女生自摸在线观看一区二区三区,中文字幕日产乱码久久第一页,久久亚洲精品中文字幕三区

午夜在线视频一区二区-亚洲一区成人免费电影-超碰欧美一区二区三区-大香蕉大香蕉日本大香蕉


      獲得積分
      資料庫會員登錄
      搜索: [高級搜索]
      下載首頁 | 資源分類 | 下載排行
      您的位置: 首頁 > 標準文檔  > HL7及CDA
       
      分類導航
      下載排行
      最新資源
      hl7_ccow_arch_cm_1_4.pdf
      資源大小: 資源類型:文檔
      下載積分: 0
      更多
      -->
      下載統計:總下載:0,本月下載:0,本周下載:0,今日下載:0
      發表評論 錯誤報告 加入收藏夾
      資源介紹
      hl7 1.4 標志英文完整版
      Table of Contents
      1 INTRODUCTION...............................................................................................................................19
      1.1 Clinical Context ............................................................................................................................19
      1.2 Links and Subjects ........................................................................................................................19
      1.3 Annotations and actions ................................................................................................................20
      1.4 Architecture Summary ..................................................................................................................20
      1.4.1 Component Architecture .......................................................................................................21
      1.4.2 Context Organization and Representation.............................................................................23
      1.4.3 Application Authentication ...................................................................................................23
      1.4.4 Context Transactions.............................................................................................................23
      1.4.5 Context Actions ....................................................................................................................24
      1.4.6 Context Agents......................................................................................................................24
      1.4.6.1 Mapping Agents................................................................................................................25
      1.4.6.2 Annotation Agents ............................................................................................................25
      1.4.6.3 Action Agents ...................................................................................................................25
      1.5 Reading This Document................................................................................................................25
      2 SCOPE AND OBJECTIVES................................................................................................................27
      2.1 Specification Organization............................................................................................................27
      2.2 Assumptions/Assertions................................................................................................................28
      2.3 CMA Design Center .....................................................................................................................29
      3 TECHNOLOGY NEUTRALITY.........................................................................................................31
      4 REQUIREMENTS AND CAPABILITIES ..........................................................................................33
      5 SYSTEM ARCHITECTURE ...............................................................................................................35
      5.1 Use-Model ...................................................................................................................................35
      5.2 Context Management Responsibility ............................................................................................43
      Technology and Subject-Independent Component Architecture, Version 1.4
      Page 4 HL7 Context Management Standard: Technology and Subject-Independent Component
      Architecture, Version 1.4, January 2002. All rights reserved.
      5.3 Context Change Detection ............................................................................................................43
      5.4 Context Data Representation ........................................................................................................44
      5.5 Context Data Access .....................................................................................................................44
      5.6 Context Data Interpretation...........................................................................................................45
      5.6.1 Context Subject Data Definition Constraints ........................................................................46
      5.6.2 Establishing the Meaning of Context Data Item Names .......................................................46
      5.6.3 Establishing the Meaning of Context Data Item Values .......................................................46
      5.6.4 Representing Context Subjects That Cannot Be Uniquely Identified ...................................47
      5.6.5 Context Subjects and Item Name Format .............................................................................47
      5.6.6 Standard Context Subjects and Data Items ...........................................................................47
      5.6.7 Non-Standard Context Subjects and Data Items ...................................................................47
      5.6.8 Representing “Null” Item Values..........................................................................................48
      5.6.9 Representing an Empty Context Subject...............................................................................48
      5.6.10 Case Sensitivity with Regard to Item Names and Item Values.............................................48
      6 COMPONENT MODEL ......................................................................................................................51
      6.1 Component and Interface Concepts ..............................................................................................51
      6.1.1 Interfaces and References .....................................................................................................51
      6.1.2 Interface Interrogation...........................................................................................................52
      6.1.3 Principal Interface .................................................................................................................52
      6.1.4 Context Management Registry..............................................................................................52
      6.1.5 Interface Reference Management .........................................................................................53
      7 CONTEXT SESSION MANAGEMENT.............................................................................................55
      7.1 Context Session Defined...............................................................................................................55
      7.2 Context Session Use Models.........................................................................................................56
      7.2.1 Shared Clinical Workstation .................................................................................................56
      7.2.2 Interrupt-Driven User............................................................................................................56
      7.3 Theory of Operation......................................................................................................................56
      7.4 Context Session Management Policies .........................................................................................57
      7.4.1 Creating a Context Session ...................................................................................................57
      7.4.2 Cloning Context Data............................................................................................................57
      Technology and Subject-Independent Component Architecture, Version 1.4
      HL7 Context Management Standard: Technology and Subject-Independent Component Architecture, Version 1.4,
      January 2002. All rights reserved. Page 5
      7.4.3 Deactivated Sessions.............................................................................................................58
      7.4.4 Session Participation .............................................................................................................58
      7.4.5 Activating a Deactivated Session..........................................................................................58
      7.4.6 Session Termination..............................................................................................................58
      7.4.7 No Active Session.................................................................................................................59
      8 GENERAL THEORY OF OPERATION FOR CLINICAL LINKS ....................................................61
      8.1 Multiple Subjects and the Meaning of “Link” ..............................................................................61
      8.1.1 Context Manager Support for Multiple Context Subjects.....................................................61
      8.1.2 Effect of Multiple Subjects on Context Change Transaction ................................................62
      8.1.3 Context Manager Treatment of Multi-Subject Context Data ................................................62
      8.1.4 Effect of Multiple Subjects on Mapping Agents...................................................................63
      8.1.5 Effect of Multiple Subjects on Annotation Agents ...............................................................63
      8.1.6 Application Treatment of Multiple Subjects.........................................................................63
      8.2 Context Subjects Dependencies ....................................................................................................63
      8.3 Empty Contexts Subjects ..............................................................................................................65
      9 THEORY OF OPERATION FOR COMMON LINKS........................................................................67
      9.1 Component Architecture for Common Links................................................................................67
      9.2 Mapping Agents...........................................................................................................................68
      9.3 Annotation Agents ........................................................................................................................69
      9.4 Context Change Transactions .......................................................................................................69
      9.5 Joining a Common Context Session .............................................................................................70
      9.6 Context Change Transactions .......................................................................................................70
      9.7 Transactional Consistency ............................................................................................................71
      9.8 Context Change Notification Process ...........................................................................................71
      9.9 Leaving a Common Context Session ............................................................................................73
      9.10 Behavioral Details........................................................................................................................73
      9.10.1 Notification Policy When Context Data is Not Changed During A Transaction ..................73
      Technology and Subject-Independent Component Architecture, Version 1.4
      Page 6 HL7 Context Management Standard: Technology and Subject-Independent Component
      Architecture, Version 1.4, January 2002. All rights reserved.
      9.10.2 Application Behavior When it Cannot Cancel Context Changes..........................................73
      9.10.3 Application Behavior When it Does Not Understand Context Identifiers ............................74
      9.10.4 Application Behavior with Regard to an Empty Context......................................................74
      9.10.5 Surveying Details..................................................................................................................74
      9.11 Common Clinical Context Use Model..........................................................................................75
      9.11.1 Lifecycle of Common Context..............................................................................................76
      9.11.2 Context Selection Change Use Case .....................................................................................80
      9.11.3 Abnormal Termination of Common Context Use Case ........................................................89
      9.12 Optimizations...............................................................................................................................91
      9.13 The Simplest Application..............................................................................................................91
      10 MAPPING AGENTS........................................................................................................................95
      10.1 Assumptions and Assertions .........................................................................................................95
      10.2 Interfaces......................................................................................................................................96
      10.3 Theory of Operation......................................................................................................................96
      10.3.1 Mapping Agents and Secure Context Subjects .....................................................................97
      10.3.2 Initializing a Context Session When a Mapping Agent is Present ........................................97
      10.3.3 Calling Sequence When Multiple Mapping Agents are Present ...........................................98
      10.3.4 Terminating a Context Session When a Mapping Agent is Present......................................98
      10.3.5 Distinguishing Between Mapping Agents and Context Participants.....................................99
      10.3.6 Mapping Agent Updates to Context Data .............................................................................99
      10.3.7 Conditions for Mapping Agent Invalidation of Context Changes.......................................100
      10.3.8 Treatment of Mapping Agent Invalidation of Context Changes .........................................101
      10.3.9 Mapping Null-Valued Identifiers........................................................................................102
      10.3.10 Initializing Mapping Agents ...........................................................................................103
      10.3.11 Handling Mapping Agent Failures..................................................................................104
      10.4 Mapping Agent Effect on Application Security Policies ............................................................104
      10.5 Identifying Mapping Agent Implementations .............................................................................104
      10.6 Performance Costs and Optimizations ........................................................................................105
      11 ANNOTATION AGENTS .............................................................................................................107
      Technology and Subject-Independent Component Architecture, Version 1.4
      HL7 Context Management Standard: Technology and Subject-Independent Component Architecture, Version 1.4,
      January 2002. All rights reserved. Page 7
      11.1 Assumptions and Assertions .......................................................................................................107
      11.2 Interfaces....................................................................................................................................107
      11.3 Theory of Operation....................................................................................................................108
      12 THEORY OF OPERATION FOR SECURE LINKS .....................................................................109
      12.1 Secure Link Terms......................................................................................................................109
      12.2 Point-of-Use Device Assumptions..............................................................................................109
      12.3 Secure Link Common Context System Description....................................................................110
      12.3.1 Authenticating Secure Subject Access................................................................................110
      12.3.2 Secure Mapping Agent........................................................................................................110
      12.3.3 Secure Annotation Agent ....................................................................................................110
      12.3.4 Context Management Interfaces .........................................................................................111
      12.3.5 Overall Secure Link Component Architecture....................................................................111
      12.4 Process for Setting a Secure Context Subject .............................................................................112
      12.5 Designating Applications for Setting/Getting Secure Subjects...................................................113
      12.6 Busy Applications......................................................................................................................113
      13 PATIENT LINK THEORY OF OPERATION...............................................................................115
      13.1 Patient Link Component Architecture ........................................................................................115
      13.2 Patient Subject ............................................................................................................................115
      13.3 Patient Mapping Agent ...............................................................................................................115
      13.4 Patient Link Context Change Process .........................................................................................116
      13.5 Stat Admissions ..........................................................................................................................116
      14 USER LINK THEORY OF OPERATION.....................................................................................117
      14.1 User Link Terms .........................................................................................................................117
      14.2 Point-of-Use Device Assumptions..............................................................................................117
      Technology and Subject-Independent Component Architecture, Version 1.4
      Page 8 HL7 Context Management Standard: Technology and Subject-Independent Component
      Architecture, Version 1.4, January 2002. All rights reserved.
      14.3 User Link Component Architecture ............................................................................................117
      14.4 User Subject...............................................................................................................................118
      14.5 User Authentication Data Is Not Part of the User Context .........................................................118
      14.6 User Link Common Context System Description.......................................................................118
      14.6.1 User Mapping Agent...........................................................................................................118
      14.6.2 Authentication Repository ..................................................................................................119
      14.6.3 Overall User Link Component Architecture .......................................................................119
      14.7 User Link Context Change Process.............................................................................................120
      14.8 Designating Applications for User Authentication .....................................................................121
      14.9 Signing on to Applications Not Designated for Authenticating Users........................................122
      14.10 Application Behavior When Launched ...................................................................................122
      14.11 Access Control Lists ...............................................................................................................122
      14.12 Changing Users.......................................................................................................................122
      14.13 Logging-Off and Application Termination .............................................................................123
      14.14 Automatic Log-Off .................................................................................................................125
      14.15 Re-authentication Time-out ....................................................................................................126
      14.16 Co-Existence with Applications Not User Link-Enabled .......................................................126
      14.17 Populating the User Mapping Agent.......................................................................................127
      14.18 Authentication Repository ......................................................................................................127
      14.18.1 Repository Implementation Considerations ....................................................................128
      14.18.2 Populating the Repository...............................................................................................128
      15 CHAIN OF TRUST ........................................................................................................................131
      15.1 User Context Change Transactions and the Chain of Trust ........................................................131
      15.2 Creating the Chain of Trust.........................................................................................................131
      15.2.1 Object Infrastructures..........................................................................................................
      下載地址
       下載地址
      按字母檢索

      下載須知:
      大部份資源無需注冊即可下載
      需要積分的資源要在會員中心注冊會員并用 積分體系中提示的方法賺取積分才能下載。

      免責聲明:
      所有資源只能用于參考學習,不能用于任何商業用途,否則后果自負!