Skip to Main Content
Information Security Management Handbook, Volume 7, 6th Edition
book

Information Security Management Handbook, Volume 7, 6th Edition

by Richard O'Hanley, James S. Tiller
August 2013
Intermediate to advanced content levelIntermediate to advanced
434 pages
15h 17m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 7, 6th Edition
262 ◾  Information Security Management Handbook
2. Individuals engaged in an electronic transaction
3. Subjects of the transaction
4. Identity providers responsible for establishing, maintaining, and securing the subject’s
identity
In an HIE, the trust-marked organizations are the HIOs that have complied with the overarch-
ing set of interoperability standards, risk models, privacy and liability policies, requirements, and
accountability mechanisms of the HIE (Baker, 2011). e individuals are the participating HIO’s
HIE users (e.g., physicians) and the subjects are the patients who have consented to participate in
the HIE. e voluntary UPI (VUPI) is the digital identity assigned by the HIE’s identity provider.
An identity provider would be re ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 5, 6th Edition

Information Security Management Handbook, Volume 5, 6th Edition

Micki Krause Nozaki, Harold F. Tipton
Information Security for Managers

Information Security for Managers

Michael Workman, Daniel C. Phelps, John N. Gathegi

Publisher Resources

ISBN: 9781466567498