June 17, 2014 Security WG Conference Call
Jump to navigation Jump to search
|x||Member Name||x||Member Name||x||Member Name||x||Member Name|
|x||Mike DavisSecurity Co-chair||.||John MoehrkeSecurity Co-chair||.||Trish WilliamsSecurity Co-chair||.||Bernd BlobelSecurity Co-chair|
|.||Chris Clark||.||Johnathan ColemanCBCC Co-Chair||x||Kathleen Connor||.||Duane DeCouteau|
|.||Reed Gelzer||x||Suzanne Gonzales-WebbCBCC Co-chair||x||Rick Grow||x||David Henkel|
|.||Mohammed Jafari||.||Don Jorgenson||x||Alexander Mense||.||Amanda Nash|
|.||Paul PetronelliMobile Health Security Co-chair||x||Diana Proud-Madruga||.||Harry Rhodes||,||Aaron Seib|
|.||Ioana Singureanu||.||Walter Suarez||x||Tony Weida||x||Paul PetronellimHealth Co-chair|
- (05 min) Roll Call, Approval of Meeting Minutes
- (15 min) Feedback requested on Proposed Methodology for Action/Operation Interoperability - Tony Weida
- (10 min) Agenda Item
- (10 min Agenda Item
- (05min) Other business, action items, and adjournment
- Meeting Minutes from 6/10 meeting were approved.
Proposed Methodology for Action/Operation Interoperability
Feedback requested on Proposed Methodology for Action/Operation Interoperability (click on link to access PPT)
- Tony Weida presented and requested feedback on Proposed Methodology for Action/Operation Interoperability.
- Mike stated that you must reconcile the vocabulary and use mapping.
- Tony explained the value of using transition diagrams, which show the pre- and post-conditions of the operations.
- Kathleen added that the transition diagrams are a part of the HL7 methodology for standardizing the triggering process of particular actions and states.
- Tony stated that it would be useful to distinguish between concepts and terms. Concepts represent unique ideas and terms are used to refer to the concepts.
- Tony also stated that the methodology needs to have definitions for the concepts, in order to place the actions into a hierarchy.
- Kathleen later added that an effort is underway to revise the DAM for concept information models in Security SOA Architecture. This work attempts to reconcile actions in the correct privacy buckets.