PS3.15​ DICOM PS3.15 2021D - Security and System​ Management Profiles​ Page 2​

PS3.15​ DICOM PS3.15 2021D - Security and System​ Management Profiles​ Page 2​

PS3.15​ DICOM PS3.15 2021d - Security and System​ Management Profiles​ Page 2​ PS3.15: DICOM PS3.15 2021d - Security and System Management Profiles​ Copyright © 2021 NEMA​ A DICOM® publication​ - Standard -​ DICOM PS3.15 2021d - Security and System Management Profiles​ Page 3​ Table of Contents​ Notice and Disclaimer ........................................................................................................................................... 11​ Foreword ............................................................................................................................................................ 13​ 1. Scope and Field of Application ............................................................................................................................. 15​ 1.1. Security Policies and Mechanisms ................................................................................................................. 15​ 1.2. System Management Profiles ........................................................................................................................ 15​ 2. Normative References ....................................................................................................................................... 17​ 3. Definitions ....................................................................................................................................................... 21​ 4. Symbols and Abbreviations ................................................................................................................................. 25​ 5. Conventions ..................................................................................................................................................... 27​ 6. Security and System Management Profile Outlines .................................................................................................. 29​ 6.1. Secure Use Profiles .................................................................................................................................... 29​ 6.2. Secure Transport Connection Profiles ............................................................................................................. 29​ 6.3. Digital Signature Profile ............................................................................................................................... 29​ 6.4. Media Storage Security Profiles ..................................................................................................................... 30​ 6.5. Network Address Management Profiles ........................................................................................................... 30​ 6.6. Time Synchronization Profiles ....................................................................................................................... 30​ 6.7. Application Configuration Management Profiles ................................................................................................ 30​ 6.8. Audit Trail Profiles ...................................................................................................................................... 31​ 7. Configuration Profiles ......................................................................................................................................... 33​ 7.1. Actors ...................................................................................................................................................... 33​ 7.2. Transactions .............................................................................................................................................. 34​ A. Secure Use Profiles (Normative) .......................................................................................................................... 37​ A.1. Online Electronic Storage Secure Use Profile ................................................................................................... 37​ A.1.1. SOP Instance Status ............................................................................................................................ 37​ A.2. Basic Digital Signatures Secure Use Profile ..................................................................................................... 38​ A.3. Bit-preserving Digital Signatures Secure Use Profile .......................................................................................... 39​ A.4. Basic SR Digital Signatures Secure Use Profile ................................................................................................ 39​ A.5. Audit Trail Message Format Profile ................................................................................................................ 39​ A.5.1. DICOM Audit Message Schema ............................................................................................................. 40​ A.5.1.1. Audit Message Schema .................................................................................................................. 40​ A.5.1.2. Codes Used Within The Schema ...................................................................................................... 44​ A.5.1.2.1. Audit Source Type Code .......................................................................................................... 44​ A.5.1.2.2. Participant Object Type Code Role ............................................................................................. 44​ A.5.1.2.3. Participant Object Data Life Cycle .............................................................................................. 45​ A.5.1.2.4. Participant Object ID Type Code ................................................................................................ 46​ A.5.2. General Message Format Conventions .................................................................................................... 46​ A.5.2.1. UserID ........................................................................................................................................ 50​ A.5.2.2. AlternativeUserID .......................................................................................................................... 50​ A.5.2.3. Username .................................................................................................................................... 51​ A.5.2.4. Multi-homed Nodes ....................................................................................................................... 51​ A.5.2.5. EventDateTime ............................................................................................................................. 51​ A.5.2.6. ParticipantObjectTypeCodeRole ....................................................................................................... 51​ A.5.3. DICOM Specific Audit Messages ............................................................................................................ 52​ A.5.3.1. Application Activity ........................................................................................................................ 53​ A.5.3.2. Audit Log Used ............................................................................................................................. 53​ A.5.3.3. Begin Transferring DICOM Instances ................................................................................................ 54​ A.5.3.4. Data Export .................................................................................................................................. 56​ A.5.3.4.1. UserIsRequestor .................................................................................................................... 58​ A.5.3.5. Data Import .................................................................................................................................. 58​ A.5.3.6. DICOM Instances Accessed ............................................................................................................ 60​ A.5.3.7. DICOM Instances Transferred ......................................................................................................... 61​ A.5.3.8. DICOM Study Deleted .................................................................................................................... 63​ A.5.3.9. Network Entry ............................................................................................................................... 64​ A.5.3.10. Query ........................................................................................................................................ 65​ A.5.3.11. Security Alert .............................................................................................................................. 66​ A.5.3.12. User Authentication ...................................................................................................................... 68​ A.5.3.13. Order Record .............................................................................................................................. 69​ - Standard -​ Page 4​ DICOM PS3.15 2021d - Security and System Management Profiles​ A.5.3.14. Patient Record ............................................................................................................................ 70​ A.5.3.15. Procedure Record ....................................................................................................................... 71​ A.6. Audit Trail Message Transmission Profile - SYSLOG-TLS

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    178 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us