This wiki has undergone a migration to Confluence found Here
<meta name="googlebot" content="noindex">

March 6, 2018 PSAF Call

From HL7Wiki
Jump to navigation Jump to search

Back to Security Main Page

Back to PSAF Main Page

Attendees

. Member Name . Member Name . Member Name . Member Name
. John Moehrke Security Co-chair x Kathleen Connor Security Co-chair . Alexander Mense Security Co-chair . Trish Williams Security Co-chair
x Christopher Shawn] Security Co-chair x Suzanne Gonzales-Webb x Mike Davis . David Staggs
. Mohammed Jafari x Beth Pumo . Ioana Singureanu . Rob Horn
x Diana Proud-Madruga x Francsico Jauregui . Joe Lamy . Galen Mulrooney
. Paul Knapp . Grahame Grieve . Johnathan Coleman . Aaron Seib
. Ken Salyards . Jim Kretz . Gary Dickinson x Dave Silver
. Oliver Lawless . [1] . David Tao x Greg Linden

Back to Security Main Page

Back to PSAF Main Page

Agenda

  1. (3 min) Roll Call, Agenda Approval
  2. (5 min) Review and Approval of the Feb. 27th Minutes
  3. (50 min) TF4FA Ballot Work Session - Mike Davis and Chris Shawn

Minutes

  • Chris chaired.
  • Agenda approved.
  • Minutes were reviewed. Kathleen moved to approve. Beth seconded. approved 5-0-0
  • Mike walked through several updated models noting that these reflect the focus change to exclude the access control components of the foundational PMAC and DAM models.
  • Mike showed the group the Trust Context Model, which simplifies previous TF4FAby making the initiating Domain's (Domain A) trust proposal dependent on the recipient Domain's (Domain B) approval. If Domain A's proposal meets or exceeds Domain B's trust policies, then Domain B countersigns Domain A's proposal thereby executing a trust contract. If Domain A's trust proposal does not meet Domain B's trust policies, Domain B can decline the proposal or offer suggested "trust elevation" policies to bring Domain B into conformance to some extent, even if the result is that Domain A is not able to access all of the information it requested or with the same handling instructions. Domain A may counter with a new proposal, and this interaction continues until either B executes an agreed to trust contract or either drops out of the negotiations.
  • Mike showed how trust policies may include specializations as security and privacy policies, and that these policies may have either one or a combination of jurisdictional, organizational, and subject of care policies.
  • Mike described the underlying authorization policies as having one or a combination of access control schemes as required by the recipient Domain, including RBAC, ABAC< ACL, ReBAC among others. There is a March Harmonization proposal to bring Authorization and access control scheme policies into HL7 vocabulary.

Meeting Materials