HL7 Terminology (THO)
5.4.0 - Continuous Process Integration (ci build) International flag

HL7 Terminology (THO) - Local Development build (v5.4.0) built by the FHIR (HL7® FHIR® Standard) Build Tools. See the Directory of published versions

ValueSet: Communication Security Mode

Official URL: http://terminology.hl7.org/ValueSet/communication-security-mode Version: 1.0.0
Draft as of 2020-02-24 Maturity Level: 2 Responsible: Health Level Seven International Computable Name: Communication Security Mode

Copyright/Legal: This material derives from the HL7 Terminology THO. THO is copyright ©1989+ Health Level Seven International and is made available under the CC0 designation. For more licensing information see: https://terminology.hl7.org/license

This value set defines a set of codes that can be used to describe how a digital certificate is used. The sign code ensures data integrity by digitally signing information, verifying the author and confirming that the data has not been altered. The encrypt code protects confidentiality by encrypting data, ensuring that only authorized parties can access the information. The authentication code verifies the identity of entities involved in the communication, providing assurance that the claimed identity is accurate. Together, these codes form a comprehensive framework for secure and trustworthy data exchange.

References

This value set is not used here; it may be used elsewhere (e.g. specifications and/or implementations that use this content)

Logical Definition (CLD)

Generated Narrative: ValueSet communication-security-mode

Last updated: 2020-02-24 12:41:39+1100

Profile: Shareable ValueSet

 

Expansion

Generated Narrative: ValueSet

Last updated: 2020-02-24 12:41:39+1100

Profile: Shareable ValueSet

Expansion based on codesystem Communication Security Mode v1.0.0 (CodeSystem)

This value set contains 3 concepts

CodeSystemDisplayDefinition
  signhttp://terminology.hl7.org/CodeSystem/communication-security-modeSign

A signature-based security mode ensures data integrity by digitally signing information. This process verifies the author's identity and guarantees that the content has not been altered or corrupted since its signing, using a cryptographic hash.

  encrypthttp://terminology.hl7.org/CodeSystem/communication-security-modeEncrypt

An encryption-based security mode is used to secure communications by encrypting data. It involves a public key that can encrypt or decrypt electronic messages, files, documents, or data transmissions, or establish and exchange a session key for these purposes.

  authhttp://terminology.hl7.org/CodeSystem/communication-security-modeAuthentication

An authentication security mode is used to verify and ensure the accuracy of an entity's claimed identity.


Explanation of the columns that may appear on this page:

Level A few code lists that FHIR defines are hierarchical - each code is assigned a level. In this scheme, some codes are under other codes, and imply that the code they are under also applies
System The source of the definition of the code (when the value set draws in codes defined elsewhere)
Code The code (used as the code in the resource instance)
Display The display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application
Definition An explanation of the meaning of the concept
Comments Additional notes about how to use the code