Centers for Disease Control and Prevention, Public Health Information Network Messaging System (PHINMS)
|
|
|
- Gavin Wells
- 10 years ago
- Views:
Transcription
1 1 ebxml Case Study Centers for Disease Control and Prevention, Public Health Information Network Messaging System (PHINMS) 4 October Document identifier: (Word) Location: Contributors: Alan Kotok, ebxml Forum ( Abstract: The U.S. Centers for Disease Control and Prevention (CDC), an agency of the Department of Health and Human Services, operates the Public Health Information Network Messaging System (PHINMS), with state and local health agencies, clinical facilities and medical labs across the U.S. PHINMS makes use of ebxml s Messaging Service and Collaboration Protocol Agreement specifications Copyright 2003, Technology News & Literature 20 {CDC-FINAL}-{JMT}-{CDC_PHINMS Case Study}-{ } (Word)
2 20 Table of Contents Executive Overview Business Need Project Description Participants Industry Users Other ebxml Specifications Used Other Standards Used (where applicable) Benefits and Challenges Business Technical Lessons Learned Future Plans...5 Appendix A. Acknowledgments (where applicable)...6 Appendix B. Revision History...7 Appendix C. Notices
3 Executive Overview 1.1 Business Need The Public Health Information Network Messaging System (PHINMS) provides a secure and reliable messaging system for the Public Health Information Network. The Centers for Disease Control and Prevention (CDC) says that there are currently multiple systems in place that support communications for public health labs, the clinical community, and state and local health departments. However, many of these systems operate in isolation, not capitalizing on the potential for a cross-fertilization of data exchange. A crosscutting and unifying framework is needed to better monitor these data streams for early detection of public health issues and emergencies. To meet these requirements, the Public Health Information Network will enable a consistent exchange of response, health, and disease tracking data between public health partners. Ensuring the security of this information is also critical as is the ability of the network to work reliably in times of national crisis. 1.2 Project Description Developed by the Centers for Disease Control and Prevention, PHINMS uses the ebxml, infrastructure to securely transmit public health information over the Internet. PHINMS is a generic, standards-based, interoperable and extensible message transport system. It is platformindependent and loosely coupled with systems that produce outgoing messages or consume incoming messages Participants 2.1 Industry Public health community, consisting of federal, state, and local agencies, as well as private and commercial clinical and laboratory providers 2.2 Users?? Centers for Disease Control and Prevention?? State, territorial, and local public health departments?? Participating health care providers?? Medical laboratories?? Emergency first responders, e.g. law enforcement and emergency medical teams 2.3 Other ebxml Specifications Used OASIS/ebXML Messaging 2.0
4 OASIS/ebXML Collaboration Protocol Agreement Other Standards Used HL7 2.x messages for exchanges with clinical and lab facilities HL7 2.x bioterrorism response messages HL7 3.x messages for public health case reporting Standard medical vocabularies: SNOMED, LOINC W3C XML Signature W3C XML Encryption LDAP, X.509 PKI, SSL, J2EE, JDBC Technical Description PHINMS functions as a component in the National Electronic Disease Surveillance System (NEDSS). PHINMS is loosely coupled with the Message Transformation Component, another component of NEDSS. It uses a Transport Queue interface to read and write outgoing and incoming messages. The Transport Queue is implemented as a database table or as a file system directory. PHINMS has three major components: the Message Sender, Message Receiver, and Message Handler. The Message Sender functions as the client. It is a Java application that runs on a workstation or server. The Message Sender polls the Transport Queue for outgoing data. The Transport Queue can be a database table or a file system directory. When outgoing data is found, the Message Sender packages the data as an ebxml message and sends it to the Message Receiver. The Message Receiver functions as a server. It is a servlet that runs on a J2EE compliant application server. When the Message Receiver receives a message, it processes the message envelope, decrypts the message, verifies the signature and then forwards the message payload to the Message Handler or writes the message directly into a worker queue. The Message Handler can process synchronous messages posted by the message receiver or poll the worker queue. It is a servlet that runs on a J2EE compliant application server. The Message Handler and the Message Receiver can reside on the same system. When the Message Handler receives the message payload from the Message Receiver in synchronous scenarios, it processes the message payload and then sends a response, which contains the Message Handler s status, back to the Message Receiver. In asynchronous scenarios, the message handler polls its worker queue to receive the incoming message. PHINMS also performs routing functions, either in direct message exchanges or through intermediaries. Route Mapping. A configuration file, called routemap, maps the route to its Collaboration Protocol Agreement, the CPA. The route is specified in a field in the Message Queue database table or as a field in the file descriptor that is associated with an outgoing message. The CPA is read to determine the Message Receiver s end point, and security attributes, such as the authentication mode. Use of intermediaries. When the Message Sender and the recipient, which can also be a Message Sender, are behind separate firewalls, they need an intermediary to communicate. A
5 Router Message Handler acts as this intermediary. It "routes" the message to a temporary Message Bin instead of reading it. To retrieve the message from the Message Bin, the recipient polls the Message Receiver, which communicates to the Router, which retrieves the message from Message Bin. This scenario is called "route-not-read." Benefits and Challenges 5.1 Business CDC has had the PHINMS in operation for over a year with deployments in some 30 locations across the country. The agency says the number will expand greatly in the near future. 5.2 Technical CDC reports some difficulties with security and interoperability issues. The system s manager says the lack of specific security details in ebxml means vendors will implement various security solutions (e.g., S/MIME or XML Encryption), leaving it up to CDC to integrate these solutions. The system manager attributes some of the interoperability problems to the absence of authentication standards within ebxml specifications, and the fact that CDC needs to interoperate with multiple authentication mechanisms in order to conduct peer-to-peer messaging. 5.3 Lessons Learned Future Plans CDC says it is currently working on requirements gathering for version 3.0 which will address some of the management, deployment, versioning, integration and security issues we have been dealing with.
6 Appendix A. Acknowledgments?? M. Barry Rhodes, Ph.D. Associate Director for Public Health Systems Development Centers for Disease Control and Prevention
7 Appendix B. Revision History Rev Date By Whom What CDC Alan Kotok Initial version, draft 1 [email protected] CDC Alan Kotok [email protected] Draft 2, incorporating comments from Dr. Rhodes CDC Alan Kotok [email protected] Draft 3, incorporating further comments from Dr. Rhodes and his colleagues CDC- FINAL Alan Kotok [email protected] Completed case study submitted for publication
8 Appendix C. Notices None provided.
PHIN MS Detailed Security Design
The Public Health Information Network Messaging System (PHINMS) sends and receives sensitive data over the internet to the public health information systems using Electronic Business Extensible Markup
Secure, Reliable Messaging Comparisons between PHINMS, SFTP, and SSH. Public Health Information Network Messaging System (PHINMS)
Secure, Reliable Messaging Comparisons between PHINMS, SFTP, and SSH Public Health Information Network Messaging System (PHINMS) Version: 1.0 Prepared by: U.S. Department of Health & Human Services Date:
Collaboration Protocol Agreement Guide. Public Health Information Network Messaging System (PHINMS)
Collaboration Protocol Agreement Guide Public Health Information Network Messaging System (PHINMS) Version: 1.0.0 Prepared by: U.S. Department of Health & Human Services Date: April 15, 2008 EXECUTIVE
PHINMS Alarms. Version: 1.0.0. Prepared by: U.S. Department of Health & Human Services
PHINMS Alarms Version: 1.0.0 Prepared by: U.S. Department of Health & Human Services Date: January 11, 2008 VERSION HISTORY VERSION # IMPLEMENTER DATE EXPLANATION 1.0.0 Chris Childs 01/11/08 Create version
Implementation Guide. Public Health Information Network Messaging System (PHINMS)
Implementation Guide Public Health Information Network Messaging System (PHINMS) Version: 2.8.02 Prepared by: U.S. Department of Health & Human Services November 1, 2012 EXECUTIVE SUMMARY PHINMS 2.8.02
The Public Health Information Network Messaging System
The Public Health Information Network Messaging System Tim Morris Director, Division of Informatics Shared Services (DISS) National Center for Public Health Informatics (NCPHI) Centers for Disease Control
StreamServe Encryption and Authentication
StreamServe Encryption and Authentication User Guide 4.1.2 SP2 Rev A StreamServe Encryption and Authentication User Guide 4.1.2 SP2 Rev A 2007 StreamServe, Inc. StreamServe is a trademark of StreamServe,
Prepared by Noam H. Arzt, PhD HLN Consulting, LLC
Architectures and Transport Mechanisms for Health Information Interchange of Clinical EHR Data for Syndromic Surveillance A Report from the International Society for Disease Surveillance Prepared by Noam
Joseph D. Rogers. Team Lead National Program of Cancer Registries (NPCR) Centers for Disease Control and Prevention (CDC)
The Public Health Grid (PHGrid) and Nationwide Health Information Network (NHIN) CONNECT: What are they and How can they Support Cancer Surveillance Activities? Joseph D. Rogers Team Lead National Program
Norwegian e-health Infrastructure based on XML, ebxml and PKI
An OASIS Case Study Norwegian e-health Infrastructure based on XML, ebxml and PKI Trygdeetaten Case Study By Pim van der Eijk For OASIS OASIS (Organization for the Advancement of Structured Information
Secure Messaging Challenge Technical Demonstration
Secure Messaging Challenge Technical Demonstration The Open Group EMA Forum Boeing s Messaging Needs Provide access to strongly encrypted e-mail outside the enterprise Reduce complexity of deploying secure
StreamServe Persuasion SP4 Encryption and Authentication
StreamServe Persuasion SP4 Encryption and Authentication User Guide Rev A StreamServe Persuasion SP4 Encryption and Authentication User Guide Rev A 2001-2009 STREAMSERVE, INC. ALL RIGHTS RESERVED United
StreamServe Persuasion SP5 Encryption and Authentication
StreamServe Persuasion SP5 Encryption and Authentication User Guide Rev A StreamServe Persuasion SP5 Encryption and Authentication User Guide Rev A 2001-2010 STREAMSERVE, INC. ALL RIGHTS RESERVED United
PHINMS Acronyms & Glossary List
PHINMS Acronyms & Glossary List Version: 1.0.3 Prepared by: U.S. Department of Health & Human Services Date: March 27, 2008 VERSION HISTORY VERSION # IMPLEMENTER DATE EXPLANATION 1.0.0 Wendy Fama 03-19-07
Comparing ebxml messaging (ebms) AS2 for EDI, EDI VAN and Web Service messaging
April 10, 2007 http://ebxml.xml.org Comparing ebxml messaging (ebms) AS2 for EDI, EDI VAN and Web Service messaging DRAFT Copyright OASIS, 2005 / 2007 OASIS ebxml MSG TC Summary ebxml designed for B2B
Developers Integration Lab (DIL) System Architecture, Version 1.0
Developers Integration Lab (DIL) System Architecture, Version 1.0 11/13/2012 Document Change History Version Date Items Changed Since Previous Version Changed By 0.1 10/01/2011 Outline Laura Edens 0.2
The GlobalCerts TM SecureMail Gateway TM
Glob@lCerts PRODUCT OVERVIEW: The GlobalCerts TM SecureMail Gateway TM Automatic encryption and decryption is unique to the SecureMail Gateway. The GlobalCerts SecureMail Gateway is based on a network
WebLogic Server 7.0 Single Sign-On: An Overview
WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of
Exploring ADSS Server Signing Services
ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)
WebSphere Training Outline
WEBSPHERE TRAINING WebSphere Training Outline WebSphere Platform Overview o WebSphere Product Categories o WebSphere Development, Presentation, Integration and Deployment Tools o WebSphere Application
Building a protocol validator for Business to Business Communications. Abstract
Building a protocol validator for Business to Business Communications Rudi van Drunen, Competa IT B.V. ([email protected]) Rix Groenboom, Parasoft Netherlands ([email protected]) Abstract
How To Use Direct Messaging
Demystifying Direct Messaging Orion Health Whitepaper Author: Paul de Bazin, Integration Portfolio Manager Table of Contents 1! Introduction... 3! 2! Background... 3! 2.1! Standard Use Cases... 3! 3! Direct
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks
Using PI to Exchange PGP Encrypted Files in a B2B Scenario
Using PI to Exchange PGP Encrypted Files in a B2B Scenario Applies to: SAP Net Weaver Process Integration 7.1 (SAP PI 7.1). For more information, visit the SOA Management homepage. Summary This document
Securing a Web Service
1 Securing a Web Service HTTP Basic Authentication and HTTPS/SSL Authentication and Encryption - Read Chaper 32 of the J2EE Tutorial - protected session, described later in this chapter, which ensur content
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
1 What Are Web Services?
Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1) E14294-04 January 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include: What
Using etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
White Paper. Securing and Integrating File Transfers Over the Internet
White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure
GlassFish Security. open source community experience distilled. security measures. Secure your GlassFish installation, Web applications,
GlassFish Security Secure your GlassFish installation, Web applications, EJB applications, application client module, and Web Services using Java EE and GlassFish security measures Masoud Kalali PUBLISHING
AS4: Web Services for B2B. GS1 etg White Paper. Issue 1, Approved, July 2011. AS4: Web Services for B2B GS1 etg White Paper
AS4: Web Services for B2B GS1 etg White Paper Issue 1, Approved, July 2011 Issue 1, Approved, July 2011 All contents copyright GS1 Page 1 of 14 Document Summary Document Item Document Title Current Value
BUSINESS PROCESS AND EBXML - WEB SERVICES INTEGRATION PLATFORM, REQUIREMENTS, ARCHITECTURES, SECURITY
1 2 BUSINESS PROCESS AND EBXML - WEB SERVICES INTEGRATION PLATFORM, REQUIREMENTS, ARCHITECTURES, SECURITY 1 Carmen RĂDUŢ, 2 Maria STĂNILOIU 1 Universitatea Constantin Brâncoveanu PITEŞTI 2 Universitatea
Astaro Mail Archiving Getting Started Guide
Connect With Confidence Astaro Mail Archiving Getting Started Guide About this Getting Started Guide The Astaro Mail Archiving Service is an archiving platform in the form of a fully hosted service. E-mails
StreamServe Persuasion SP5 StreamStudio
StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other
Ciphermail for BlackBerry Quick Start Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail for BlackBerry Quick Start Guide June 19, 2014, Rev: 8975 Copyright 2010-2014, ciphermail.com. Introduction This guide will explain how to setup and configure a Ciphermail
Using Entrust certificates with Microsoft Office and Windows
Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
End to end security for WebSphere MQ
End to end security for WebSphere MQ An Introduction to WebSphere MQ Advanced Message Security T.Rob Wyatt ([email protected]) Conference materials may not be reproduced in whole or in part without
Processo Civile Telematico (On-line Civil Trial)
Processo Civile Telematico (On-line Civil Trial) By Giulio Borsari Italian Ministry of Justice IT Department via Crescenzio 7/c Rome Phone +39 051 4200210 (alt. +39 06 68620209) Fax +39 051 4200200 [email protected]
1 What Are Web Services?
Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1.6) E14294-06 November 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include:
Snow Agent System Pilot Deployment version
Pilot Deployment version Security policy Revision: 1.0 Authors: Per Atle Bakkevoll, Johan Gustav Bellika, Lars, Taridzo Chomutare Page 1 of 8 Date of issue 03.07.2009 Revision history: Issue Details Who
The Direct Project Reference Implementation Architecture
The Direct Project Reference Implementation Architecture 1 NwHIN Direct Approach Develop specifications for a secure, scalable, standardsbased way to establish universal health addressing and transport
April 2005. PGP White Paper. PGP Universal 2.0 Technical Overview
April 2005 PGP White Paper PGP Universal 2.0 Technical Overview 1 Table of Contents EXECUTIVE SUMMARY... 2 INTRODUCTION... 3 THE PGP ECOSYSTEM... 4 WHAT IS THE PGP ECOSYSTEM?... 4 PGP Global Directory...
FortiMail Email Filtering. Course 221 - for FortiMail v4.0. Course Overview
FortiMail Email Filtering Course 221 - for FortiMail v4.0 Course Overview FortiMail Email Filtering is a 3-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed
ebxml Web Services & EDI
ebxml Web Services & EDI XML Europe 2003 London 7 May 2003 Dale Waldt President, axtive Minds, Inc. Program Development, OASIS Who Am I? Currently Director, axtive Minds XML Training & Consulting [email protected]
IONA Security Platform
IONA Security Platform February 22, 2002 Igor Balabine, PhD IONA Security Architect Copyright IONA Technologies 2001 End 2 Anywhere Agenda IONA Security Platform (isp) architecture Integrating with Enterprise
AquaLogic Service Bus
AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership
SOA Software: Troubleshooting Guide for Agents
SOA Software: Troubleshooting Guide for Agents SOA Software Troubleshooting Guide for Agents 1.1 October, 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks SOA Software,
Christoph Bussler. B2B Integration. Concepts and Architecture. With 165 Figures and 4 Tables. IIIBibliothek. Springer
Christoph Bussler B2B Integration Concepts and Architecture With 165 Figures and 4 Tables IIIBibliothek Springer Contents Part I Introduction to Business-to-Business Integration.... 1 1 History 3 1.1 Why
PaperClip Incorporated 3/7/06; Rev 9/18/09. PaperClip Compliant Email Service Whitepaper
Incorporated 3/7/06; Rev 9/18/09 PaperClip Compliant Email Service Whitepaper Overview The FTC Safeguard Rules require Financial, Insurance and Medical providers to protect their customer s private information
Web Services Implementation: The Beta Phase of EPA Network Nodes
Web Services Implementation: The Beta Phase of EPA Network Nodes Connie Dwyer and Chris Clark U.S. Environmental Protection Agency, 1200 Pennsylvania Avenue, N. W., Washington, D.C. [email protected]
Foreign Account Tax Compliance Act (FATCA) IDES Implementation Update. April 2015
Foreign Account Tax Compliance Act (FATCA) IDES Implementation Update April 2015 IDES Implementation Developments 2 The IRS has made significant progress in developing and deploying technology capabilities
TIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
DEPLOYMENT ROADMAP March 2015
DEPLOYMENT ROADMAP March 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and may
Configure SecureZIP for Windows for Entrust Entelligence Security Provider 7.x for Windows
Configure SecureZIP for Windows for Entrust Entelligence Security Provider 7.x for Windows SecureZIP for Windows interoperates with leading PKI vendors including Entrust, VeriSign, and RSA to enable the
Configuring DoD PKI. High-level for installing DoD PKI trust points. Details for installing DoD PKI trust points
Configuring DoD PKI This document describes the procedures to configure an XML Firewall that is interoperable with the United Stated Department of Defense (DoD) Public Key Infrastructure (PKI). High-level
E-mail Listeners. E-mail Formats. Free Form. Formatted
E-mail Listeners 6 E-mail Formats You use the E-mail Listeners application to receive and process Service Requests and other types of tickets through e-mail in the form of e-mail messages. Using E- mail
Replacements TECHNICAL REFERENCE. DTCCSOLUTIONS Dec 2009. Copyright 2009 Depository Trust Clearing Corporation. All Rights Reserved.
TECHNICAL REFERENCE Replacements Page 1 Table of Contents Table of Contents 1 Overview... 3 1.1 Replacements Features... 3 2 Roles and Responsibilities... 4 2.1 Sender (Receiving Carrier)... 4 2.2 Recipient
Office Standardization. E-Mail Encryption Gateway. A Brief Guide for External Communication Partners.
Office Standardization. E-Mail Encryption Gateway. A Brief Guide for External Communication Partners. 1 A Brief Description of the Solution. All employees of Deutsche Telekom can use the E-Mail Encryption
Develop HIPAA-Compliant Mobile Apps with Verivo Akula
Develop HIPAA-Compliant Mobile Apps with Verivo Akula Verivo Software 1000 Winter Street Waltham MA 02451 781.795.8200 [email protected] Verivo Software 1000 Winter Street Waltham MA 02451 781.795.8200
GS1 Newcomers to AS2. Implementation Guide. Issue 1, 23-June-2008. GS1 Newcomers to AS2 Implementation Guide
GS1 Newcomers to AS2 Implementation Guide Issue 1, 23-June-2008 23-June-2008, Issue 1 All contents copyright GS1 2008 Page 1 of 14 Document Summary Document Item Document Title Date Last Modified Current
Table of Contents. Introduction. Audience. At Course Completion. Prerequisites. Microsoft Certified Professional Exams
Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This two-day instructor-led course provides
Ciphermail for Android Quick Start Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail for Android Quick Start Guide June 19, 2014, Rev: 5460 Copyright 2011-2014, ciphermail.com 3 CONFIGURATION WIZARD 1 Introduction This quick start guide helps you
Electronic Prescribing of Controlled Substances Technical Framework Panel. Mark Gingrich, RxHub LLC July 11, 2006
Electronic Prescribing of Controlled Substances Technical Framework Panel Mark Gingrich, RxHub LLC July 11, 2006 RxHub Overview Founded 2001 as nationwide, universal electronic information exchange Encompass
A Unified Messaging-Based Architectural Pattern for Building Scalable Enterprise Service Bus
A Unified Messaging-Based Architectural Pattern for Building Scalable Enterprise Service Bus Karim M. Mahmoud 1,2 1 IBM, Egypt Branch Pyramids Heights Office Park, Giza, Egypt [email protected] 2 Computer
000-284. Easy CramBible Lab DEMO ONLY VERSION 000-284. Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0
Easy CramBible Lab 000-284 Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0 ** Single-user License ** This copy can be only used by yourself for educational purposes Web: http://www.crambible.com/
2012 LABVANTAGE Solutions, Inc. All Rights Reserved.
LABVANTAGE Architecture 2012 LABVANTAGE Solutions, Inc. All Rights Reserved. DOCUMENT PURPOSE AND SCOPE This document provides an overview of the LABVANTAGE hardware and software architecture. It is written
Direct Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information
Direct Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information Within the healthcare industry, the exchange of protected health information (PHI) is governed by regulations
The Global Justice Reference Architecture (JRA) Web Services Service Interaction Profile
The Global Justice Reference Architecture (JRA) Web Services Service Interaction Profile V 1.1 by The Global Infrastructure/Standards Working Group August 1, 2007 Table of Contents Acknowledgements...
SSDG Operational Manual Draft version: 0.1. Operational Manual For SSDG
Operational Manual For SSDG 1 Table of Contents ABBREVIATIONS... 5 SECTION 1: INTRODUCTION... 6 1 INTRODUCTION... 7 1.1 INTENDED USER... 7 1.2 HOW TO USE... 7 1.3 ORGANIZATION OF THE MANUAL... 8 1.4 HELPDESK...
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
NIST s Guide to Secure Web Services
NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:
cipher: the algorithm or function used for encryption and decryption
! "# $ %& %'()! *,+ & -.! % %- / 0-1 2+ 34 576!! 8 9! ": ;
New Jersey Department of Health. Electronic Laboratory Reporting On-Boarding Manual. Version 1.4
New Jersey Department of Health On-Boarding Manual Version 1.4 Table of Contents 1. Introduction 3 1.1 Purpose 3 1.2 Scope 3 1.3 Definitions, Acronyms and Abbreviations 4 1.4 References 5 1.5 Overview
2014 IBM Corporation
2014 IBM Corporation This is the 27 th Q&A event prepared by the IBM License Metric Tool Central Team (ICT) Currently we focus on version 9.x of IBM License Metric Tool (ILMT) The content of today s session
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) VERSION 2.1 SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS 1 TABLE OF CONTENTS INTRODUCTION... 3 About The Service-Oriented Modeling Framework
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,
Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.
Configure the E-mail Router After the E-mail Router has been installed, you can configure several aspects of it. Some of these configuration tasks are mandatory. Others are optional in that you use them
HP Device Manager 4.7
Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...
FortiMail Email Filtering. Course 221 (for FortiMail v5.0) Course Overview
FortiMail Email Filtering Course 221 (for FortiMail v5.0) Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed
CERTIFIED MULESOFT DEVELOPER EXAM. Preparation Guide
CERTIFIED MULESOFT DEVELOPER EXAM Preparation Guide v. November, 2014 2 TABLE OF CONTENTS Table of Contents... 3 Preparation Guide Overview... 5 Guide Purpose... 5 General Preparation Recommendations...
Sophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
Secured email Enterprise eprivacy Suite
EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Secured email Enterprise eprivacy Suite JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS Secured email Enterprise eprivacy
A Signing Proxy for Web Services Security. Dr. Ingo Melzer RIC/ED
A Signing Proxy for Web Services Security Dr. Ingo Melzer RIC/ED What is a Web Service? Infrastructure Web Service I. Melzer -- A Signing Proxy for Web Services Security 2 What is a Web Service? basic
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
FortiMail Email Filtering. Course 221 (for FortiMail v4.2) Course Overview
FortiMail Email Filtering Course 221 (for FortiMail v4.2) Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
TCS-CA. Outlook Express Configuration [VERSION 1.0] U S E R G U I D E
U S E R G U I D E TCS-CA Outlook Express Configuration [VERSION 1.0] C O N T E N T S 1 DESCRIPTION... 3 2 OUTLOOK EXPRESS AND CERTIFICATES... 4 3 ENABLING SECURITY SETTINGS FOR MAIL ACCOUNT... 5 3.1 Settings
SOA REFERENCE ARCHITECTURE: SERVICE TIER
SOA REFERENCE ARCHITECTURE: SERVICE TIER SOA Blueprint A structured blog by Yogish Pai Service Tier The service tier is the primary enabler of the SOA and includes the components described in this section.
The Direct Project Overview
The Direct Project Overview October 11, 2010 Abstract: The Direct Project specifies a simple, secure, scalable, standards-based way for participants to send authenticated, encrypted health information
iq.suite Crypt - Server-based email encryption - Efficient email encryption for Lotus Domino
iq.suite Crypt - Server-based email encryption - Efficient email encryption for Lotus Domino Contents 1 Executive Summary... 2 2 Implementation in iq.suite Crypt... 2 2.1 PGP Implementation... 2 2.1.1
Adobe Developer Workshop Series
Adobe Developer Workshop Series Working with Security February 2005 San Francisco, California 2005 Adobe Systems Incorporated. All Rights Reserved. Agenda Introduction Overview of Intelligent Document
Zarafa S/MIME Webaccess Plugin User Manual. Client side configuration and usage.
Zarafa S/MIME Webaccess Plugin User Manual Client side configuration and usage. Zarafa S/MIME Webaccess plugin provides S/MIME functionality, for receiving and sending encrypted and / or sign messages
