• DD ENV 13729:2000

    Withdrawn A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

    Health informatics. Secure user identification. Strong authentication microprocessor cards

    Available format(s):  Hardcopy, PDF

    Withdrawn date:  24-04-2012

    Language(s):  English

    Published date:  15-12-2000

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    FOREWORD
    INTRODUCTION
    1 Scope
    2 Normative references
    3 Definitions
    4 Abbreviations
    5 Authentication reference model
    6 Requirements
    ANNEX A - Tutorial material on security requirements in
              health information systems with strong authentication
              (informative)
    ANNEX B - Healthcare professional data (informative)
    ANNEX C - Further requirements for cardholder verification
              (normative)
    ANNEX D - Bibliography (informative)

    Abstract - (Show below) - (Hide below)

    Covers a stong authentication method for identifying a user of a health information system where the user is equipped with a microprocessor card. The main focus of consideration is on users who are registered professionals and other staff using health information as well as healthcare persons.

    General Product Information - (Show below) - (Hide below)

    Committee IST/35
    Document Type Standard
    Publisher British Standards Institution
    Status Withdrawn

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO 10118-2 : 1994 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - HASH-FUNCTIONS USING AN N-BIT BLOCK CIPHER ALGORITHM
    ISO/IEC 9798-3:1998 Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques
    ISO 10202-8:1998 Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 8: General principles and overview
    ISO/IEC 10736:1995 Information technology Telecommunications and information exchange between systems Transport layer security protocol
    ISO/IEC 10118-4:1998 Information technology Security techniques Hash-functions Part 4: Hash-functions using modular arithmetic
    ISO/IEC 7816-8:2016 Identification cards Integrated circuit cards Part 8: Commands and mechanisms for security operations
    ISO/IEC 9798-4:1999 Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function
    ISO/IEC 9979:1999 Information technology Security techniques Procedures for the registration of cryptographic algorithms
    ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
    ENV 13608-2 : DRAFT 2000 HEALTH INFORMATICS - SECURITY FOR HEALTHCARE COMMUNICATION - PART 2: SECURE DATA OBJECTS
    ISO/IEC 9798-2:2008 Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms
    ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
    ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
    ENV 13608-3 : DRAFT 2000 HEALTH INFORMATICS - SECURITY FOR HEALTHCARE COMMUNICATION - PART 3: SECURE DATA CHANNELS
    ISO 1388-8:1981 Ethanol for industrial use — Methods of test — Part 8: Determination of methanol content (methanol contents between 0,10 and 1,50 % (V/V)) — Visual colorimetric method
    ISO/IEC 9798-5:2009 Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
    ISO 9564-1:2017 Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems
    ISO 10202-6:1994 Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 6: Cardholder verification
    ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
    ISO/IEC 2382-8:1998 Information technology Vocabulary Part 8: Security
    ISO/IEC 10181-2:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework
    ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
    ENV 13608-1:2000 HEALTH INFORMATICS - SECURITY FOR HEALTHCARE COMMUNICATION - PART 1: CONCEPTS AND TERMINOLOGY
    ISO/IEC 10745:1995 Information technology Open Systems Interconnection Upper layers security model
    ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective