This wiki has undergone a migration to Confluence found Here
Difference between revisions of "April 28th 2009 Security Conference Call"
Jump to navigation
Jump to search
(→Agenda) |
|||
Line 28: | Line 28: | ||
#''(05 min)'' Roll Call, Approve Minutes, Accept Agenda | #''(05 min)'' Roll Call, Approve Minutes, Accept Agenda | ||
#''(15 min)'' '''[http://wiki.hl7.org/index.php?title=Role-Based_Access_Control_%28RBAC%29_Use_Cases Security Use Cases]''' Ioana Singureanu/Steve Connolly | #''(15 min)'' '''[http://wiki.hl7.org/index.php?title=Role-Based_Access_Control_%28RBAC%29_Use_Cases Security Use Cases]''' Ioana Singureanu/Steve Connolly | ||
+ | |||
+ | Part of security DAM which is going to TSC now. We are soliciting use cases from both the Seucrity WG and the CBCC WG. | ||
+ | Currently have 5 use cases | ||
+ | # IN1.2 Authenticate users and systems | ||
+ | # IN1.3 authorize users and systems | ||
+ | # IN1.4 enforce privacy policy and consent directives (access control) | ||
+ | # IN1.5 "Non-repudiation" Enforce authenticity of legal healthcare documents | ||
+ | # IN1.6 "security data exchange" Enforce security exchange of personal health records | ||
+ | |||
+ | there are possibly other functional models that have similiar infrastructures | ||
+ | |||
#''(15 min)'' '''Item2''' | #''(15 min)'' '''Item2''' | ||
#''(15 min)'' '''Item3''' | #''(15 min)'' '''Item3''' |
Revision as of 17:17, 28 April 2009
Security Working Group Meeting
==Attendees== (expected)
- Bernd Blobel Security Co-chair, absent
- Steven Connolly
- Ed Coyne
- Mike Davis Security Co-chair
- Suzanne Gonzales-Webb CBCC Co-chair
- Russ Hamm
- Bob Horn
- Glen Marshall Security Co-chair
- Rob McClure
- John Moehrke
- Milan Petkovik
- Pat Pyette
- Scott Robertson
- David Sperzel
- Richard Thoreson CBCC Co-chair
- Ioana Singureanu
- Tony Weida
- Craig Winter
Agenda
- (05 min) Roll Call, Approve Minutes, Accept Agenda
- (15 min) Security Use Cases Ioana Singureanu/Steve Connolly
Part of security DAM which is going to TSC now. We are soliciting use cases from both the Seucrity WG and the CBCC WG.
Currently have 5 use cases
- IN1.2 Authenticate users and systems
- IN1.3 authorize users and systems
- IN1.4 enforce privacy policy and consent directives (access control)
- IN1.5 "Non-repudiation" Enforce authenticity of legal healthcare documents
- IN1.6 "security data exchange" Enforce security exchange of personal health records
there are possibly other functional models that have similiar infrastructures
- (15 min) Item2
- (15 min) Item3
- (5 min) Other Business