• There are no items in your cart

CR 14301:2002

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

Health informatics - Framework for security protection of healthcare communication

Withdrawn date

18-02-2022

Published date

16-01-2002

Sorry this product is not available in your region.

FOREWORD
INTRODUCTION
1 SCOPE
2 INFORMATIVE REFERENCES
3 TERMS AND DEFINITIONS
4 COMMUNICATION SCENARIOS
  4.1 THE ORIGINS OF HC USER REQUIREMENTS
  4.2 THE PURPOSE OF COMMUNICATION
  4.3 ORGANISATIONAL VIEW
  4.4 THE SAFE USE OF UNSECURE NETWORKS
5 COMMUNICATION SECURITY SERVICES
  5.1 THE WORLD OF STANDARDS
  5.2 THE THREATS AND THE SERVICES REQUIRED
  5.3 UTILISATION OF OPEN NETWORKS
  5.4 SECURITY AT THE APPLICATION LAYER
  5.5 NETWORK SECURITY
6 NEED FOR ASSURANCES
  6.1 OVERVIEW
  6.2 STANDARDISATION OBJECTIVES
7 THE NEED FOR STANDARDS
  7.1 PROTECTION PROFILE CONCEPT AND METHODOLOGY
  7.2 IMMEDIATE NEEDS FOR PROTECTION PROFILES
  7.3 THE NEED FOR SECURITY POLICY BRIDGING
  7.4 FUTURE NEEDS
  7.5 KEY DISTRIBUTION AND THIRD PARTY INFRASTRUCTURE

This CEN Report aims at promoting a better understanding of the security issues in relation to health care (HC) IT-communication, to point at already existing applicable International and European standards. The notion of a framework used in this report does not embody functional security models or specifications that constitute a basis for implementation of systems. This framework comprises identification and discussion of relevant issues, indicating other related standardization work in this area, and indicating the need for specific healthcare standards in the field.

Committee
CEN/TC 251
DocumentType
Report
PublisherName
Comite Europeen de Normalisation
Status
Withdrawn

Standards Relationship
I.S. CR 14301:2002 Identical
NEN NPR CR 14301 : 2002 Identical

ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
ISO/IEC ISP 10611-1:2003 Information technology International Standardized Profiles AMH1n Message Handling Systems Common Messaging Part 1: MHS Service Support
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC 9594-6:2017 Information technology Open Systems Interconnection The Directory Part 6: Selected attribute types
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
ISO/IEC 9796:1991 Information technology Security techniques Digital signature scheme giving message recovery
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.