
 
subject to the current context. The access control 
mechanism presented in this paper meets the 
aforementioned requirements and is embedded into a 
Grid portal application, namely HDGPortal. In 
particular, the mechanism ensures authorized 
execution of BPEL tasks and invocation of relevant 
Grid database services in accordance with the 
current context. To this end, a number of xoRBAC 
instances are integrated at both the BPEL and the 
Grid database service level as policy decision points. 
Thus, a tight matching of permissions to actual 
usage and need is ensured through the specification 
of fine-grained context-dependent access control 
policies. 
Currently, the pieces of information influencing 
authorization decisions in xoRBAC are rather 
limited. This fact, suggests directions for future 
work. In particular, the enrichment of the context 
information model used by xoRBAC may enable the 
enforcement of even more effective access control 
policies in healthcare. Furthermore, certain 
disadvantages that appear in the mechanisms that are 
currently used for the collection of the context 
information may constitute an interesting topic for 
further research. 
REFERENCES 
Koufi, V., Vassilacopoulos, G., 2008. HDGPortal: A Grid 
Portal Application for Pervasive Access to Process-
Based Healthcare Systems, In PervasiveHealth’08, 
2nd International Conference in Pervasive Computing 
Technologies in Healthcare. 
Emmerich, W., Butchart, B., Chen, L., Wassermann, B., 
Price, S., 2006. Grid Service Orchestration Using the 
Business Process Execution Language (BPEL), 
Journal of Grid Computing (2006) 3: 283-304. 
Mendling, J, Strembeck, M, Stermsek, G, Neumann, G., 
2004. An Approach to Extract RBAC Models for 
BPEL4WS Processes, Proceedings of the 13th IEEE 
International Workshops on Enabling Technologies: 
Infrastructure for Collaborative Enterprises. 
Thomas, J., Paci, F., Bertino, E., Eugster, P., 2007. User 
Tasks and Access Control over Web Services, 
Proceedings of the 15th IEEE International 
Conference on Web Services, 2007. 
Bertino, E., Crampton, J., Paci, F., 2006. Access Control 
and Authorization Constraints for WS-BPEL, 
Proceedings of the IEEE International Conference on 
Web Services, 2006. 
Open Grid Services Architecture - Data Access and 
Integration (OGSA-DAI), http://www.ogsadai.org.uk/. 
Adamski, M., Kulczewski, M., Kurowski, K., Nabrzyski, 
J., Hume, A., 2007. Security and Performance 
Enhancements to OGSA-DAI for Grid Data 
Virtualization, Concurrency and Computation.: 
Practice and Experience, 2007. 
Dou, W., Cheung, SC., Chen, G., Cai, S., 2005. 
Certificate-Driven Grid Workflow Paradigm Based on 
Service Computing, Lecture Notes in Computer 
Science (2005) 3795: 155-160. 
Power, D., Slaymaker, M., Politou, E., Simpson, A., 2005. 
A Secure Wrapper for OGSA-DAI, Lecture Notes in 
Computer Science (2005) 3470: 485-494. 
IBM Corporation. IBM Websphere Workflow – Getting 
Started with Buildtime V. 3.6, 2005. 
Java Authentication and Authorization Service, 
 http://java.sun.com/javase/6/docs/technotes/guides/sec
urity/jaas/JAASRefGuide.html. 
National Institute of Standards and Technology (NIST) 
RBAC, http://csrc.nist.gov/groups/SNS/rbac/ 
Neumann, G., Strembeck, M., 2001. Design and 
Implementation of a Flexible RBAC-Service in n 
Object-Oriented Scripting Language. Proceedings of 
CCS’01, November 5-8, 2001, Philadelphia, 
Pennsylvania, USA. 
Neumann, G., Strembeck, M., 2003. An Approach to 
Engineer and Enforce Context Constraints in an 
RBAC Environment, Proceedings of SACMAT’03, 
June 2-3, 2003, Como, Italy. 
The Globus Toolkit, http://www.globus.org/ 
xoRBAC, http://wi.wu-
wien.ac.at/home/mark/xoRBAC/index.html 
Neumann, G., Strembeck, M., 2003. An Approach to 
Engineer and Enforce Context Constraints in an 
RBAC Environment, ACM Transactions on 
Information and System Security, Vol. 7, No. 3, 
August 2004, pp 392-427. 
MyProxy Credential Management Service, 
http://grid.ncsa.uiuc.edu/myproxy/ 
Paci, F., Bertino, E., Crampton, J., 2008. An Access-
Control Framework for WS-BPEL, International 
Journal of Web Services Research, Vol. 5, Issue 3, pp. 
20-43. 
Fischer, K.P., Bleimann, U., Fuhrmann, W., Furnell, S.M., 
2007, "Security policy enforcement in BPEL-defined 
collaborative business processes", Proceedings of the 
1st International Workshop on Security Technologies 
for Next Generation Collaborative Business 
Applications (SECOBAP'07). 
Guth, S., Neumann, G., Strembeck, M., 2003. 
“Experiences with the Enforcement of Access Rights 
Extracted from ODRL-based Digital Contracts”. In 
DRM’03, 3
rd
 ACM Workshop on Digital Rights 
Management. 
AN APPROACH TO ENFORCE CONTEXT-AWARE ACCESS CONTROL TO PROCESS-BASED HEALTHCARE
SYSTEMS BUILD ON A GRID INFRASTRUCTURE
29