This wiki has undergone a migration to Confluence found Here
<meta name="googlebot" content="noindex">

Difference between revisions of "October 13th 2009 Security Conference Call"

From HL7Wiki
Jump to navigation Jump to search
Line 5: Line 5:
 
==Attendees==
 
==Attendees==
  
* Pat Christensen
 
 
* [mailto:bernd.blobel@ehealth-cc.de Bernd Blobel] Security Co-chair, absent
 
* [mailto:bernd.blobel@ehealth-cc.de Bernd Blobel] Security Co-chair, absent
 
* [mailto:sconnolly@apelon.com Steven Connolly]
 
* [mailto:sconnolly@apelon.com Steven Connolly]
Line 12: Line 11:
 
* [mailto:gonzaleswebs@saic.com Suzanne Gonzales-Webb] CBCC Co-chair, absent
 
* [mailto:gonzaleswebs@saic.com Suzanne Gonzales-Webb] CBCC Co-chair, absent
 
* [mailto:Allen.Hobbs@kp.org Allen Hobbs]
 
* [mailto:Allen.Hobbs@kp.org Allen Hobbs]
* [mailto:robert.horn@agfa.com Rob Horn]
+
# [mailto:djorgenson@inpriva.com Don Jorgenson]
 
* [mailto:glen.f.marshall@siemans.com Glen Marshall] Security Co-chair
 
* [mailto:glen.f.marshall@siemans.com Glen Marshall] Security Co-chair
 
* [mailto:rmcclure@apelon.com Rob McClure]
 
* [mailto:rmcclure@apelon.com Rob McClure]
 
* [mailto:john.moehrke@med.ge.com John Moehrke]
 
* [mailto:john.moehrke@med.ge.com John Moehrke]
 +
* [mailto:milan.petkovic@phillips.com Milan Petkovic]
 
* [mailto:ppyette@perimind.com Pat Pyette]
 
* [mailto:ppyette@perimind.com Pat Pyette]
* [mailto:richard.thoreson@samhsa.hhs.gov Richard Thoreson] CBCC Co-chair
+
* [mailto:scott.m.robertson@kp.org Scott Robertson]
 
* [mailto:ioana@eversolve.com Ioana Singureanu]
 
* [mailto:ioana@eversolve.com Ioana Singureanu]
 
* [mailto:serafina@eversolve.com Serafina Versaggi] Scribe
 
* [mailto:serafina@eversolve.com Serafina Versaggi] Scribe

Revision as of 19:13, 13 October 2009

Security Work Group Weekly Conference Call

Meeting Information

Attendees

  1. Don Jorgenson

Agenda

  1. (05 min) Roll Call, Approve Minutes & Agenda
  2. (80 min) Milestone discussion: Use Case inventory and vocabulary considerations with respect to Security and Privacy Consent DAMS and RBAC Constraint Catalog, Gap Analysis