BS EN ISO 22600-2:2014
$167.15
Health informatics. Privilege management and access control – Formal models
Published By | Publication Date | Number of Pages |
BSI | 2014 | 38 |
This multi-part International Standard defines principles and specifies services needed for managing privileges and access control to data and/or functions.
It focuses on communication and use of health information distributed across policy domain boundaries. This includes healthcare information sharing across unaffiliated providers of healthcare, healthcare organizations, health insurance companies, their patients, staff members, and trading partners by both individuals and application systems ranging from a local situation to a regional or even national situation.
It specifies the necessary component-based concepts and is intended to support their technical implementation. It will not specify the use of these concepts in particular clinical process pathways.
This part of ISO 22600 introduces the underlying paradigm of formal high-level models for architectural components. It is based on ISO/IEC 10746 (all parts) and introduces the domain model, the document model, the policy model, the role model, the authorization model, the delegation model, the control model, and the access control model.
The specifications are provided using the meta-languages Unified Modelling Language (UML) and Extensible Markup Language (XML). Additional diagrams are used for explaining the principles. The attributes used have been referenced to the HL7 reference information model (see ISO 21731:2006) and the HL7 data type definitions.
The role model has been roughly introduced referring to ISO 21298.
PDF Catalog
PDF Pages | PDF Title |
---|---|
4 | Foreword |
6 | Foreword |
7 | Introduction |
9 | Section sec_1 Section sec_2 Section sec_3 Section sec_3.1 1 Scope 2 Normative references 3 Terms and definitions |
10 | Section sec_3.2 Section sec_3.3 Section sec_3.4 Section sec_3.5 Section sec_3.6 Section sec_3.7 Section sec_3.8 Section sec_3.9 Section sec_3.10 |
11 | Section sec_3.11 Section sec_3.12 Section sec_3.13 Section sec_3.14 Section sec_3.15 Section sec_3.16 Section sec_3.17 Section sec_3.18 Section sec_3.19 Section sec_3.20 |
12 | Section sec_3.21 Section sec_3.22 Section sec_3.23 Section sec_3.24 Section sec_3.25 Section sec_3.26 Section sec_3.27 Section sec_3.28 Section sec_3.29 Section sec_3.30 Section sec_3.31 |
13 | Section sec_3.32 Section sec_3.33 Section sec_3.34 Section sec_3.35 Section sec_3.36 Section sec_3.37 Section sec_3.38 Section sec_3.39 Section sec_3.40 Section sec_3.41 |
14 | Section sec_3.42 Section sec_3.43 Section sec_4 Section sec_5 4 Abbreviated terms 5 Component paradigm |
15 | Figure fig_1 Section sec_6 Section sec_6.1 6 Generic models 6.1 Framework |
17 | Section sec_6.2 Table tab_1 6.2 Domain model |
18 | Figure fig_2 Figure fig_3 Section sec_6.3 6.3 Document model |
19 | Section sec_6.4 Table tab_2 6.4 Policy model |
20 | Figure fig_4 Table tab_3 |
21 | Table tab_4 Figure fig_5 |
22 | Section sec_6.5 Figure fig_6 Section sec_6.6 6.5 Role model 6.6 Authorization model — Role and privilege assignment |
23 | Section sec_6.7 6.7 Control model |
24 | Figure fig_7 Section sec_6.8 Figure fig_8 6.8 Delegation model |
26 | Table tab_5 Section sec_6.9 6.9 Access control model |
27 | Figure fig_9 Figure fig_10 |
28 | Annex sec_A Annex sec_A.1 Figure fig_A.1 Annex A (informative) Functional and structural roles |
29 | Annex sec_A.2 |
30 | Figure fig_A.2 Figure fig_A.3 Annex sec_A.3 |
31 | Figure fig_A.4 Annex sec_A.4 Table tab_A.1 |
32 | Figure fig_A.5 |
33 | Reference ref_1 Reference ref_2 Reference ref_3 Reference ref_4 Reference ref_5 Reference ref_6 Reference ref_7 Reference ref_8 Reference ref_9 Reference ref_10 Reference ref_11 Reference ref_12 Reference ref_13 Reference ref_14 Reference ref_15 Reference ref_16 Reference ref_17 Reference ref_18 Reference ref_19 Reference ref_20 Bibliography |
34 | Reference ref_21 Reference ref_22 Reference ref_23 Reference ref_24 |