ASTM-E1985 › Standard Guide for User Authentication and Authorization (Withdrawn 2017)
Show Complete Document History
The following bibliographic material is provided to assist you with your purchasing decision:
1.1 This guide covers mechanisms that may be used to authenticate healthcare information (both administrative and clinical) users to computer systems, as well as mechanisms to authorize particular actions by users. These actions may include access to healthcare information documents, as well as specific operations on those documents (for example, review by a physician).
1.2 This guide addresses both centralized and distributed environments, by defining the requirements that a single system shall meet and the kinds of information which shall be transmitted between systems to provide distributed authentication and authorization services.
1.3 This guide addresses the technical specifications for how to perform user authentication and authorization. The actual definition of who can access what is based on organizational policy.
Significance and Use
4.2 Additional standards will define interoperable protocols and message formats that can be used to implement these mechanisms in a distributed environment, using specific commercial technologies such as digital signatures.
ICS Number Code 35.240.80 (IT applications in health care technology)
To find similar documents by ASTM Volume:
To find similar documents by classification:
This document comes with our free Notification Service, good for the life of the document.
This document is available in either Paper or PDF format.
1998 R13 EDITION
March 15, 2013