This wiki has undergone a migration to Confluence found Here
Difference between revisions of "Security"
Jump to navigation
Jump to search
JohnMoehrke (talk | contribs) |
JohnMoehrke (talk | contribs) |
||
Line 3: | Line 3: | ||
* [mailto:mike.davis@va.gov Mike Davis] - U.S. Department of Veterans Affairs | * [mailto:mike.davis@va.gov Mike Davis] - U.S. Department of Veterans Affairs | ||
* [mailto:john.moehrke@med.ge.com John Moehrke] - GE Healthcare IT | * [mailto:john.moehrke@med.ge.com John Moehrke] - GE Healthcare IT | ||
+ | * [mailto:trish.williams@ecu.edu.au Trish Williams PhD] - Edith Cowan University and HL7 Australia | ||
==Governance== | ==Governance== |
Revision as of 19:29, 16 May 2012
Contents
Leadership
- Bernd Blobel PhD - HL7 Germany
- Mike Davis - U.S. Department of Veterans Affairs
- John Moehrke - GE Healthcare IT
- Trish Williams PhD - Edith Cowan University and HL7 Australia
Governance
- Security Decision Making Processes
- Security Mission Statement
- Security SWOT
Security Project Space
- Security & CBCC Work Group Response to Meaningful Use IFR
- Issue tracking, releases, documentation available at: HL7 Homebase Project
- Security G-Forge site
- Web page: Security Working Group Web Page
- Cookbook for Security Considerations - Instructions for HL7 standards authors and workgroup members
- Security and Privacy Ontology Project - Weekly updates to the draft Security & Privacy Ontology
Schedule
Weekly, Tuesday at 1 pm EST (10 am PST)
- Meeting - Audio and Web Meeting Access Information:
Conference Audio: 770-657-9270, Access: 845692 (US Callers may also use: 888-321-4501) A new meeting link has been sent to the Security WG listserve. Thank you. Join the meeting (copy and paste link): meet:sip:Suzanne.Gonzales-Webb@va.gov;gruu;opaque=app:conf:focus:id:3fbd1ba55ee74219abd26892264ddef6%3Fconf-key=7536
Make sure the Office Live Meeting client is installed before the meeting: * I am connecting from inside the Corporation network * I am connecting from outside the Corporation network
Upcoming Security Calendar
Minutes and Agenda
AGENDA: May 2012 - Working Group Meeting - Vancouver
Per April 24 meeting discussion, the May 1, May 8 and May 15 Security WG teleconference meetings have been cancelled. The next Security Working Group Conference Call will be on MAY 29th.
- April 24, 2012 Security Working Group Conference Call
- April 17, 2012 Security Working Group Conference Call
- April 10, 2012 Security Working Group Conference Call
- April 3, 2012 Security Working Group Conference Call - cancelled
- March 27, 2012 Security Working Group Conference Call
- March 20, 2012 Security Working Group Conference Call - Meeting Cancelled
- March 13, 2012 Security Working Group Conference Call
- March 6, 2012 Security Working Group Conference Call
- February 28th, 2012 Security Working Group Conference Call
- February 21st, 2012 Security Working Group Conference Call
- February 14th, 2012 Security Working Group Conference Call
- February 7th, 2012 Security Working Group Conference Call
- January 24th, 2012 Security Working Group Conference Call
- January 2012 WGM San Antonio January 15-20, 2012
- January 9th, 2012 Security Working Group Conference Call
- January 3rd, 2012 Security Working Group Conference Call
Meeting Archive
- 2012 Meeting Minutes (placeholder)
- 2011 Meeting Minutes - 2011 Security Conference Call - ARCHIVE
- September 2011 Working Group Meeting - San Diego, California USA
- May 2011 Working Group Meeting - Orlando, Florida USA, Security WG Agenda DRAFT
- January 2011 Working Group Meeting - Sydney, Australia AGENDA
- 2010 Meeting Minutes - 2010 Security Conference Call - ARCHIVE to October 2010
- 2009 Meeting Minutes - 2009 Security Conference Call - ARCHIVE to December 2009
- 2008 Meeting Minutes - 2008 Security Conference Call - ARCHIVE
Security WG Meeting Minutes Template
Action Item List
Documents
- Final Refactored Confidentiality Codes Harmonization Proposal
- Final Act Policy Type Harmonization Proposal
- HL7 Publication Request for the Security and Privacy DAM DSTU
- Composite Security and Privacy Domain Analysis Model v1_r2 (post 2010May ballot reconciliation)
- Decision Making Practices (TBD)
- Requirement Analysis
- Security Use Cases
- Role-Based Access Control (RBAC) Use Cases
- Security Glossary HL7 2008(c), Version 3 Std
- Documents on HL7 Project Homebase aka HL7 GForge
- Role Based Access Control (RBAC) Role Engineering Overview, N1 Sept 2009 HL7 baltot site
- HL7 RBAC Permission Catalog
- HL7 RBAC Constraint Catalog
- HL7 RBAC Role Engineering Process (supporting data)
- HL7 RBAC Permission Catalog mapping to SNOMED CT (initial)
- HL7 RBAC Permission Catalog mapping to SNOMED CT II
- A Scenario driven Role Engineering Process for Functional RBAC Roles (RBAC Reference) G. Neumann and M. Strembeck A Scenario-driven Role Engineering Process for Functional RBAC Roles, proc. of the 7th ACM Symposium on Access Control Models and Technologies, pp 33-42, 2002
- Cookbook for Security Considerations-Instructions for HL7 standards editors and workgroups
- HL7 Document on OIDS from May 2009 ballot
- Draft Security DAM Diagram
- Security DAM use cases and their representation in the class diagram
- DRAFT Security DAM Value Sets - US Realm 12/01/2009