Sanes TIS Labs & Network Assoc.
Andre Srinivasan Inprise
Bart de Greeg Philips Medical Systems
Tad Davis CareFlow|Net, Inc.
Kent Wreder BHSSF
Andreas Klingler Univ. of Erlanger
Konstantin Beznosov BHSSF
Introductions, Interest, & Patterns of Use
Carol Burt – Telecom system, has customers who are asking for this.
Dave Forslund – Secure PIDS implementation, telemedicine nation-wide needs security to employ.
Dave Stearn – TIS labs, working on access control for CORBA, OO CORBA type enforcement developed,
may partially satisfy HRAC.
Bart de Greef – Medical domain, open standards, commercial architecture. Advise customers to buy a
certain implementation.
Tim Brinson – Relationship to COAS.
Andre S (Inprise) – Tracking HRAC, may possibly move into healthcare. Intent is to resell or license an
implementation, healthcare domain and possibly broader.
Tad Davis – Secure components for healthcare is the company byline, two customers are on the HRAC
team and require access control. Currently have an implementation which uses filters and is limited to
ORBIX, must move to a standard access control mechanism.
Konstantin – Tried to model and map to healthcare, tried to incorporate with PIDS. Did not allow the fine
grain access control that was required. Will not be developed internally, push standard for general
architecture and to push the commercial, best-of-breed process to begin.
Bret Hartman (Concept Five) – Broader customers than healthcare, banking as well. Constantly get
requirements for finer grained access control than what CORBA provides.
Goals for the Week
1. Agreed upon IDL interfaces
2. Outline for submission
3. Writing assignments, and due dates for submission
4. Identify an editor
5. Initial submission should be significantly complete and not change drastically to the final submission
Carol volunteered as editor of the response submission text.
#1 identified as primary goal. #2 & #3 secondary goals.
Attempt to merge NSA’s, IBM’s, and 2AB’s proposals into one. Must meet requirements of COAS.
Carol suggested that IDLs be developed first and then run through use cases to verify and validate the
IDLs.
Time Allocations
2AB Proposals Tuesday 1 hour
IBM Proposals Thursday
NSA Proposals
Converge and Create Final IDL
Outline Proposals Tuesday 1 hour
Assign Work Tuesday 10 minutes
2AB Proposal
Not complete, requires changes.
Basic Types
New Issue: Typedef discussion – issue, does it result in proliferation of Java classes?
Anticipate that in the CORBAmed space the qualified names coming out of naming authority will be used.
Naming authority is not included.
New Issue: Does the resource have to be globally unique, implies a mechanism, i.e. naming authority.
Will support granted rights or denial of rights models. For one resource, exclusive or. Group agreed that
both are necessary.
Resources can contain other resources, concept of atomic resource.
The hierarchy can contain both types of resource mechanism at any level in the hierarchy.
While traversing the tree, as soon as a denial is struck, the traversal terminates.
ResourceType
Type of resource allows you to decide whether organization should be a tree (subclass) or a hash table
(atomic). Base implies that a person will be assigning rights. Atomic implies that an application will
assign rights. Requirement to classify resources into categories. Global uniqueness – nothing below root
node must be globally unique.
New Issue: What is the difference between a “root_node” and “atomic” node?
ResourceNameComponent
Created for ease of use with Naming Service.
New Issue: Issue where there is a resource, world is denied, group is granted, specific individual of group is
denied. Cannot be handled by current IDL.
RightsList
Not identical structure as in the security specification.
TimeIntervals
New Issue: Do we need to capture periodic rights? For example, after hours security may be more strict.
COAS defines notion of time spans.
Deny_times changes to applicable_times.
ResourceAccessPolicy
New Issue: Possible holes in negative states of access policies.
Credential attributes and dynamic attributes groups, dynamic attributes evaluated at run-time.
ResourceRepository
Create_resource_def and delete_resource_def changed to add_… and remove_…
remove_dynattribute_support added.
Traverse from resource to policy.
New Issue: Should we allow two methods, one remove node, one remove resource name subtree?
Can a node be in two different trees? Support for links? This can cause problems as a node can have to
different states in terms of access policies at the same time.
New Issue: Add text explaining that a real world resource can be defined and used multiple times, there is
no way to prevent this.
Resource key is an application defined name to be used by the HRAC to communicate with the application
in the future.
New Issue: Does POA allow an object key to be associated with something which is not an object?
Konstantin
New Issue: Should the dynamic attribute eval method support the notion of time, so that a relationship can
be “remembered” to exist in the past and not only at the present time?
Possibility raised to add a priority attribute to allow emergency access.
Submission Draft Outline
Preface
Supporting Organizations
Conventions
Terminology
Specific Terminology
Proof of Concept
Changes to Adopted
Response to RFP Requirements
Overview of Response
Introduction
Problems Addressed
Problems Not Addressed
Domain Reference Model
Determination of RFP Scope
Answer Possible Questions
Design Goals
Use Scenarios
Healthcare Use Scenarios
Object and Data Models
IDL Interface Descriptions
Conformance Classes
Appendix
IDL
Detailed Use Cases
New Issue – Title of submission, not actually access control, possibly access authorization.
Changes to 2AB Proposal
AccessDecision should not be locality constrained. To do so HRAC service vendor would need to provide
shared libraries, DLL, etc. Also, one ADO per organization may be sufficient. Requires changes to the
IDL, would definitely not want to pass credentials. Attributes are sufficient. Attributes should be list for
access_allowed, multiple_access_allowed.
DynamicAttributeEval also should have a sequence of attribute lists.
Garbage collection on resource keys.
Separate access and admin methods into two interfaces.