FHIR Security and Privacy - tutorial outline
Healthcare Exchange Standards
MARCH 4, 2016
These tags are used in an "Attribute Based Access Control" scheme. That is to say that an Access Control engine will use these meta tags to inform the decision that it makes; and can place tags into meta to inform any downstream Access Control engine (decision or enforcement).
Let's personalize your content