Table 4.
Technologies and standards that can be leveraged in the development of a secure image-sharing infrastructure
Requirements | Available technology or standards | |
---|---|---|
Data transformation | De-identification | CTP DICOM anonymization |
Research identifier | IHE PIX | |
Privacy preserving transformation | application specific | |
Encryption | X509 certificate, XML encryption, and PGP | |
Signature | X509 certificate, XML signature, MD5/SHA1 sum | |
Honest broker | ||
Infrastructure | Policy management | XACML |
User identity management | LDAP, active directory, OpenID, caGrid Dorian | |
User role and attribute management | LDAP, active directory, caGrid GridGrouper | |
Authentication | SAML, WS-Trust, DICOM, caGid Dorian | |
Audit log management | IHE ATNA schema | |
Trust management | caGrid grid trust service | |
Data access and movement | Authorization | SAML, OAuth |
Delegation | caGrid certificate delegation service | |
Audit logging | IHE ATNA profile | |
Non-repudiation | ||
Transmission protection | WS-Security, HTTPS |