陆诗琪陈叔的书全本免费阅读,天津45中轮师门视频

女高中生上课自慰流白浆_金瓶梅全集在线观看_人妻互换免费中文字幕网站_国产玖玖资源站免费_最经典的人与动物故事

<kbd id="4wz0t"><rp id="4wz0t"><video id="4wz0t"></video></rp></kbd>
<strong id="4wz0t"></strong>
    • <p id="4wz0t"><fieldset id="4wz0t"><dl id="4wz0t"></dl></fieldset></p>
        <big id="4wz0t"><samp id="4wz0t"><small id="4wz0t"></small></samp></big>
        1. <blockquote id="4wz0t"></blockquote>
          <dd id="4wz0t"><tbody id="4wz0t"><menuitem id="4wz0t"></menuitem></tbody></dd>

          獲得積分
          資料庫會員登錄
          搜索: [高級搜索]
          下載首頁 | 資源分類 | 下載排行
          您的位置: 首頁 > 標(biāo)準(zhǔn)文檔  > HL7及CDA
           
          分類導(dǎo)航
          下載排行
          最新資源
          hl7_ccow_arch_cm_1_4.pdf
          資源大小: 資源類型:文檔
          下載積分: 0
          更多
          -->
          下載統(tǒng)計:總下載:0,本月下載:0,本周下載:0,今日下載:0
          發(fā)表評論 錯誤報告 加入收藏夾
          資源介紹
          hl7 1.4 標(biāo)志英文完整版
          Table of Contents
          1 INTRODUCTION...............................................................................................................................19
          1.1 Clinical Context ............................................................................................................................19
          1.2 Links and Subjects ........................................................................................................................19
          1.3 Annotations and actions ................................................................................................................20
          1.4 Architecture Summary ..................................................................................................................20
          1.4.1 Component Architecture .......................................................................................................21
          1.4.2 Context Organization and Representation.............................................................................23
          1.4.3 Application Authentication ...................................................................................................23
          1.4.4 Context Transactions.............................................................................................................23
          1.4.5 Context Actions ....................................................................................................................24
          1.4.6 Context Agents......................................................................................................................24
          1.4.6.1 Mapping Agents................................................................................................................25
          1.4.6.2 Annotation Agents ............................................................................................................25
          1.4.6.3 Action Agents ...................................................................................................................25
          1.5 Reading This Document................................................................................................................25
          2 SCOPE AND OBJECTIVES................................................................................................................27
          2.1 Specification Organization............................................................................................................27
          2.2 Assumptions/Assertions................................................................................................................28
          2.3 CMA Design Center .....................................................................................................................29
          3 TECHNOLOGY NEUTRALITY.........................................................................................................31
          4 REQUIREMENTS AND CAPABILITIES ..........................................................................................33
          5 SYSTEM ARCHITECTURE ...............................................................................................................35
          5.1 Use-Model ...................................................................................................................................35
          5.2 Context Management Responsibility ............................................................................................43
          Technology and Subject-Independent Component Architecture, Version 1.4
          Page 4 HL7 Context Management Standard: Technology and Subject-Independent Component
          Architecture, Version 1.4, January 2002. All rights reserved.
          5.3 Context Change Detection ............................................................................................................43
          5.4 Context Data Representation ........................................................................................................44
          5.5 Context Data Access .....................................................................................................................44
          5.6 Context Data Interpretation...........................................................................................................45
          5.6.1 Context Subject Data Definition Constraints ........................................................................46
          5.6.2 Establishing the Meaning of Context Data Item Names .......................................................46
          5.6.3 Establishing the Meaning of Context Data Item Values .......................................................46
          5.6.4 Representing Context Subjects That Cannot Be Uniquely Identified ...................................47
          5.6.5 Context Subjects and Item Name Format .............................................................................47
          5.6.6 Standard Context Subjects and Data Items ...........................................................................47
          5.6.7 Non-Standard Context Subjects and Data Items ...................................................................47
          5.6.8 Representing “Null” Item Values..........................................................................................48
          5.6.9 Representing an Empty Context Subject...............................................................................48
          5.6.10 Case Sensitivity with Regard to Item Names and Item Values.............................................48
          6 COMPONENT MODEL ......................................................................................................................51
          6.1 Component and Interface Concepts ..............................................................................................51
          6.1.1 Interfaces and References .....................................................................................................51
          6.1.2 Interface Interrogation...........................................................................................................52
          6.1.3 Principal Interface .................................................................................................................52
          6.1.4 Context Management Registry..............................................................................................52
          6.1.5 Interface Reference Management .........................................................................................53
          7 CONTEXT SESSION MANAGEMENT.............................................................................................55
          7.1 Context Session Defined...............................................................................................................55
          7.2 Context Session Use Models.........................................................................................................56
          7.2.1 Shared Clinical Workstation .................................................................................................56
          7.2.2 Interrupt-Driven User............................................................................................................56
          7.3 Theory of Operation......................................................................................................................56
          7.4 Context Session Management Policies .........................................................................................57
          7.4.1 Creating a Context Session ...................................................................................................57
          7.4.2 Cloning Context Data............................................................................................................57
          Technology and Subject-Independent Component Architecture, Version 1.4
          HL7 Context Management Standard: Technology and Subject-Independent Component Architecture, Version 1.4,
          January 2002. All rights reserved. Page 5
          7.4.3 Deactivated Sessions.............................................................................................................58
          7.4.4 Session Participation .............................................................................................................58
          7.4.5 Activating a Deactivated Session..........................................................................................58
          7.4.6 Session Termination..............................................................................................................58
          7.4.7 No Active Session.................................................................................................................59
          8 GENERAL THEORY OF OPERATION FOR CLINICAL LINKS ....................................................61
          8.1 Multiple Subjects and the Meaning of “Link” ..............................................................................61
          8.1.1 Context Manager Support for Multiple Context Subjects.....................................................61
          8.1.2 Effect of Multiple Subjects on Context Change Transaction ................................................62
          8.1.3 Context Manager Treatment of Multi-Subject Context Data ................................................62
          8.1.4 Effect of Multiple Subjects on Mapping Agents...................................................................63
          8.1.5 Effect of Multiple Subjects on Annotation Agents ...............................................................63
          8.1.6 Application Treatment of Multiple Subjects.........................................................................63
          8.2 Context Subjects Dependencies ....................................................................................................63
          8.3 Empty Contexts Subjects ..............................................................................................................65
          9 THEORY OF OPERATION FOR COMMON LINKS........................................................................67
          9.1 Component Architecture for Common Links................................................................................67
          9.2 Mapping Agents...........................................................................................................................68
          9.3 Annotation Agents ........................................................................................................................69
          9.4 Context Change Transactions .......................................................................................................69
          9.5 Joining a Common Context Session .............................................................................................70
          9.6 Context Change Transactions .......................................................................................................70
          9.7 Transactional Consistency ............................................................................................................71
          9.8 Context Change Notification Process ...........................................................................................71
          9.9 Leaving a Common Context Session ............................................................................................73
          9.10 Behavioral Details........................................................................................................................73
          9.10.1 Notification Policy When Context Data is Not Changed During A Transaction ..................73
          Technology and Subject-Independent Component Architecture, Version 1.4
          Page 6 HL7 Context Management Standard: Technology and Subject-Independent Component
          Architecture, Version 1.4, January 2002. All rights reserved.
          9.10.2 Application Behavior When it Cannot Cancel Context Changes..........................................73
          9.10.3 Application Behavior When it Does Not Understand Context Identifiers ............................74
          9.10.4 Application Behavior with Regard to an Empty Context......................................................74
          9.10.5 Surveying Details..................................................................................................................74
          9.11 Common Clinical Context Use Model..........................................................................................75
          9.11.1 Lifecycle of Common Context..............................................................................................76
          9.11.2 Context Selection Change Use Case .....................................................................................80
          9.11.3 Abnormal Termination of Common Context Use Case ........................................................89
          9.12 Optimizations...............................................................................................................................91
          9.13 The Simplest Application..............................................................................................................91
          10 MAPPING AGENTS........................................................................................................................95
          10.1 Assumptions and Assertions .........................................................................................................95
          10.2 Interfaces......................................................................................................................................96
          10.3 Theory of Operation......................................................................................................................96
          10.3.1 Mapping Agents and Secure Context Subjects .....................................................................97
          10.3.2 Initializing a Context Session When a Mapping Agent is Present ........................................97
          10.3.3 Calling Sequence When Multiple Mapping Agents are Present ...........................................98
          10.3.4 Terminating a Context Session When a Mapping Agent is Present......................................98
          10.3.5 Distinguishing Between Mapping Agents and Context Participants.....................................99
          10.3.6 Mapping Agent Updates to Context Data .............................................................................99
          10.3.7 Conditions for Mapping Agent Invalidation of Context Changes.......................................100
          10.3.8 Treatment of Mapping Agent Invalidation of Context Changes .........................................101
          10.3.9 Mapping Null-Valued Identifiers........................................................................................102
          10.3.10 Initializing Mapping Agents ...........................................................................................103
          10.3.11 Handling Mapping Agent Failures..................................................................................104
          10.4 Mapping Agent Effect on Application Security Policies ............................................................104
          10.5 Identifying Mapping Agent Implementations .............................................................................104
          10.6 Performance Costs and Optimizations ........................................................................................105
          11 ANNOTATION AGENTS .............................................................................................................107
          Technology and Subject-Independent Component Architecture, Version 1.4
          HL7 Context Management Standard: Technology and Subject-Independent Component Architecture, Version 1.4,
          January 2002. All rights reserved. Page 7
          11.1 Assumptions and Assertions .......................................................................................................107
          11.2 Interfaces....................................................................................................................................107
          11.3 Theory of Operation....................................................................................................................108
          12 THEORY OF OPERATION FOR SECURE LINKS .....................................................................109
          12.1 Secure Link Terms......................................................................................................................109
          12.2 Point-of-Use Device Assumptions..............................................................................................109
          12.3 Secure Link Common Context System Description....................................................................110
          12.3.1 Authenticating Secure Subject Access................................................................................110
          12.3.2 Secure Mapping Agent........................................................................................................110
          12.3.3 Secure Annotation Agent ....................................................................................................110
          12.3.4 Context Management Interfaces .........................................................................................111
          12.3.5 Overall Secure Link Component Architecture....................................................................111
          12.4 Process for Setting a Secure Context Subject .............................................................................112
          12.5 Designating Applications for Setting/Getting Secure Subjects...................................................113
          12.6 Busy Applications......................................................................................................................113
          13 PATIENT LINK THEORY OF OPERATION...............................................................................115
          13.1 Patient Link Component Architecture ........................................................................................115
          13.2 Patient Subject ............................................................................................................................115
          13.3 Patient Mapping Agent ...............................................................................................................115
          13.4 Patient Link Context Change Process .........................................................................................116
          13.5 Stat Admissions ..........................................................................................................................116
          14 USER LINK THEORY OF OPERATION.....................................................................................117
          14.1 User Link Terms .........................................................................................................................117
          14.2 Point-of-Use Device Assumptions..............................................................................................117
          Technology and Subject-Independent Component Architecture, Version 1.4
          Page 8 HL7 Context Management Standard: Technology and Subject-Independent Component
          Architecture, Version 1.4, January 2002. All rights reserved.
          14.3 User Link Component Architecture ............................................................................................117
          14.4 User Subject...............................................................................................................................118
          14.5 User Authentication Data Is Not Part of the User Context .........................................................118
          14.6 User Link Common Context System Description.......................................................................118
          14.6.1 User Mapping Agent...........................................................................................................118
          14.6.2 Authentication Repository ..................................................................................................119
          14.6.3 Overall User Link Component Architecture .......................................................................119
          14.7 User Link Context Change Process.............................................................................................120
          14.8 Designating Applications for User Authentication .....................................................................121
          14.9 Signing on to Applications Not Designated for Authenticating Users........................................122
          14.10 Application Behavior When Launched ...................................................................................122
          14.11 Access Control Lists ...............................................................................................................122
          14.12 Changing Users.......................................................................................................................122
          14.13 Logging-Off and Application Termination .............................................................................123
          14.14 Automatic Log-Off .................................................................................................................125
          14.15 Re-authentication Time-out ....................................................................................................126
          14.16 Co-Existence with Applications Not User Link-Enabled .......................................................126
          14.17 Populating the User Mapping Agent.......................................................................................127
          14.18 Authentication Repository ......................................................................................................127
          14.18.1 Repository Implementation Considerations ....................................................................128
          14.18.2 Populating the Repository...............................................................................................128
          15 CHAIN OF TRUST ........................................................................................................................131
          15.1 User Context Change Transactions and the Chain of Trust ........................................................131
          15.2 Creating the Chain of Trust.........................................................................................................131
          15.2.1 Object Infrastructures..........................................................................................................
          下載地址
           下載地址
          按字母檢索

          下載須知:
          大部份資源無需注冊即可下載
          需要積分的資源要在會員中心注冊會員并用 積分體系中提示的方法賺取積分才能下載。

          免責(zé)聲明:
          所有資源只能用于參考學(xué)習(xí),不能用于任何商業(yè)用途,否則后果自負(fù)!