The Audit Trail and Node Authentication (ATNA) Integration Profile is part if the IHE IT Infrastructure technical framework.
It describes the security environment (user identification, authentication, authorization, access control, etc.) assumed for the node so that security reviewers may decide whether this matches their environments.
It defines basic auditing requirements for the node.
It defines basic security requirements for the communications of the node using TLS or equivalent functionality.
It establishes the characteristics of the communication of audit messages between the Basic Secure Nodes and Audit Repository nodes that collect audit information.
It defines a Secure Application actor for describing product configurations that are not able to meet all of the requirements of a Secure Node.
The Audit Trail and Node Authentication (ATNA) Integration Profile establishes security measures which, together with the Security Policy and Procedures, provide patient information confidentiality, data integrity and user accountability.
Assistance to sites in implementing security and confidentiality policies.
The Audit Trail and Node Authentication (ATNA) Integration Profile
contributes to access control by limiting network access between nodes and limiting access to each node to authorized users. Network communications between secure nodes in a secure domain are restricted to only other secure nodes in that domain. Secure nodes limit access to authorized users as specified by the local authentication and access control policy.
The Audit Trail and Node Authentication Integration Profile requires only local user authentication. The profile allows each secure node to use the access control technology of its choice to authenticate users. The use of Enterprise User Authentication is one such choice, but it is not necessary to use this profile.
The Audit Trail and Node Authentication Integration Profile requires the use of bi-directional certificate-based node authentication for connections to and from each node. The DICOM, HL7, and HTML protocols all have certificate-based authentication mechanisms defined. These authenticate the nodes, rather than the user. Connections to these machines that are not bi-directionally node-authenticated shall either be prohibited, or be designed and verified to prevent access to PHI.
User Accountability is provided through Audit Trail. The Audit Trail needs to allow a security officer in an institution to audit activities, to assess compliance with a secure domain’s policies, to detect instances of non-compliant behavior, and to facilitate detection of improper creation, access, modification and deletion of Protected Health Information (PHI).
IntelliSense: #error directive: Please use the /MD switch for _AFXDLL builds
c:\program files (x86)\microsoft visual studio 10.0\vc\atlmfc\include\afxver_.h81
#if defined(_AFXDLL) && !defined(_DLL)
#error Please use the /MD switch for _AFXDLL builds
1. Right-click the Project. 2. Go to Config Properties->C/C++-> Code Gen ->. Double-click "Runtime Library" and set to "Multi-threaded Debug DLL (/MDd)" . If this value already appears to be set, make sure it is by selecting it again (it should then appear as bold). 3. Click OK.
=> 프로젝트속성 > c,c++ > code gen > Runtime library-Multi Debug DLL (BOLD) //다른옵션 선택후 다시 선택.