ASTM E1985 - 98(2013) Standard Guide for User Authentication and Authorization (Withdrawn 2017).pdf
《ASTM E1985 - 98(2013) Standard Guide for User Authentication and Authorization (Withdrawn 2017).pdf》由会员分享,可在线阅读,更多相关《ASTM E1985 - 98(2013) Standard Guide for User Authentication and Authorization (Withdrawn 2017).pdf(5页珍藏版)》请在麦多课文档分享上搜索。
1、Designation: E1985 98 (Reapproved 2013) An American National StandardStandard Guide forUser Authentication and Authorization1This standard is issued under the fixed designation E1985; the number immediately following the designation indicates the year oforiginal adoption or, in the case of revision,
2、 the year of last revision. A number in parentheses indicates the year of last reapproval. Asuperscript epsilon () indicates an editorial change since the last revision or reapproval.1. Scope1.1 This guide covers mechanisms that may be used toauthenticate healthcare information (both administrative
3、andclinical) users to computer systems, as well as mechanisms toauthorize particular actions by users. These actions mayinclude access to healthcare information documents, as well asspecific operations on those documents (for example, reviewby a physician).1.2 This guide addresses both centralized a
4、nd distributedenvironments, by defining the requirements that a singlesystem shall meet and the kinds of information which shall betransmitted between systems to provide distributed authentica-tion and authorization services.1.3 This guide addresses the technical specifications forhow to perform use
5、r authentication and authorization. Theactual definition of who can access what is based on organi-zational policy.2. Referenced Documents2.1 ASTM Standards:2E1762 Guide for Electronic Authentication of Health CareInformationPS100 Provisional Specification for Authentication ofHealthcare Information
6、 Using Digital Signatures2.2 ANSI Standard:X9.45 Enhanced Management Controls Using Digital Sig-natures and Attribute Certificates32.3 Other Standards:ECMA1-219 Authentication and PrivilegeAttribute SecurityApplications with Related Key Distribution Functions4FIPS PUB 112 Password Usage53. Terminolo
7、gy3.1 Definitions:3.1.1 access control lista piece of access controlinformation, associated with a target, that specifies the initia-tors who may access the target.3.1.2 capabilitya piece of access control information,associated with an initiator, which authorizes the holder toaccess some target.3.1
8、.3 claimantparty requesting authentication; may be aperson or a device.3.1.4 initiatoran entity (for example, a user) who requestsaccess to some object.3.1.5 principallegitimate owner of an identity.3.1.6 security labelaccess control information bound toinitiators and targets. The initiator and targ
9、et labels are com-pared to determine if access is allowed.3.1.7 targetan entity (for example, a file or document) thatmay be accessed by an initiator.3.1.8 verifieranother party seeking to authenticate princi-pal.3.2 Acronyms:3.2.1 ACIAccess Control Information3.2.2 ACLAccess Control List3.2.3 ADFAc
10、cess Control Decision Function3.2.4 ADIAccess Control Decision Information3.2.5 AEFAccess Control Enforcement Function3.2.6 PINPersonal Identification Number4. Significance and Use4.1 This guide has three purposes:4.1.1 To serve as a guide for developers of computersoftware that provides or makes us
11、e of authentication andauthorization processes,4.1.2 To serve as a guide to healthcare providers who areimplementing authentication and authorization mechanisms,and1This guide is under the jurisdiction of ASTM Committee E31 on HealthcareInformatics and is the direct responsibility of Subcommittee E3
12、1.25 on HealthcareData Management, Security, Confidentiality, and Privacy.Current edition approved March 1, 2013. Published March 2013. Originallyapproved in 1998. Last previous edition approved in 2005 as E1985 98(2005).DOI: 10.1520/E1985-98R13.2For referenced ASTM standards, visit the ASTM website
13、, www.astm.org, orcontact ASTM Customer Service at serviceastm.org. For Annual Book of ASTMStandards volume information, refer to the standards Document Summary page onthe ASTM website.3Available from American National Standards Institute, 11 W. 42nd St., 13thFloor, New York, NY 10036.4Available fro
14、m ECMA International, Rue du Rhone 114, CH, 1204, Geneva.5Available from National Technical Information Service, U.S. Department ofCommerce, Springfield, VA. http:/csrc.nist.gov or www.ntis.gov.Copyright ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959. United
15、 StatesNOTICE: This standard has either been superseded and replaced by a new version or withdrawn.Contact ASTM International (www.astm.org) for the latest information14.1.3 To be a consensus standard on the design,implementation, and use of authentication and authorizationmechanisms.4.2 Additional
16、standards will define interoperable protocolsand message formats that can be used to implement thesemechanisms in a distributed environment, using specific com-mercial technologies such as digital signatures.5. User Authentication5.1 Authentication ensures the identity of a user. Thelegitimate owner
17、 of an identity is known as a principal.Authentication occurs when a claimant has presented a prin-cipals identity and claims to be that principal. Authenticationallows the other party (verifier) to verify that the claim islegitimate.5.2 Requirements:5.2.1 Users shall be authenticated for access to
18、healthinformation.5.2.2 Users may be authenticated at the system, subsystem,application, or medical record level.5.2.3 Users shall be authenticated by one or more of thefollowing methods based on organizational policy:5.2.3.1 Claimant demonstrates knowledge of a password, orthe like,5.2.3.2 Claimant
19、 demonstrates possession of a token, orsomething similar,5.2.3.3 Claimant exhibits some physical characteristic, likea fingerprint, and5.2.3.4 Cryptographic techniques.5.2.4 Remote access to health information shall be mutuallyauthenticated.5.2.5 Determination of which method or methods to use forau
20、thentication shall be based on a risk assessment and organi-zational policy.5.2.6 For accountability purposes, authentication shall bebased upon an individual principal rather than upon a role.5.3 Knowledge:5.3.1 Password or Personal Identification Number:5.3.1.1 In any environment, a user can be au
21、thenticatedusing a password or a personal identification number (PIN).The claimant shall enter a password or PIN for authenticationpurposes. The verifier shall then verify the password or PIN ofthe claimant.5.3.1.2 The password or PIN shall be protected againstdisclosure. For guidelines on password
22、generation and usagesee FIPS PUB 112.5.3.1.3 In a multiple system environment, a single passwordor PIN may be used for authentication.5.3.2 Challenge-ResponsePassword or PIN-basedschemes may be augmented by the challenge-response mecha-nism. In challenge-response, as part of the authenticationprotoc
23、ol, the verifier sends the claimant a non-repeating value(challenge) in advance. The claimant sends a response to theverifier based on the challenge.5.4 Possession:5.4.1 The user or claimant shows possession by presentinga physical object or token that is unique to the principal orclaimant. The toke
24、n shall contain information unique to theprincipal or claimant. The claimant shall present the token asproof of identity. A password or PIN may be used to accessinformation on token. The verifier shall then verify the token ofthe claimant.5.4.2 The information shall be protected against duplicationo
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ASTM E1985 98 2013 Standard Guide for User Authentication and Authorization Withdrawn 2017

链接地址:http://www.mydoc123.com/p-287060.html