Hi everyone,
As Thomas & al. pointed, security addresses "a number of aspects",
including security policy (defining who does what), data safety, and how
security is ensured: so, including safety of the network, the application
architecture -including management of messages: asynchronous/EHRcom/XML, or
synchronous/CorbaMed/IDL-, the programs, and the platform.
Great.
I agree with Gerard Freriks's considerations (legal, social control and
organisational aspects) but for now I only focus on the technical
specification.
For now, I will focus on far restricted objectives.
One of EHRcom's startpoints is ENV 13606-1999, and we all want to ensure
ascending compatibility.
ENV13606 messages (part 3 : "distribution rules") describe access policy
in terms of objects ("Who", "When", "Where",etc.) whose instanciations
define the allowed access context to message objects.
So, in the viewpoint of EHRcom release 1 in 2004,
* Will this (or such an) architecture be reused in EHRcom ?
* If no, will we have a tool to convert distribution rules into
corresponding archetypes ?
* If no, how is it planned to ensure ascending compatibility ?
Another basic, technical, concrete security point is: ensuring data
(transmission + authoring) integrity in the message.
One solution proposed by ENV13606 was: systematic digital signature of each
transaction.
Will EHRcom reuse this mechanism ?
One last point is: our deadline for a (definitive ? initial ?) specification.
In EHRcom specs, what can we define for now as a stable 2004 milestone ?
Maybe my questions are FAQs.
Thank you for your kind replies.
-- Patrick Lefebvre
-
If you have any questions about using this list,
please send a message to d.lloyd at openehr.org