This wiki has undergone a migration to Confluence found Here
<meta name="googlebot" content="noindex">

Difference between revisions of "March 2nd, 2010 Security Conference Call"

From HL7Wiki
Jump to navigation Jump to search
Line 35: Line 35:
 
***Sequence diagram shows the final step of the negotiation (consenter has the choice to accept the outcome of the negotiation or to reject it, in which case, nothing is done
 
***Sequence diagram shows the final step of the negotiation (consenter has the choice to accept the outcome of the negotiation or to reject it, in which case, nothing is done
 
**The Related Information and Associations slides show the information related to the Negotiate Privacy Policy use case and the relationships between the classes to arrive at the Information Model
 
**The Related Information and Associations slides show the information related to the Negotiate Privacy Policy use case and the relationships between the classes to arrive at the Information Model
**The model has NOT been changed – these slides are merely to describe the analysis flow from the business use cases to the technical use cases, sequence diagrams and information model.
+
**The model has NOT been changed – these slides are merely to describe the analysis flow from the business use cases to the technical use cases, sequence diagrams and information model.
*We will go into more detail using this presentation next week
 
  
 
==Minutes==
 
==Minutes==

Revision as of 20:29, 2 March 2010

Security Work Group Weekly Conference Call

Meeting Information

Attendees

Agenda

  1. (05 min) Roll Call, Approve Minutes Feb 23rd, 2010 & Call for Additional Agenda Items
  2. (40 min) Harmonized Privacy and Security DAM Peer Review
    • Negotiate Policies Use Case - deep dive

ACTIVE PROJECTS

  • (15 min) Security and Privacy Ontology project

Announcements

An update to the Harmonized Security Domain Analysis Model presentation has been posted on GForge in the Doc section under the Security Domain Analysis (DAM)Project folder

  • Update to this presentation includes:
    • Added analysis for Use Case S.4 Negotiate Privacy Policy
      • Slides were added at the end of the presentation
      • They show how the use case relates to technical implementation of the Access Control System (ACS)
      • The elaboration shows how to automate the use case – as there needs to be a way for the consenter to submit privacy preferences that could be adjudicated by the ACS in an automated fashion since the use case is a set of manual steps
      • The elaboration assumes that the work for the use case is performed by automated systems
      • Sequence diagram shows the final step of the negotiation (consenter has the choice to accept the outcome of the negotiation or to reject it, in which case, nothing is done
    • The Related Information and Associations slides show the information related to the Negotiate Privacy Policy use case and the relationships between the classes to arrive at the Information Model
    • The model has NOT been changed – these slides are merely to describe the analysis flow from the business use cases to the technical use cases, sequence diagrams and information model.

Minutes

1. Action Items

  • Team: Please submit peer review comments to the Harmonized Security Domain Analysis Model by COB March 4, 2010

2. Resolutions- None

3. Updates/Discussion