Skip to main content
editorial
. 2012 Jun 8;25(6):692–702. doi: 10.1007/s10278-012-9493-3

Table 4.

Technologies and standards that can be leveraged in the development of a secure image-sharing infrastructure

Requirements Available technology or standards
Data transformation De-identification CTP DICOM anonymization
Research identifier IHE PIX
Privacy preserving transformation application specific
Encryption X509 certificate, XML encryption, and PGP
Signature X509 certificate, XML signature, MD5/SHA1 sum
Honest broker
Infrastructure Policy management XACML
User identity management LDAP, active directory, OpenID, caGrid Dorian
User role and attribute management LDAP, active directory, caGrid GridGrouper
Authentication SAML, WS-Trust, DICOM, caGid Dorian
Audit log management IHE ATNA schema
Trust management caGrid grid trust service
Data access and movement Authorization SAML, OAuth
Delegation caGrid certificate delegation service
Audit logging IHE ATNA profile
Non-repudiation
Transmission protection WS-Security, HTTPS