Potrebujeme váš súhlas na využitie jednotlivých dát, aby sa vám okrem iného mohli ukazovať informácie týkajúce sa vašich záujmov. Súhlas udelíte kliknutím na tlačidlo „OK“.
Standard Guide for User Authentication and Authorization (Withdrawn 2017)
Automaticky preložený názov:
Štandardné Sprievodca pre overovanie a autorizácie užívateľov
NORMA vydaná dňa 1.3.2013
Označenie normy: ASTM E1985-98(2013)
Poznámka: NEPLATNÁ
Dátum vydania normy: 1.3.2013
Kód tovaru: NS-43840
Počet strán: 5
Približná hmotnosť: 15 g (0.03 libier)
Krajina: Americká technická norma
Kategória: Technické normy ASTM
Keywords:
ICS Number Code 35.240.80 (IT applications in health care technology)
Significance and Use | ||||||||||
4.1 This guide has three purposes: 4.1.1 To serve as a guide for developers of computer software that provides or makes use of authentication and authorization processes, 4.1.2 To serve as a guide to healthcare providers who are implementing authentication and authorization mechanisms, and 4.1.3 To be a consensus standard on the design, implementation, and use of authentication and authorization mechanisms. 4.2 Additional standards will define interoperable protocols and message formats that can be used to implement these mechanisms in a distributed environment, using specific commercial technologies such as digital signatures. |
||||||||||
1. Scope | ||||||||||
1.1 This guide covers mechanisms that may be used to authenticate healthcare information (both administrative and clinical) users to computer systems, as well as mechanisms to authorize particular actions by users. These actions may include access to healthcare information documents, as well as specific operations on those documents (for example, review by a physician). 1.2 This guide addresses both centralized and distributed environments, by defining the requirements that a single system shall meet and the kinds of information which shall be transmitted between systems to provide distributed authentication and authorization services. 1.3 This guide addresses the technical specifications for how to perform user authentication and authorization. The actual definition of who can access what is based on organizational policy. |
||||||||||
2. Referenced Documents | ||||||||||
|
Historická
1.3.2013
Historická
1.3.2010
Historická
1.3.2013
Historická
1.4.2014
Historická
1.6.2009
Historická
1.6.2013
Posledná aktualizácia: 2024-11-22 (Počet položiek: 2 206 568)
© Copyright 2024 NORMSERVIS s.r.o.