CR 14301:2002
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
Health informatics - Framework for security protection of healthcare communication
18-02-2022
16-01-2002
FOREWORD
INTRODUCTION
1 SCOPE
2 INFORMATIVE REFERENCES
3 TERMS AND DEFINITIONS
4 COMMUNICATION SCENARIOS
4.1 THE ORIGINS OF HC USER REQUIREMENTS
4.2 THE PURPOSE OF COMMUNICATION
4.3 ORGANISATIONAL VIEW
4.4 THE SAFE USE OF UNSECURE NETWORKS
5 COMMUNICATION SECURITY SERVICES
5.1 THE WORLD OF STANDARDS
5.2 THE THREATS AND THE SERVICES REQUIRED
5.3 UTILISATION OF OPEN NETWORKS
5.4 SECURITY AT THE APPLICATION LAYER
5.5 NETWORK SECURITY
6 NEED FOR ASSURANCES
6.1 OVERVIEW
6.2 STANDARDISATION OBJECTIVES
7 THE NEED FOR STANDARDS
7.1 PROTECTION PROFILE CONCEPT AND METHODOLOGY
7.2 IMMEDIATE NEEDS FOR PROTECTION PROFILES
7.3 THE NEED FOR SECURITY POLICY BRIDGING
7.4 FUTURE NEEDS
7.5 KEY DISTRIBUTION AND THIRD PARTY INFRASTRUCTURE
This CEN Report aims at promoting a better understanding of the security issues in relation to health care (HC) IT-communication, to point at already existing applicable International and European standards. The notion of a framework used in this report does not embody functional security models or specifications that constitute a basis for implementation of systems. This framework comprises identification and discussion of relevant issues, indicating other related standardization work in this area, and indicating the need for specific healthcare standards in the field.
Committee |
CEN/TC 251
|
DocumentType |
Report
|
PublisherName |
Comite Europeen de Normalisation
|
Status |
Withdrawn
|
Standards | Relationship |
I.S. CR 14301:2002 | Identical |
NEN NPR CR 14301 : 2002 | Identical |
ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
ISO/IEC 10181-1:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Overview |
ISO/IEC ISP 10611-1:2003 | Information technology International Standardized Profiles AMH1n Message Handling Systems Common Messaging Part 1: MHS Service Support |
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
ISO/IEC 9594-6:2017 | Information technology Open Systems Interconnection The Directory Part 6: Selected attribute types |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
ISO/IEC 9796:1991 | Information technology Security techniques Digital signature scheme giving message recovery |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.