Category:Security: Difference between revisions
Jump to navigation
Jump to search
JohnMoehrke (talk | contribs) No edit summary |
JohnMoehrke (talk | contribs) No edit summary |
||
| Line 1: | Line 1: | ||
Profiles that provide Security and/or Privacy capabilities. This includes CyberSecurity, CyberPrivacy, Digital-Signature, Audit-Logging, Access Control, Authorization, Authentication, etc. Protection against Risks to Confidentiality, Integrity, and Availability. | Profiles that provide Security and/or Privacy capabilities. This includes CyberSecurity, CyberPrivacy, Digital-Signature, Audit-Logging, Access Control, Authorization, Authentication, etc. Protection against Risks to Confidentiality, Integrity, and Availability. | ||
Also whitepapers available that have Security and Privacy content available | Also whitepapers available that have Security and Privacy content available https://profiles.ihe.net/ITI | ||
*Cookbook: Preparing the IHE Profile Security Section | *Cookbook: Preparing the IHE Profile Security Section | ||
*De-Identification | *De-Identification | ||
Latest revision as of 11:16, 23 March 2022
Profiles that provide Security and/or Privacy capabilities. This includes CyberSecurity, CyberPrivacy, Digital-Signature, Audit-Logging, Access Control, Authorization, Authentication, etc. Protection against Risks to Confidentiality, Integrity, and Availability.
Also whitepapers available that have Security and Privacy content available https://profiles.ihe.net/ITI
- Cookbook: Preparing the IHE Profile Security Section
- De-Identification
- Algorithm Mapping Spreadsheet (for use with De-Identification Handbook)
- Template for XDS Affinity Domain Deployment Planning
- Access Control - Published 2009-09-28
- Analysis of Optimal De-Identification Algorithms for Family Planning Data Elements - Published 2016-12-02
- Health Information Exchange: Enabling Document Sharing Using IHE Profiles - Published 2012-01-24
Pages in category "Security"
The following 18 pages are in this category, out of 18 total.