1.1 This guide covers mechanisms that may be used to authenticate healthcare information (both administrative and clinical) users to computer systems, as well as mechanisms to authorize particular actions by users. These actions may include access to healthcare information documents, as well as specific operations on those documents (for example, review by a physician).
Product Details
- Published:
- 03/01/2013
- Number of Pages:
- 5
- File Size:
- 1 file , 72 KB