{
"package" : "hl7.fhir.r4.examples@4.0.1",
"definition" : "An access control policy specific to the type of access control scheme, which is used to enforce one or more authorization policies. \\r\\n\\n \\n Usage Note: Access control schemes are the type of access control policy, which is comprised of access control policy rules concerning the provision of the access control service.\\r\\n\\n There are two categories of access control policies, rule-based and identity-based, which are identified in CCITT Rec. X.800 aka ISO 7498-2. Rule-based access control policies are intended to apply to all access requests by any initiator on any target in a security domain. Identity-based access control policies are based on rules specific to an individual initiator, a group of initiators, entities acting on behalf of initiators, or originators acting in a specific role. Context can modify rule-based or identity-based access control policies. Context rules may define the entire policy in effect. Real systems will usually employ a combination of these policy types; if a rule-based policy is used, then an identity-based policy is usually in effect also.\\r\\n\\n An access control scheme may be based on access control lists, capabilities, labels, and context or a combination of these. An access control scheme is a component of an access control mechanism or \\\"service\\\") along with the supporting mechanisms required by that scheme to provide access control decision information (ADI) supplied by the scheme to the access decision facility (ADF also known as a PDP). (Based on ISO/IEC 10181-3:1996)\\r\\n\\n \\n Examples: \\n \\r\\n\\n \\n Attribute Based Access Control (ABAC)\\n Discretionary Access Control (DAC)\\n History Based Access Control (HBAC)\\n Identity Based Access Control (IBAC)\\n Mandatory Access Control (MAC)\\n Organization Based Access Control (OrBAC)\\n Relationship Based Access Control (RelBac)\\n Responsibility Based Access Control (RespBAC)\\n Risk Adaptable Access Control (RAdAC)\\n >",
"system" : "http://terminology.hl7.org/CodeSystem/v3-ActCode",
"property" : [ {
"_uri" : "http://hl7.org/fhir/concept-properties#parent",
"code" : "parent",
"_implicit" : true,
"valueCode" : "AUTHPOL"
} ],
"codesystem" : "6064fe67-dfa9-5c7f-9737-99a0909e44de",
"concept_id" : "0eeb22bd-864c-5ea0-b5c4-30112d19f369",
"ancestors" : {
"AUTHPOL" : 1,
"SecurityPolicy" : 2,
"_ActPolicyType" : 3,
"ACCESSCONSCHEME" : 0
},
"id" : "d08ef622-5865-47bd-995f-ae24af9b4e83",
"code" : "ACCESSCONSCHEME",
"display" : "access control scheme",
"version" : "2018-08-12"
}