Category
Supplementary Resource
Organisation
Type
Standard
Access
Open
Status
Active
Created
September 2009
Various constraints (laws, regulations and policies) apply when sharing health data among enterprises. This document examines how to define and implement access control in healthcare networks, focusing on issues relating to the IT architecture and the flow of messages required for distributed access control. It provides a set of recommendations to guide future work on access control.
Main sections:
- Introduction
- Summary of recommendations
- Fundamentals of access control
- Policies and attributes
- Use case and analysis
- Recommendations to IHE - actors and transactions
- Appendix A: Requirement specific component deployment
- Appendix B: Example - electronic case record
- Appendix C: Implementation issues (including standards and profiles)
- Appendix D: Glossary
Main sections:
- Introduction
- Summary of recommendations
- Fundamentals of access control
- Policies and attributes
- Use case and analysis
- Recommendations to IHE - actors and transactions
- Appendix A: Requirement specific component deployment
- Appendix B: Example - electronic case record
- Appendix C: Implementation issues (including standards and profiles)
- Appendix D: Glossary
Access IHE IT Infrastructure White Paper: Access Control
By accessing this content, you are leaving this website. The Agency takes no responsibility for the accuracy of content on the destination page.