ISO FDIS 22600-3 Health informatics - Privilege management and access control - Part 3: Implementations
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- DIN EN ISO 22600-1 Health informatics - Privilege management and access control - Part 1: Overview and policy management (ISO 22600-1:2014)
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- DIN EN ISO 22600-1 Health informatics - Privilege management and access control - Part 1: Overview and policy management (ISO 22600-1:2014)
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- 35
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- DIN EN ISO 22600-1 Health informatics - Privilege management and access control - Part 1: Overview and policy management (ISO 22600-1:2014)
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- DIN EN ISO 22600-1 Health informatics - Privilege management and access control - Part 1: Overview and policy management (ISO 22600-1:2014)
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- 35.240
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- DIN EN ISO 22600-1 Health informatics - Privilege management and access control - Part 1: Overview and policy management (ISO 22600-1:2014)
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- DIN EN ISO 22600-1 Health informatics - Privilege management and access control - Part 1: Overview and policy management (ISO 22600-1:2014)
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- DIN EN ISO 22600-1 Health informatics - Privilege management and access control - Part 1: Overview and policy management (ISO 22600-1:2014)
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- DIN EN ISO 22600-1 Health informatics - Privilege management and access control - Part 1: Overview and policy management (ISO 22600-1:2014)
- DIN EN ISO 22600-1 Health informatics - Privilege management and access control - Part 1: Overview and policy management (ISO 22600-1:2014)
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- Картотека зарубежных и международных стандартов
International Organization for Standardization
Health informatics - Privilege management and access control - Part 3: Implementations
N FDIS 22600-3
Annotation
This multi-part International Standard defines principles and specifies services needed for managing privileges and access control to data and/or functions.
It focuses on communication and use of health information distributed across policy domain boundaries. This includes healthcare information sharing across unaffiliated providers of healthcare, healthcare organizations, health insurance companies, their patients, staff members, and trading partners by both individuals and application systems ranging from a local situation to a regional or even national situation.
It specifies the necessary component-based concepts and is intended to support their technical implementation. It will not specify the use of these concepts in particular clinical process pathways.
This part of ISO 22600 instantiates requirements for repositories for access control policies and requirements for privilege management infrastructures. It provides implementation examples of the formal models specified in ISO 22600-2.
This part of ISO 22600 excludes platform-specific and implementation details. It does not specify technical communication security services, authentication techniques, and protocols that have been established in other International Standards such as e.g. ISO 7498-2, ISO/IEC 10745 (ITU-T X.803), ISO/IEC/TR 13594 (ITU-T X.802), ISO/IEC 10181-1 (ITU-T X.810), ISO/IEC 9594-8 (ITU-T X.509), ISO/IEC 9796 (all parts), ISO/IEC 9797 (all parts), and ISO/IEC 9798 (all parts).
Автоматический перевод:



