DICOM PS3.15 2024e - Security and System Management Profiles |
---|
For the purposes of this Standard the following definitions apply.
This Part of the Standard makes use of the following terms defined in [ISO 7498-1]:
See [ISO 7498-1].
See [ISO 7498-1].
See [ISO 7498-1].
This Part of the Standard makes use of the following terms defined in [ISO 7498-2]:
See [ISO 7498-2].
See [ISO 7498-2].
See [ISO 7498-2].
See [ISO 7498-2].
See [ISO 7498-2].
This Part of the Standard makes use of the following terms defined in [ISO 8649]:
See [ISO 8649].
This Part of the Standard makes use of the following terms defined in [ECMA 235]:
See [ECMA 235].
This Part of the Standard makes use of the following terms defined in PS3.1:
This Part of the Standard makes use of the following terms defined in PS3.2:
This Part of the Standard makes use of the following terms defined in PS3.3:
This Part of the Standard makes use of the following terms defined in PS3.4:
This Part of the Standard makes use of the following terms defined in PS3.8:
The following definitions are commonly used in this Part of the DICOM Standard:
A Transport Connection that provides some level of protection against tampering, eavesdropping, masquerading.
A digest or hash code derived from a subset of Data Elements.
An electronic document that identifies a party and that party's public encryption algorithm, parameters, and key. The Certificate also includes, among other things, the identity and a digital signature from the entity that created the certificate. The content and format of a Certificate are defined by ITU-T Recommendation X.509.
This Part of the Standard makes use of the following terms defined in PS3.5:
DICOM PS3.15 2024e - Security and System Management Profiles |
---|