Category:Security: Difference between revisions

From IHE Wiki
Jump to navigation Jump to search
JohnMoehrke (talk | contribs)
No edit summary
JohnMoehrke (talk | contribs)
No edit summary
 
Line 1: Line 1:
Profiles that provide Security and/or Privacy capabilities. This includes CyberSecurity, CyberPrivacy, Digital-Signature, Audit-Logging, Access Control, Authorization, Authentication, etc. Protection against Risks to Confidentiality, Integrity, and Availability.
Profiles that provide Security and/or Privacy capabilities. This includes CyberSecurity, CyberPrivacy, Digital-Signature, Audit-Logging, Access Control, Authorization, Authentication, etc. Protection against Risks to Confidentiality, Integrity, and Availability.


Also whitepapers available that have Security and Privacy content available http://www.ihe.net/Technical_Frameworks/#IT
Also whitepapers available that have Security and Privacy content available https://profiles.ihe.net/ITI
*Cookbook: Preparing the IHE Profile Security Section
*Cookbook: Preparing the IHE Profile Security Section
*De-Identification
*De-Identification

Latest revision as of 11:16, 23 March 2022

Profiles that provide Security and/or Privacy capabilities. This includes CyberSecurity, CyberPrivacy, Digital-Signature, Audit-Logging, Access Control, Authorization, Authentication, etc. Protection against Risks to Confidentiality, Integrity, and Availability.

Also whitepapers available that have Security and Privacy content available https://profiles.ihe.net/ITI

  • Cookbook: Preparing the IHE Profile Security Section
  • De-Identification
    • Algorithm Mapping Spreadsheet (for use with De-Identification Handbook)
  • Template for XDS Affinity Domain Deployment Planning
  • Access Control - Published 2009-09-28
  • Analysis of Optimal De-Identification Algorithms for Family Planning Data Elements - Published 2016-12-02
  • Health Information Exchange: Enabling Document Sharing Using IHE Profiles - Published 2012-01-24