This wiki has undergone a migration to Confluence found Here
Difference between revisions of "HL7 Security Document Library"
Jump to navigation
Jump to search
Line 5: | Line 5: | ||
* [http://gforge.hl7.org/gf/download/docmanfileversion/6816/9375/HL7SecurityandPrivacyValueSetOIDSandDescriptions.docx HL7 Security and Privacy Vocabulary Value Set OIDs and Descriptions] | * [http://gforge.hl7.org/gf/download/docmanfileversion/6816/9375/HL7SecurityandPrivacyValueSetOIDSandDescriptions.docx HL7 Security and Privacy Vocabulary Value Set OIDs and Descriptions] | ||
===July 2012 Harmonization Proposals=== | ===July 2012 Harmonization Proposals=== | ||
− | * [http://gforge.hl7.org/gf/download/docmanfileversion/ | + | * [http://gforge.hl7.org/gf/download/docmanfileversion/6845/9416/HL7HarmonizationProposalJuly2012SecurityWGPurposeofUsev2.docx HL7 Harmonization Proposal July 2012 Security WG Purpose of Use] |
* [http://gforge.hl7.org/gf/download/docmanfileversion/6841/9408/HL7HarmonizationProposalJuly2012SecurityWGConfidentialityCodeTechnicalCorrections.docx HL7 Harmonization Proposal July 2012 Security WG Confidentiality Code Technical Corrections] | * [http://gforge.hl7.org/gf/download/docmanfileversion/6841/9408/HL7HarmonizationProposalJuly2012SecurityWGConfidentialityCodeTechnicalCorrections.docx HL7 Harmonization Proposal July 2012 Security WG Confidentiality Code Technical Corrections] | ||
* [http://gforge.hl7.org/gf/download/docmanfileversion/6842/9409/HL7HarmonizationProposalJuly2012SecurityWGActSensitivityPrivacyPolicyTypeTechicalCorrection.docx HL7 Harmonization Proposal July 2012 Security WG ActSensitivityPrivacyPolicyType Technical Correction] | * [http://gforge.hl7.org/gf/download/docmanfileversion/6842/9409/HL7HarmonizationProposalJuly2012SecurityWGActSensitivityPrivacyPolicyTypeTechicalCorrection.docx HL7 Harmonization Proposal July 2012 Security WG ActSensitivityPrivacyPolicyType Technical Correction] |
Revision as of 01:56, 7 June 2012
Contents
Security Documents 2012
- HL7 Security and Privacy Requirements for CDA R3
- HL7 Security and Privacy Vocabulary Value Set OIDs and Descriptions
July 2012 Harmonization Proposals
- HL7 Harmonization Proposal July 2012 Security WG Purpose of Use
- HL7 Harmonization Proposal July 2012 Security WG Confidentiality Code Technical Corrections
- HL7 Harmonization Proposal July 2012 Security WG ActSensitivityPrivacyPolicyType Technical Correction
Security Presentation 2012
VA Security Brown Bag Presentations May 24, 2012
- Infoway Privacy by Design and Pan-Canadian Federated Identity Presented by: Stan Ratajczak, Group Director Emerging Technologies Group, Canada Health Infoway
- Presentation on a prototypic implementation of a Healthcare Classification System for Data Segmentation by Duane Decouteau Senior Software Engineer VA (ESC)
- HL7 Privacy and Security Vocabulary for Healthcare Classification by Kathleen Connor
- May 24 VA Security Brown Bag recording
- Information on Software to play May 24 VA Security Brown Bag recording
Security Documents 2011 and Earlier
- Final Refactored Confidentiality Codes Harmonization Proposal
- Final Act Policy Type Harmonization Proposal
- HL7 Publication Request for the Security and Privacy DAM DSTU
- Composite Security and Privacy Domain Analysis Model v1_r2 (post 2010May ballot reconciliation)
- Decision Making Practices (TBD)
- Requirement Analysis
- Security Use Cases
- Role-Based Access Control (RBAC) Use Cases
- Security Glossary HL7 2008(c), Version 3 Std
- Documents on HL7 Project Homebase aka HL7 GForge
- Role Based Access Control (RBAC) Role Engineering Overview, N1 Sept 2009 HL7 baltot site
- HL7 RBAC Permission Catalog
- HL7 RBAC Constraint Catalog
- HL7 RBAC Role Engineering Process (supporting data)
- HL7 RBAC Permission Catalog mapping to SNOMED CT (initial)
- HL7 RBAC Permission Catalog mapping to SNOMED CT II
- A Scenario driven Role Engineering Process for Functional RBAC Roles (RBAC Reference) G. Neumann and M. Strembeck A Scenario-driven Role Engineering Process for Functional RBAC Roles, proc. of the 7th ACM Symposium on Access Control Models and Technologies, pp 33-42, 2002
- Cookbook for Security Considerations-Instructions for HL7 standards editors and workgroups
- HL7 Document on OIDS from May 2009 ballot
- Draft Security DAM Diagram
- Security DAM use cases and their representation in the class diagram
- DRAFT Security DAM Value Sets - US Realm 12/01/2009