HL7 (Health Level 7) is een internationale standaard voor elektronische uitwisseling van medische, financiële en administratieve gegevens tussen zorginformatiesystemen. De standaard wordt gedefinieerd door de gelijknamige organisatie.
De Internet Engineering Task Force (IETF) is een internationale gemeenschap van netwerkontwerpers, - operators, -leveranciers en -onderzoekers die zich bezighoudt met de evolutie van de internetarchitectuur en de soepele werking van het internet. Deelname staat open voor alle geïnteresseerden. Op het technische niveau en met betrekking tot ontwikkeling, bestaat het internet bij de gratie van ontwerp, testen en implementatie van internetstandaarden. Deze standaarden worden ontwikkeld door het IETF.
...
Referentie | Omschrijving | Document | Bron |
---|---|---|---|
FHIR REST API | HL7 FHIR RESTful API | http://www.hl7.org/fhir/http.html | |
RFC2616 | HTTPv1.1 | Hypertext Transfer Protocol -- HTTP/1.1 | https://tools.ietf.org/html/rfc2616 |
RFC2617 | HTTP Authentication (Basic and Digest) | HTTP Authentication (Basic and Digest) | https://tools.ietf.org/html/rfc2617 |
RFC4122 | UUID URN Namespace | A Universally Unique IDentifier (UUID) URN Namespace. P. Leach; M. Mealling; R. Salz. IETF. July 2005. | https://tools.ietf.org/html/rfc4122 |
RFC5246 | TLS v1.2 | The Transport Layer Security Protocol, V1.2 | https://tools.ietf.org/html/rfc5246 |
RFC6749 | OAuth 2.0 Framework | The OAuth 2.0 Authorization Framework. D. Hardt, Ed.. IETF. October 2012. | https://tools.ietf.org/html/rfc6749 |
RFC6750 | Bearer Token Usage | The OAuth 2.0 Authorization Framework: Bearer Token Usage. M. Jones; D. Hardt. IETF. October 2012 | https://tools.ietf.org/html/rfc6750 |
RFC6755 | URN Sub-Namespace for OAuth | URN Sub-namespace for use with OAuth-related specifications. Otober 2012 | https://tools.ietf.org/html/rfc6755 |
RFC6819 | Threat Model and Security Considerations | Additional security considerations for OAuth, beyond those in the OAuth 2.0 specification, based on a comprehensive threat model for the OAuth 2.0 protocol. January 2013 | https://tools.ietf.org/html/rfc6819 https://tools.ietf.org/html/draft-ietf-oauth-v2-threatmodel-08 |
RFC7235 | Autorization Headers | Hypertext Transfer Protocol (HTTP/1.1): Authentication | |
RFC7009 | Token Revocation | August 2013 | https://tools.ietf.org/html/rfc7009 |
RFC7662 | Token Introspection | Oktober 2015 | https://tools.ietf.org/html/rfc7662 |
RFC7515 | JSON Web Signature (JWS) | JSON Web Token (JWT). M. Jones; J. Bradley; N. Sakimura. IETF. May 2015. | https://tools.ietf.org/html/rfc7515 |
RFC7516 | JSON Web Encryption (JWE) | Web Encryption (JWE). M. Jones. IETF. May 2015 | https://tools.ietf.org/html/rfc7516 |
RFC7517 | JSON Web Key (JWK) | JSON Web Key (JWK). M. Jones. IETF. May 2015 | https://tools.ietf.org/html/rfc7517 |
RFC7518 | JSON Web Algorithms | https://tools.ietf.org/html/rfc7518 | |
RFC7519 | JSON Web Token (JWT) | JSON Web Token (JWT). M. Jones; J. Bradley; N. Sakimura. IETF. May 2015. | https://tools.ietf.org/html/rfc7519 |
RFC7521 | Assertion Framework | Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants | https://tools.ietf.org/html/rfc7521 |
RFC7522 | SAML2.0 Profile for OAuth 2.0 Client Authentication and Authorization Grants | Defines the use of a SAML2.0 Bearer Assertion as a means for requesting an OAuth2.0 access token as well as for client authentication. May 2015 | https://tools.ietf.org/html/rfc7522 |
RFC7523 | JWT profielen voor OAuth 2.0 | JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants. M. Jones; B. Campbell; C. Mortimore. IETF. May 2015. | https://tools.ietf.org/html/rfc7523 |
RFC7636 | Proof Key for Code Exchange | Proof Key for Code Exchange by OAuth Public Clients. September 2015 | https://tools.ietf.org/html/rfc7636 |
DRAFT-JWSREQ | OAuth JAR | JWT Secured Authorization Request (draft) | https://tools.ietf.org/html/draft-ietf-oauth-jwsreq-30 |
RFC8628 | OAuth 2.0 Device Grant | OAuth 2.0 Device Authorization Grant. August 2019 | https://tools.ietf.org/html/rfc8628 |
RFC8705 | Mutual TLS Client Authentication and Certificate-Bound Access Tokens | OAuth 2.0 Mutual TLS Client Authentication and Certificate-Bound Access Tokens. February 2020 | https://tools.ietf.org/html/rfc8705 |
OpenID Connect | OpenID Core | OpenID Connect Core 1.0. N. Sakimura, J. Bradley, M. Jones, B. de Medeiros, C. Mortimore. OpenID | |
RFC7591 | Dynamic Client Registration | OAuth 2.0 Dynamic Client Registration Protocol. July 2015 | https://tools.ietf.org/html/rfc7591 |
RFC7592 | Dynamic Client Registration Management | OAuth 2.0 Dynamic Client Registration Management Protocol. July 2015 | https://tools.ietf.org/html/rfc7592 |
RFC7662 | OAuth 2.0 Token Introspection | Defines a method for a protected resource to query an OAuth 2.0 authorization server to determine the active state of an OAuth 2.0 token and to determine meta-information about this token. Oktober 2015 | https://tools.ietf.org/html/rfc7662 |
RFC7800 | Proof of Possion JWT | How to declare in a JSON Web Token (JWT) that the presenter of the JWT possesses a particular proof-of-possession key and how the recipient can cryptographically confirm proof of possession of the key by the presenter.April 2016 | https://tools.ietf.org/html/rfc7800 |
RFC8252 | OAuth 2.0 for Native Apps | OAuth 2.0 authorization requests from native apps should only be made through external user-agents, primarily the user's browser. Oktober 2017 | https://tools.ietf.org/html/rfc8252 |
RFC8414 | OAuth 2.0 Authorization Server Metadata | Defines a metadata format that an OAuth 2.0 client can use to obtain the information needed to interact with an OAuth 2.0 authorization server. June 2018 | https://tools.ietf.org/html/rfc8414 |
Dynamic Client Registration | OpenID Connect Dynamic Client Registration | OpenID Connect Dynamic Client Registration 1.0 incorporating errata set 1 | https://openid.net/specs/openid-connect-registration-1_0.html |
Richtlijnen TLS | ICT-beveiligingsrichtlijnen voor Transport Layer Security (TLS) | ICT-beveiligingsrichtlijnen voor Transport Layer Security v2 | https://www.ncsc.nl/binaries/ncsc/documenten/publicaties/2019/mei/01/ict-beveiligingsrichtlijnen-voor-transport-layer-security-tls/ICT-beveiligingsrichtlijnen-voor-Transport-Layer-Security-v2.pdf |
Richtlijnen Webapplicaties | ICT-beveiligingsrichtlijnen voor webapplicaties | ICT-Beveiligingsrichtlijnen voor Webapplicaties | https://www.ncsc.nl/binaries/ncsc/documenten/publicaties/2019/mei/01/ict-beveiligingsrichtlijnen-voor-webapplicaties/ICT-Beveiligingsrichtlijnen-voor-Webapplicaties-Richtlijnen-Leesversie.pdf |
...