Welcome!

Search Authors: Shelly Palmer, Max Katz, Sandi Mappic, Jnan Dash, Alex Forbes

Blog Feed Post

Personal Cloud EMR – Matching Google Cloud ID to Cloud End Points

For our upcoming seminar, a key theme will be “Matching Google Cloud ID to Cloud End Points” – By this I mean a focus on two different technology areas discussed on this blog, notably Google Cloud Identity and also Google Cloud End Points.

We’re very lucky to be hosting Mark Lapasa as the presenter on End Points, which he also recently gave to the Google Developers group. See his slides here.

I will now be presenting on both Google Cloud Identity, and also ZenVault, as unfortunately their speaker has run aground on some travel issues.

Actually for the Google Cloud ID piece I am also mainly repeating another presentation as well, in this case one from Liam Lynch, the COO of an exciting new Cloud startup called Cloudiosphere.

When we say”Google Cloud Identity”, here is a good starting point:

Google Cloud Identity: Federated Login for Google Account Users

“The Google OpenID Connect Demo provides a step by step guide to OpenID Connect and Nat Sakimara’s Dummy’s guide for the Difference between OAuth Authentication and OpenID is a good explanation of how OpenID Connect complements OAuth2. A separate specification entitled Binding Obligations on User-Managed Access (UMA) Participants proposes a legal framework that defines the obligations of parties that operate and use UMA-conforming software programs and services.

This is cut and paste from the blog that describes what we are trying to achieve, “Patient Privacy at Web Scale.

zenvault1

Personal Cloud EMR

Here is the slidedeck for the ZenVault General Brief v3.0 (25-page PDF).

ZenVault is what can be described as a “Personal Cloud” Application – Where the fundamental dynamic is YOU host and own your own personal data. This is how the ‘web scale’ part is achieved.

The traditional EMR model is that the hospital or some other healthcare authority runs an off-the-shelf package for this purpose. For various reasons these often face and fail significant adoption challenges, whereas the Personal Cloud model is entirely user-centric and suitable for an iPhone Generation.

This session will look at how these preferences you want to express are controlled through Identity methods like encryption and consent management, and the opportunities this trend presents for potential software entrepreneurs.


Read the original blog entry...

More Stories By Cloud Ventures

The Cloud Ventures Network is an expert community of leading Cloud pioneers. Follow our best practice blogs at http://CloudBestPractices.net