ASTM E1985 Standard Guide for User Authentication and Authorization
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- 35
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- CEN EN ISO 22600-2 Health informatics - Privilege management and access control - Part 2: Formal models
- ISO TS 21298 Health informatics — Functional and structural roles - First Edition
- ASTM E2595 Standard Guide for Privilege Management Infrastructure
- ASTM E1985 Standard Guide for User Authentication and Authorization
- DIN EN ISO 22600-3 Health informatics - Privilege management and access control - Part 3: Implementations (ISO 22600-3:2014)
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- Картотека зарубежных и международных стандартов
ASTM International
Standard Guide for User Authentication and Authorization
N E1985
Annotation
This guide covers mechanisms that may be used to authenticate healthcare information (both administrative and clinical) users to computer systems, as well as mechanisms to authorize particular actions by users. These actions may include access to healthcare information documents, as well as specific operations on those documents (for example, review by a physician).
This guide addresses both centralized and distributed environments, by defining the requirements that a single system shall meet and the kinds of information which shall be transmitted between systems to provide distributed authentication and authorization services.
This guide addresses the technical specifications for how to perform user authentication and authorization. The actual definition of who can access what is based on organizational policy.
Автоматический перевод:
Стандартное руководство для аутентификации пользователя и авторизации
Это руководство покрывает механизмы, которые могут использоваться для аутентификации медицинской информации (и административный и клинический) пользователи к компьютерным системам, а также механизмы для авторизации конкретных действий пользователями. Эти действия могут включать доступ к документам медицинской информации, а также определенные операции на тех документах (например, анализ врачом).



