国产在线欧美一区二区,精品国产91爱,久久国产精品77777,免费人成视网站在线不卡,噜噜噜久久
色人妻超碰,日韩在线视频网站,亚汌国产一区二区三区,国产经典免费视频在线观看 ,久久久精品国产亚洲麻色欲,国产大片喷水在线在线视频,亚洲一区二区成人,女人18一级毛片免费观看
<noscript id="yyy0y"><dd id="yyy0y"></dd></noscript>
  • <nav id="yyy0y"><sup id="yyy0y"></sup></nav>
    <noscript id="yyy0y"></noscript>
    <small id="yyy0y"><menu id="yyy0y"></menu></small>
    <nav id="yyy0y"><sup id="yyy0y"></sup></nav><noscript id="yyy0y"><dd id="yyy0y"></dd></noscript>
  • <sup id="yyy0y"><code id="yyy0y"></code></sup>
    <tfoot id="yyy0y"><noscript id="yyy0y"></noscript></tfoot>

    獲得積分
    資料庫會員登錄
    搜索: [高級搜索]
    下載首頁 | 資源分類 | 下載排行
    您的位置: 首頁 > 標準文檔  > HL7及CDA
     
    分類導航
    下載排行
    最新資源
    hl7_ccow_arch_cm_1_4.pdf
    資源大小: 資源類型:文檔
    下載積分: 0
    更多
    -->
    下載統計:總下載:0,本月下載:0,本周下載:0,今日下載:0
    發表評論 錯誤報告 加入收藏夾
    資源介紹
    hl7 1.4 標志英文完整版
    Table of Contents
    1 INTRODUCTION...............................................................................................................................19
    1.1 Clinical Context ............................................................................................................................19
    1.2 Links and Subjects ........................................................................................................................19
    1.3 Annotations and actions ................................................................................................................20
    1.4 Architecture Summary ..................................................................................................................20
    1.4.1 Component Architecture .......................................................................................................21
    1.4.2 Context Organization and Representation.............................................................................23
    1.4.3 Application Authentication ...................................................................................................23
    1.4.4 Context Transactions.............................................................................................................23
    1.4.5 Context Actions ....................................................................................................................24
    1.4.6 Context Agents......................................................................................................................24
    1.4.6.1 Mapping Agents................................................................................................................25
    1.4.6.2 Annotation Agents ............................................................................................................25
    1.4.6.3 Action Agents ...................................................................................................................25
    1.5 Reading This Document................................................................................................................25
    2 SCOPE AND OBJECTIVES................................................................................................................27
    2.1 Specification Organization............................................................................................................27
    2.2 Assumptions/Assertions................................................................................................................28
    2.3 CMA Design Center .....................................................................................................................29
    3 TECHNOLOGY NEUTRALITY.........................................................................................................31
    4 REQUIREMENTS AND CAPABILITIES ..........................................................................................33
    5 SYSTEM ARCHITECTURE ...............................................................................................................35
    5.1 Use-Model ...................................................................................................................................35
    5.2 Context Management Responsibility ............................................................................................43
    Technology and Subject-Independent Component Architecture, Version 1.4
    Page 4 HL7 Context Management Standard: Technology and Subject-Independent Component
    Architecture, Version 1.4, January 2002. All rights reserved.
    5.3 Context Change Detection ............................................................................................................43
    5.4 Context Data Representation ........................................................................................................44
    5.5 Context Data Access .....................................................................................................................44
    5.6 Context Data Interpretation...........................................................................................................45
    5.6.1 Context Subject Data Definition Constraints ........................................................................46
    5.6.2 Establishing the Meaning of Context Data Item Names .......................................................46
    5.6.3 Establishing the Meaning of Context Data Item Values .......................................................46
    5.6.4 Representing Context Subjects That Cannot Be Uniquely Identified ...................................47
    5.6.5 Context Subjects and Item Name Format .............................................................................47
    5.6.6 Standard Context Subjects and Data Items ...........................................................................47
    5.6.7 Non-Standard Context Subjects and Data Items ...................................................................47
    5.6.8 Representing “Null” Item Values..........................................................................................48
    5.6.9 Representing an Empty Context Subject...............................................................................48
    5.6.10 Case Sensitivity with Regard to Item Names and Item Values.............................................48
    6 COMPONENT MODEL ......................................................................................................................51
    6.1 Component and Interface Concepts ..............................................................................................51
    6.1.1 Interfaces and References .....................................................................................................51
    6.1.2 Interface Interrogation...........................................................................................................52
    6.1.3 Principal Interface .................................................................................................................52
    6.1.4 Context Management Registry..............................................................................................52
    6.1.5 Interface Reference Management .........................................................................................53
    7 CONTEXT SESSION MANAGEMENT.............................................................................................55
    7.1 Context Session Defined...............................................................................................................55
    7.2 Context Session Use Models.........................................................................................................56
    7.2.1 Shared Clinical Workstation .................................................................................................56
    7.2.2 Interrupt-Driven User............................................................................................................56
    7.3 Theory of Operation......................................................................................................................56
    7.4 Context Session Management Policies .........................................................................................57
    7.4.1 Creating a Context Session ...................................................................................................57
    7.4.2 Cloning Context Data............................................................................................................57
    Technology and Subject-Independent Component Architecture, Version 1.4
    HL7 Context Management Standard: Technology and Subject-Independent Component Architecture, Version 1.4,
    January 2002. All rights reserved. Page 5
    7.4.3 Deactivated Sessions.............................................................................................................58
    7.4.4 Session Participation .............................................................................................................58
    7.4.5 Activating a Deactivated Session..........................................................................................58
    7.4.6 Session Termination..............................................................................................................58
    7.4.7 No Active Session.................................................................................................................59
    8 GENERAL THEORY OF OPERATION FOR CLINICAL LINKS ....................................................61
    8.1 Multiple Subjects and the Meaning of “Link” ..............................................................................61
    8.1.1 Context Manager Support for Multiple Context Subjects.....................................................61
    8.1.2 Effect of Multiple Subjects on Context Change Transaction ................................................62
    8.1.3 Context Manager Treatment of Multi-Subject Context Data ................................................62
    8.1.4 Effect of Multiple Subjects on Mapping Agents...................................................................63
    8.1.5 Effect of Multiple Subjects on Annotation Agents ...............................................................63
    8.1.6 Application Treatment of Multiple Subjects.........................................................................63
    8.2 Context Subjects Dependencies ....................................................................................................63
    8.3 Empty Contexts Subjects ..............................................................................................................65
    9 THEORY OF OPERATION FOR COMMON LINKS........................................................................67
    9.1 Component Architecture for Common Links................................................................................67
    9.2 Mapping Agents...........................................................................................................................68
    9.3 Annotation Agents ........................................................................................................................69
    9.4 Context Change Transactions .......................................................................................................69
    9.5 Joining a Common Context Session .............................................................................................70
    9.6 Context Change Transactions .......................................................................................................70
    9.7 Transactional Consistency ............................................................................................................71
    9.8 Context Change Notification Process ...........................................................................................71
    9.9 Leaving a Common Context Session ............................................................................................73
    9.10 Behavioral Details........................................................................................................................73
    9.10.1 Notification Policy When Context Data is Not Changed During A Transaction ..................73
    Technology and Subject-Independent Component Architecture, Version 1.4
    Page 6 HL7 Context Management Standard: Technology and Subject-Independent Component
    Architecture, Version 1.4, January 2002. All rights reserved.
    9.10.2 Application Behavior When it Cannot Cancel Context Changes..........................................73
    9.10.3 Application Behavior When it Does Not Understand Context Identifiers ............................74
    9.10.4 Application Behavior with Regard to an Empty Context......................................................74
    9.10.5 Surveying Details..................................................................................................................74
    9.11 Common Clinical Context Use Model..........................................................................................75
    9.11.1 Lifecycle of Common Context..............................................................................................76
    9.11.2 Context Selection Change Use Case .....................................................................................80
    9.11.3 Abnormal Termination of Common Context Use Case ........................................................89
    9.12 Optimizations...............................................................................................................................91
    9.13 The Simplest Application..............................................................................................................91
    10 MAPPING AGENTS........................................................................................................................95
    10.1 Assumptions and Assertions .........................................................................................................95
    10.2 Interfaces......................................................................................................................................96
    10.3 Theory of Operation......................................................................................................................96
    10.3.1 Mapping Agents and Secure Context Subjects .....................................................................97
    10.3.2 Initializing a Context Session When a Mapping Agent is Present ........................................97
    10.3.3 Calling Sequence When Multiple Mapping Agents are Present ...........................................98
    10.3.4 Terminating a Context Session When a Mapping Agent is Present......................................98
    10.3.5 Distinguishing Between Mapping Agents and Context Participants.....................................99
    10.3.6 Mapping Agent Updates to Context Data .............................................................................99
    10.3.7 Conditions for Mapping Agent Invalidation of Context Changes.......................................100
    10.3.8 Treatment of Mapping Agent Invalidation of Context Changes .........................................101
    10.3.9 Mapping Null-Valued Identifiers........................................................................................102
    10.3.10 Initializing Mapping Agents ...........................................................................................103
    10.3.11 Handling Mapping Agent Failures..................................................................................104
    10.4 Mapping Agent Effect on Application Security Policies ............................................................104
    10.5 Identifying Mapping Agent Implementations .............................................................................104
    10.6 Performance Costs and Optimizations ........................................................................................105
    11 ANNOTATION AGENTS .............................................................................................................107
    Technology and Subject-Independent Component Architecture, Version 1.4
    HL7 Context Management Standard: Technology and Subject-Independent Component Architecture, Version 1.4,
    January 2002. All rights reserved. Page 7
    11.1 Assumptions and Assertions .......................................................................................................107
    11.2 Interfaces....................................................................................................................................107
    11.3 Theory of Operation....................................................................................................................108
    12 THEORY OF OPERATION FOR SECURE LINKS .....................................................................109
    12.1 Secure Link Terms......................................................................................................................109
    12.2 Point-of-Use Device Assumptions..............................................................................................109
    12.3 Secure Link Common Context System Description....................................................................110
    12.3.1 Authenticating Secure Subject Access................................................................................110
    12.3.2 Secure Mapping Agent........................................................................................................110
    12.3.3 Secure Annotation Agent ....................................................................................................110
    12.3.4 Context Management Interfaces .........................................................................................111
    12.3.5 Overall Secure Link Component Architecture....................................................................111
    12.4 Process for Setting a Secure Context Subject .............................................................................112
    12.5 Designating Applications for Setting/Getting Secure Subjects...................................................113
    12.6 Busy Applications......................................................................................................................113
    13 PATIENT LINK THEORY OF OPERATION...............................................................................115
    13.1 Patient Link Component Architecture ........................................................................................115
    13.2 Patient Subject ............................................................................................................................115
    13.3 Patient Mapping Agent ...............................................................................................................115
    13.4 Patient Link Context Change Process .........................................................................................116
    13.5 Stat Admissions ..........................................................................................................................116
    14 USER LINK THEORY OF OPERATION.....................................................................................117
    14.1 User Link Terms .........................................................................................................................117
    14.2 Point-of-Use Device Assumptions..............................................................................................117
    Technology and Subject-Independent Component Architecture, Version 1.4
    Page 8 HL7 Context Management Standard: Technology and Subject-Independent Component
    Architecture, Version 1.4, January 2002. All rights reserved.
    14.3 User Link Component Architecture ............................................................................................117
    14.4 User Subject...............................................................................................................................118
    14.5 User Authentication Data Is Not Part of the User Context .........................................................118
    14.6 User Link Common Context System Description.......................................................................118
    14.6.1 User Mapping Agent...........................................................................................................118
    14.6.2 Authentication Repository ..................................................................................................119
    14.6.3 Overall User Link Component Architecture .......................................................................119
    14.7 User Link Context Change Process.............................................................................................120
    14.8 Designating Applications for User Authentication .....................................................................121
    14.9 Signing on to Applications Not Designated for Authenticating Users........................................122
    14.10 Application Behavior When Launched ...................................................................................122
    14.11 Access Control Lists ...............................................................................................................122
    14.12 Changing Users.......................................................................................................................122
    14.13 Logging-Off and Application Termination .............................................................................123
    14.14 Automatic Log-Off .................................................................................................................125
    14.15 Re-authentication Time-out ....................................................................................................126
    14.16 Co-Existence with Applications Not User Link-Enabled .......................................................126
    14.17 Populating the User Mapping Agent.......................................................................................127
    14.18 Authentication Repository ......................................................................................................127
    14.18.1 Repository Implementation Considerations ....................................................................128
    14.18.2 Populating the Repository...............................................................................................128
    15 CHAIN OF TRUST ........................................................................................................................131
    15.1 User Context Change Transactions and the Chain of Trust ........................................................131
    15.2 Creating the Chain of Trust.........................................................................................................131
    15.2.1 Object Infrastructures..........................................................................................................
    下載地址
     下載地址
    按字母檢索

    下載須知:
    大部份資源無需注冊即可下載
    需要積分的資源要在會員中心注冊會員并用 積分體系中提示的方法賺取積分才能下載。

    免責聲明:
    所有資源只能用于參考學習,不能用于任何商業用途,否則后果自負!
    主站蜘蛛池模板: 欧美中文字幕第一页线路一| 欧美伦理一区| 国产情侣一区| 91小视频版在线观看www| 久久婷婷色综合老司机| 欧美国产在线精品17p| 91福利片| 色网在线视频| 2021国产精品自产拍在线观看 | 伊人色在线视频| 欧美精品一二三区| 一级毛片不卡片免费观看| 99r在线精品视频在线播放| 国产午夜无码专区喷水| 高清国产在线| 人人爽人人爽人人片| 久久综合亚洲鲁鲁九月天| 男人天堂亚洲天堂| 综合社区亚洲熟妇p| 青青青国产精品国产精品美女| av色爱 天堂网| 欧美综合区自拍亚洲综合绿色| 91综合色区亚洲熟妇p| AV无码一区二区三区四区| 免费av一区二区三区在线| 在线毛片网站| 久久国产乱子| 免费人欧美成又黄又爽的视频| 亚洲男人在线天堂| 色悠久久久| 99精品免费在线| 国产精品午夜福利麻豆| 国产91全国探花系列在线播放| 精品91在线| 亚洲av中文无码乱人伦在线r| 欧美中文字幕第一页线路一| 欧美国产成人在线| 亚洲国内精品自在自线官| 精品无码日韩国产不卡av | 在线看片中文字幕| 国产综合亚洲欧洲区精品无码| 国产成人精品一区二区三在线观看| 国产真实自在自线免费精品| 国产成人免费视频精品一区二区 | 女同久久精品国产99国| 干中文字幕| 欧美成人综合视频| 91精品在线视频观看| 日韩午夜福利在线观看| 波多野结衣在线se| 一级全免费视频播放| 在线毛片免费| 伊人久久福利中文字幕| 免费jjzz在在线播放国产| 欧美色图第一页| 日韩毛片视频| 黄色网在线| 亚洲精品色AV无码看| 国产人人乐人人爱| 国产精品自在在线午夜区app| 免费一级无码在线网站 | 欧美高清国产| 成人国产免费| 国产成人乱无码视频| 免费毛片网站在线观看| 欧美一级视频免费| AV熟女乱| 福利在线不卡| 免费在线a视频| 人妻丰满熟妇av五码区| a级毛片免费看| 国产精品观看视频免费完整版| 欧美亚洲第一页| 日韩成人在线网站| 乱码国产乱码精品精在线播放| 日本亚洲成高清一区二区三区| 国产精品一区二区不卡的视频| 国产精品9| 亚洲品质国产精品无码| 在线免费无码视频| 狼友视频国产精品首页| 亚洲精品图区|