Security, Functionality and Scale?

نویسنده

  • Ross J. Anderson
چکیده

Since 2002 the UK has been attempting to build a system of federated databases containing all the nation’s medical records. This project has encountered numerous problems and some feel that it is becoming the world’s largest ever software disaster. One aspect of the problem is security. This means different things to different stakeholders: the government and its contractors boast about their ability to keep out ‘hackers’, while medics and patients’ groups worry that making records available to large numbers of authorised insiders will lead to abuses that will fatally undermine privacy. A security policy that I developed for the BMA and that I discussed at DBSEC in 2002 was not used; instead the developers went for a combination of role-based access control plus a ‘legitimate relationship’. This has been found insufficient and ‘sealed envelopes’ are planned as well. Medical databases are the first application involving very sensitive personal data being kept in large-scale systems which their operators hope will develop rich functionality over time. This combination of a stringent security requirement, complex functionality and great scale poses the most serious problems yet known to the security architect. I will discuss the options and ask whether it is in fact the case that you can have any two of these attributes security, functionality and scale but not all three.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security and VO Management Capabilities in a Large-Scale Grid Operating System

This paper presents a number of security and VO management capabilities in a large-scale distributed Grid operating system. The capabilities formed the basis of the design and implementation of a number of security and VO management services in the system. The main aim of the paper is to provide some idea of the various functionality cases that need to be considered when designing similar large...

متن کامل

The Evaluation of Anxiety, Depression and Global Assessment of Functioning in Bipolar Patients at Manic and Mixed Episodes

Background and Aims: This research is carried out with the aim of comparing anxiety, depression and global assessment of functioning between two groups of bipolar patients at mixed and manic episodes. Methods: Using an analytical cross-sectional approach, a sample of 94 patients with mean age of 32 years old (Standard Deviation: 11.3), who had been categorically diagnosed with bipolar disorder ...

متن کامل

F Unctionality Vs . S Ecurity in Is

This paper reports a study that challenges the widely-held assumption that security and functionality are a tradeoff relationship. Based on a survey sample of more than 9000 French firms, the study finds that higher degrees of system functionality entail higher degrees of security. Rather than sharing a tradeoff relation in which more security investments entail an opportunity cost in terms of ...

متن کامل

ویژگی‌های روان‌سنجی مقیاس احساس امنیت تهران (TFSS)

This research is intended to consider the Psychometric characteristics of Feeling Security Scale (TFSS) in Tehran. 3103 Tehrani citizens filled in this form. The Scale validity was checked for its content Validity (referees contingency coefficient) and construct validity (Factor analysis). The results of referee’s contingency coefficient showed that all the obtained coefficients were above 92% ...

متن کامل

Towards a Model of the Costs of Security

We present a simple information security model to determine why, historically, the level of security has not increased despite numerous technical advances. In our model, the software design process involves trade-offs between security and functionality. Developers choose points in the design space corresponding to certain levels of security and functionality. If development resources, such as n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008