{"id":349521,"date":"2024-10-20T00:37:10","date_gmt":"2024-10-20T00:37:10","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-17090-12013\/"},"modified":"2024-10-26T00:18:52","modified_gmt":"2024-10-26T00:18:52","slug":"bs-iso-17090-12013","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-17090-12013\/","title":{"rendered":"BS ISO 17090-1:2013"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Section sec_1 Section sec_2 Section sec_3 Section sec_3.1 1\tScope 2\tNormative references 3\tTerms and definitions 3.1\tHealthcare context terms <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Section sec_3.2 3.2\tSecurity services terms <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | Section sec_3.3 3.3\tPublic key infrastructure related terms <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | Section sec_4 Section sec_5 Section sec_5.1 4\tAbbreviations 5\tHealthcare context 5.1\tCertificate holders and relying parties in healthcare <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | Section sec_5.2 Section sec_5.2.1 Section sec_5.2.2 Section sec_5.2.3 Section sec_5.2.4 5.2\tExamples of actors <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Section sec_5.2.5 Section sec_5.2.6 Section sec_5.2.7 Section sec_5.2.8 Section sec_5.2.9 Section sec_5.3 5.3\tApplicability of digital certificates to healthcare <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | Section sec_6 Section sec_6.1 6\tRequirements for security services in healthcare applications 6.1\tHealthcare characteristics <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Section sec_6.2 Section sec_6.2.1 Section sec_6.2.2 Section sec_6.2.3 Section sec_6.2.4 Section sec_6.2.5 6.2\tDigital certificate technical requirements in healthcare <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | Section sec_6.2.6 Section sec_6.2.7 Section sec_6.3 Section sec_6.4 Section sec_6.5 6.3\tHealthcare-specific needs and the separation of authentication from data encipherment 6.4\tHealth industry security management framework for digital certificates 6.5\tPolicy requirements for digital certificate issuance and use in healthcare <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Section sec_7 Section sec_7.1 Section sec_7.2 Section sec_7.3 7\tPublic key cryptography 7.1\tSymmetric vs. asymmetric cryptography 7.2\tDigital certificates 7.3\tDigital signatures <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Section sec_7.4 7.4\tProtecting the private key <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Section sec_8 Section sec_8.1 Section sec_8.1.1 Section sec_8.1.2 Section sec_8.1.3 Section sec_8.1.4 Section sec_8.1.5 8\tDeploying digital certificates 8.1\tNecessary components <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Section sec_8.2 Section sec_8.3 8.2\tEstablishing identity using qualified certificates 8.3\tEstablishing speciality and roles using identity certificates <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Section sec_8.4 8.4\tUsing attribute certificates for authorisation and access control <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Section sec_9 Section sec_9.1 Section sec_9.2 Section sec_9.2.1 Section sec_9.2.2 Section sec_9.2.3 9\tInteroperability requirements 9.1\tOverview 9.2\tOptions for deploying healthcare digital certificates across jurisdictions <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Section sec_9.2.4 Section sec_9.2.5 <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Section sec_9.2.6 Section sec_9.3 9.3\tOption usage <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Annex sec_A Annex sec_A.1 Annex sec_A.2 Annex sec_A.3 Annex\u00a0A \n(informative)<\/p>\n Scenarios for the use of digital certificates in healthcare <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Table tab_A.1 <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Annex sec_A.4 Annex sec_A.4.1 Annex sec_A.4.2 <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Annex sec_A.4.3 <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Annex sec_A.4.4 <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | Annex sec_A.4.5 <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | Annex sec_A.4.6 <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | Annex sec_A.4.7 <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | Annex sec_A.4.8 Annex sec_A.4.9 <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | Annex sec_A.4.10 <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | Annex sec_A.4.11 <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | Annex sec_A.4.12 <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | Annex sec_A.4.13 Annex sec_A.4.14 <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | Annex sec_A.4.15 <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | Annex sec_A.4.16 <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | Reference ref_1 Reference ref_2 Reference ref_3 Reference ref_4 Reference ref_5 Reference ref_6 Reference ref_7 Reference ref_8 Reference ref_9 Reference ref_10 Reference ref_11 Reference ref_12 Reference ref_13 Reference ref_14 Reference ref_15 Reference ref_16 Reference ref_17 Reference ref_18 Reference ref_19 Reference ref_20 Reference ref_21 Reference ref_22 Bibliography <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | Reference ref_23 Reference ref_24 Reference ref_25 Reference ref_26 Reference ref_27 Reference ref_28 Reference ref_29 Reference ref_30 <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Health informatics. Public key infrastructure – Overview of digital certificate services<\/b><\/p>\n |