中文字幕大香视频蕉免费,天码AV无码一区二区三区四区

亚洲午夜网_国产美女精品中文网蜜芽宝贝_亚洲国产福利成人一区_免费无码av片在线观看中文_国产高清在线精品一本大道

  • <ul id="es8aa"></ul>
  • <ul id="es8aa"></ul>
    <strike id="es8aa"></strike>
    <tbody id="es8aa"><dd id="es8aa"></dd></tbody>

    獲得積分
    資料庫(kù)會(huì)員登錄
    搜索: [高級(jí)搜索]
    下載首頁(yè) | 資源分類 | 下載排行
    您的位置: 首頁(yè) > 標(biāo)準(zhǔn)文檔  > HL7及CDA
     
    分類導(dǎo)航
    下載排行
    最新資源
    hl7_ccow_arch_cm_1_4.pdf
    資源大小: 資源類型:文檔
    下載積分: 0
    更多
    -->
    下載統(tǒng)計(jì):總下載:0,本月下載:0,本周下載:0,今日下載:0
    發(fā)表評(píng)論 錯(cuò)誤報(bào)告 加入收藏夾
    資源介紹
    hl7 1.4 標(biāo)志英文完整版
    Table of Contents
    1 INTRODUCTION...............................................................................................................................19
    1.1 Clinical Context ............................................................................................................................19
    1.2 Links and Subjects ........................................................................................................................19
    1.3 Annotations and actions ................................................................................................................20
    1.4 Architecture Summary ..................................................................................................................20
    1.4.1 Component Architecture .......................................................................................................21
    1.4.2 Context Organization and Representation.............................................................................23
    1.4.3 Application Authentication ...................................................................................................23
    1.4.4 Context Transactions.............................................................................................................23
    1.4.5 Context Actions ....................................................................................................................24
    1.4.6 Context Agents......................................................................................................................24
    1.4.6.1 Mapping Agents................................................................................................................25
    1.4.6.2 Annotation Agents ............................................................................................................25
    1.4.6.3 Action Agents ...................................................................................................................25
    1.5 Reading This Document................................................................................................................25
    2 SCOPE AND OBJECTIVES................................................................................................................27
    2.1 Specification Organization............................................................................................................27
    2.2 Assumptions/Assertions................................................................................................................28
    2.3 CMA Design Center .....................................................................................................................29
    3 TECHNOLOGY NEUTRALITY.........................................................................................................31
    4 REQUIREMENTS AND CAPABILITIES ..........................................................................................33
    5 SYSTEM ARCHITECTURE ...............................................................................................................35
    5.1 Use-Model ...................................................................................................................................35
    5.2 Context Management Responsibility ............................................................................................43
    Technology and Subject-Independent Component Architecture, Version 1.4
    Page 4 HL7 Context Management Standard: Technology and Subject-Independent Component
    Architecture, Version 1.4, January 2002. All rights reserved.
    5.3 Context Change Detection ............................................................................................................43
    5.4 Context Data Representation ........................................................................................................44
    5.5 Context Data Access .....................................................................................................................44
    5.6 Context Data Interpretation...........................................................................................................45
    5.6.1 Context Subject Data Definition Constraints ........................................................................46
    5.6.2 Establishing the Meaning of Context Data Item Names .......................................................46
    5.6.3 Establishing the Meaning of Context Data Item Values .......................................................46
    5.6.4 Representing Context Subjects That Cannot Be Uniquely Identified ...................................47
    5.6.5 Context Subjects and Item Name Format .............................................................................47
    5.6.6 Standard Context Subjects and Data Items ...........................................................................47
    5.6.7 Non-Standard Context Subjects and Data Items ...................................................................47
    5.6.8 Representing “Null” Item Values..........................................................................................48
    5.6.9 Representing an Empty Context Subject...............................................................................48
    5.6.10 Case Sensitivity with Regard to Item Names and Item Values.............................................48
    6 COMPONENT MODEL ......................................................................................................................51
    6.1 Component and Interface Concepts ..............................................................................................51
    6.1.1 Interfaces and References .....................................................................................................51
    6.1.2 Interface Interrogation...........................................................................................................52
    6.1.3 Principal Interface .................................................................................................................52
    6.1.4 Context Management Registry..............................................................................................52
    6.1.5 Interface Reference Management .........................................................................................53
    7 CONTEXT SESSION MANAGEMENT.............................................................................................55
    7.1 Context Session Defined...............................................................................................................55
    7.2 Context Session Use Models.........................................................................................................56
    7.2.1 Shared Clinical Workstation .................................................................................................56
    7.2.2 Interrupt-Driven User............................................................................................................56
    7.3 Theory of Operation......................................................................................................................56
    7.4 Context Session Management Policies .........................................................................................57
    7.4.1 Creating a Context Session ...................................................................................................57
    7.4.2 Cloning Context Data............................................................................................................57
    Technology and Subject-Independent Component Architecture, Version 1.4
    HL7 Context Management Standard: Technology and Subject-Independent Component Architecture, Version 1.4,
    January 2002. All rights reserved. Page 5
    7.4.3 Deactivated Sessions.............................................................................................................58
    7.4.4 Session Participation .............................................................................................................58
    7.4.5 Activating a Deactivated Session..........................................................................................58
    7.4.6 Session Termination..............................................................................................................58
    7.4.7 No Active Session.................................................................................................................59
    8 GENERAL THEORY OF OPERATION FOR CLINICAL LINKS ....................................................61
    8.1 Multiple Subjects and the Meaning of “Link” ..............................................................................61
    8.1.1 Context Manager Support for Multiple Context Subjects.....................................................61
    8.1.2 Effect of Multiple Subjects on Context Change Transaction ................................................62
    8.1.3 Context Manager Treatment of Multi-Subject Context Data ................................................62
    8.1.4 Effect of Multiple Subjects on Mapping Agents...................................................................63
    8.1.5 Effect of Multiple Subjects on Annotation Agents ...............................................................63
    8.1.6 Application Treatment of Multiple Subjects.........................................................................63
    8.2 Context Subjects Dependencies ....................................................................................................63
    8.3 Empty Contexts Subjects ..............................................................................................................65
    9 THEORY OF OPERATION FOR COMMON LINKS........................................................................67
    9.1 Component Architecture for Common Links................................................................................67
    9.2 Mapping Agents...........................................................................................................................68
    9.3 Annotation Agents ........................................................................................................................69
    9.4 Context Change Transactions .......................................................................................................69
    9.5 Joining a Common Context Session .............................................................................................70
    9.6 Context Change Transactions .......................................................................................................70
    9.7 Transactional Consistency ............................................................................................................71
    9.8 Context Change Notification Process ...........................................................................................71
    9.9 Leaving a Common Context Session ............................................................................................73
    9.10 Behavioral Details........................................................................................................................73
    9.10.1 Notification Policy When Context Data is Not Changed During A Transaction ..................73
    Technology and Subject-Independent Component Architecture, Version 1.4
    Page 6 HL7 Context Management Standard: Technology and Subject-Independent Component
    Architecture, Version 1.4, January 2002. All rights reserved.
    9.10.2 Application Behavior When it Cannot Cancel Context Changes..........................................73
    9.10.3 Application Behavior When it Does Not Understand Context Identifiers ............................74
    9.10.4 Application Behavior with Regard to an Empty Context......................................................74
    9.10.5 Surveying Details..................................................................................................................74
    9.11 Common Clinical Context Use Model..........................................................................................75
    9.11.1 Lifecycle of Common Context..............................................................................................76
    9.11.2 Context Selection Change Use Case .....................................................................................80
    9.11.3 Abnormal Termination of Common Context Use Case ........................................................89
    9.12 Optimizations...............................................................................................................................91
    9.13 The Simplest Application..............................................................................................................91
    10 MAPPING AGENTS........................................................................................................................95
    10.1 Assumptions and Assertions .........................................................................................................95
    10.2 Interfaces......................................................................................................................................96
    10.3 Theory of Operation......................................................................................................................96
    10.3.1 Mapping Agents and Secure Context Subjects .....................................................................97
    10.3.2 Initializing a Context Session When a Mapping Agent is Present ........................................97
    10.3.3 Calling Sequence When Multiple Mapping Agents are Present ...........................................98
    10.3.4 Terminating a Context Session When a Mapping Agent is Present......................................98
    10.3.5 Distinguishing Between Mapping Agents and Context Participants.....................................99
    10.3.6 Mapping Agent Updates to Context Data .............................................................................99
    10.3.7 Conditions for Mapping Agent Invalidation of Context Changes.......................................100
    10.3.8 Treatment of Mapping Agent Invalidation of Context Changes .........................................101
    10.3.9 Mapping Null-Valued Identifiers........................................................................................102
    10.3.10 Initializing Mapping Agents ...........................................................................................103
    10.3.11 Handling Mapping Agent Failures..................................................................................104
    10.4 Mapping Agent Effect on Application Security Policies ............................................................104
    10.5 Identifying Mapping Agent Implementations .............................................................................104
    10.6 Performance Costs and Optimizations ........................................................................................105
    11 ANNOTATION AGENTS .............................................................................................................107
    Technology and Subject-Independent Component Architecture, Version 1.4
    HL7 Context Management Standard: Technology and Subject-Independent Component Architecture, Version 1.4,
    January 2002. All rights reserved. Page 7
    11.1 Assumptions and Assertions .......................................................................................................107
    11.2 Interfaces....................................................................................................................................107
    11.3 Theory of Operation....................................................................................................................108
    12 THEORY OF OPERATION FOR SECURE LINKS .....................................................................109
    12.1 Secure Link Terms......................................................................................................................109
    12.2 Point-of-Use Device Assumptions..............................................................................................109
    12.3 Secure Link Common Context System Description....................................................................110
    12.3.1 Authenticating Secure Subject Access................................................................................110
    12.3.2 Secure Mapping Agent........................................................................................................110
    12.3.3 Secure Annotation Agent ....................................................................................................110
    12.3.4 Context Management Interfaces .........................................................................................111
    12.3.5 Overall Secure Link Component Architecture....................................................................111
    12.4 Process for Setting a Secure Context Subject .............................................................................112
    12.5 Designating Applications for Setting/Getting Secure Subjects...................................................113
    12.6 Busy Applications......................................................................................................................113
    13 PATIENT LINK THEORY OF OPERATION...............................................................................115
    13.1 Patient Link Component Architecture ........................................................................................115
    13.2 Patient Subject ............................................................................................................................115
    13.3 Patient Mapping Agent ...............................................................................................................115
    13.4 Patient Link Context Change Process .........................................................................................116
    13.5 Stat Admissions ..........................................................................................................................116
    14 USER LINK THEORY OF OPERATION.....................................................................................117
    14.1 User Link Terms .........................................................................................................................117
    14.2 Point-of-Use Device Assumptions..............................................................................................117
    Technology and Subject-Independent Component Architecture, Version 1.4
    Page 8 HL7 Context Management Standard: Technology and Subject-Independent Component
    Architecture, Version 1.4, January 2002. All rights reserved.
    14.3 User Link Component Architecture ............................................................................................117
    14.4 User Subject...............................................................................................................................118
    14.5 User Authentication Data Is Not Part of the User Context .........................................................118
    14.6 User Link Common Context System Description.......................................................................118
    14.6.1 User Mapping Agent...........................................................................................................118
    14.6.2 Authentication Repository ..................................................................................................119
    14.6.3 Overall User Link Component Architecture .......................................................................119
    14.7 User Link Context Change Process.............................................................................................120
    14.8 Designating Applications for User Authentication .....................................................................121
    14.9 Signing on to Applications Not Designated for Authenticating Users........................................122
    14.10 Application Behavior When Launched ...................................................................................122
    14.11 Access Control Lists ...............................................................................................................122
    14.12 Changing Users.......................................................................................................................122
    14.13 Logging-Off and Application Termination .............................................................................123
    14.14 Automatic Log-Off .................................................................................................................125
    14.15 Re-authentication Time-out ....................................................................................................126
    14.16 Co-Existence with Applications Not User Link-Enabled .......................................................126
    14.17 Populating the User Mapping Agent.......................................................................................127
    14.18 Authentication Repository ......................................................................................................127
    14.18.1 Repository Implementation Considerations ....................................................................128
    14.18.2 Populating the Repository...............................................................................................128
    15 CHAIN OF TRUST ........................................................................................................................131
    15.1 User Context Change Transactions and the Chain of Trust ........................................................131
    15.2 Creating the Chain of Trust.........................................................................................................131
    15.2.1 Object Infrastructures..........................................................................................................
    下載地址
     下載地址
    按字母檢索

    下載須知:
    大部份資源無(wú)需注冊(cè)即可下載
    需要積分的資源要在會(huì)員中心注冊(cè)會(huì)員并用 積分體系中提示的方法賺取積分才能下載。

    免責(zé)聲明:
    所有資源只能用于參考學(xué)習(xí),不能用于任何商業(yè)用途,否則后果自負(fù)!