DD ENV 13729:2000
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
Health informatics. Secure user identification. Strong authentication microprocessor cards
Hardcopy , PDF
24-04-2012
English
15-12-2000
FOREWORD
INTRODUCTION
1 Scope
2 Normative references
3 Definitions
4 Abbreviations
5 Authentication reference model
6 Requirements
ANNEX A - Tutorial material on security requirements in
health information systems with strong authentication
(informative)
ANNEX B - Healthcare professional data (informative)
ANNEX C - Further requirements for cardholder verification
(normative)
ANNEX D - Bibliography (informative)
Covers a stong authentication method for identifying a user of a health information system where the user is equipped with a microprocessor card. The main focus of consideration is on users who are registered professionals and other staff using health information as well as healthcare persons.
Committee |
IST/35
|
DocumentType |
Standard
|
Pages |
42
|
PublisherName |
British Standards Institution
|
Status |
Withdrawn
|
Standards | Relationship |
ENV 13729 : DRAFT 2000 | Identical |
ISO/IEC 9798-3:1998 | Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques |
ISO 10202-8:1998 | Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 8: General principles and overview |
ISO/IEC 10736:1995 | Information technology Telecommunications and information exchange between systems Transport layer security protocol |
ISO/IEC 10118-4:1998 | Information technology Security techniques Hash-functions Part 4: Hash-functions using modular arithmetic |
ISO/IEC 7816-8:2016 | Identification cards Integrated circuit cards Part 8: Commands and mechanisms for security operations |
ISO/IEC 9798-4:1999 | Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function |
ISO/IEC 9979:1999 | Information technology Security techniques Procedures for the registration of cryptographic algorithms |
ISO/IEC 10181-1:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Overview |
ENV 13608-2:2000 | Health informatics - Security for healthcare communication - Part 2: Secure data objects |
ISO/IEC 9798-2:2008 | Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
ENV 13608-3:2000 | Health informatics - Security for healthcare communication - Part 3: Secure data channels |
ISO 1388-8:1981 | Ethanol for industrial use — Methods of test — Part 8: Determination of methanol content (methanol contents between 0,10 and 1,50 % (V/V)) — Visual colorimetric method |
ISO/IEC 9798-5:2009 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques |
ISO 9564-1:2017 | Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems |
ISO 10202-6:1994 | Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 6: Cardholder verification |
ISO/IEC 10118-1:2016 | Information technology Security techniques Hash-functions Part 1: General |
ISO/IEC 2382-8:1998 | Information technology Vocabulary Part 8: Security |
ISO/IEC 10181-2:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ENV 13608-1:2000 | Health informatics - Security for healthcare communication - Part 1: Concepts and terminology |
ISO/IEC 10745:1995 | Information technology Open Systems Interconnection Upper layers security model |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.