日韩人成,中文字幕五月,又爽又色的视频

a级一a一级在线观看_a级在线观看视频_a极毛片_a毛片_全部免费毛片在线播放_全部孕妇丰满孕妇孕交


            获得积分
            资料库会员登录
            搜索: [高级搜索]
            下载首页 | 资源分类 | 下载排行
            您的位置: 首页 > 标准文档  > HL7及CDA
             
            分类导航
            下载排行
            最新资源
            hl7_ccow_arch_cm_1_4.pdf
            资源大小: 资源类型:文档
            下载积分: 0
            更多
            -->
            下载统计:总下载:0,本月下载:0,本周下载:0,今日下载:0
            发表评论 错误报告 加入收藏夹
            资源介绍
            hl7 1.4 标志英文完整版
            Table of Contents
            1 INTRODUCTION...............................................................................................................................19
            1.1 Clinical Context ............................................................................................................................19
            1.2 Links and Subjects ........................................................................................................................19
            1.3 Annotations and actions ................................................................................................................20
            1.4 Architecture Summary ..................................................................................................................20
            1.4.1 Component Architecture .......................................................................................................21
            1.4.2 Context Organization and Representation.............................................................................23
            1.4.3 Application Authentication ...................................................................................................23
            1.4.4 Context Transactions.............................................................................................................23
            1.4.5 Context Actions ....................................................................................................................24
            1.4.6 Context Agents......................................................................................................................24
            1.4.6.1 Mapping Agents................................................................................................................25
            1.4.6.2 Annotation Agents ............................................................................................................25
            1.4.6.3 Action Agents ...................................................................................................................25
            1.5 Reading This Document................................................................................................................25
            2 SCOPE AND OBJECTIVES................................................................................................................27
            2.1 Specification Organization............................................................................................................27
            2.2 Assumptions/Assertions................................................................................................................28
            2.3 CMA Design Center .....................................................................................................................29
            3 TECHNOLOGY NEUTRALITY.........................................................................................................31
            4 REQUIREMENTS AND CAPABILITIES ..........................................................................................33
            5 SYSTEM ARCHITECTURE ...............................................................................................................35
            5.1 Use-Model ...................................................................................................................................35
            5.2 Context Management Responsibility ............................................................................................43
            Technology and Subject-Independent Component Architecture, Version 1.4
            Page 4 HL7 Context Management Standard: Technology and Subject-Independent Component
            Architecture, Version 1.4, January 2002. All rights reserved.
            5.3 Context Change Detection ............................................................................................................43
            5.4 Context Data Representation ........................................................................................................44
            5.5 Context Data Access .....................................................................................................................44
            5.6 Context Data Interpretation...........................................................................................................45
            5.6.1 Context Subject Data Definition Constraints ........................................................................46
            5.6.2 Establishing the Meaning of Context Data Item Names .......................................................46
            5.6.3 Establishing the Meaning of Context Data Item Values .......................................................46
            5.6.4 Representing Context Subjects That Cannot Be Uniquely Identified ...................................47
            5.6.5 Context Subjects and Item Name Format .............................................................................47
            5.6.6 Standard Context Subjects and Data Items ...........................................................................47
            5.6.7 Non-Standard Context Subjects and Data Items ...................................................................47
            5.6.8 Representing “Null” Item Values..........................................................................................48
            5.6.9 Representing an Empty Context Subject...............................................................................48
            5.6.10 Case Sensitivity with Regard to Item Names and Item Values.............................................48
            6 COMPONENT MODEL ......................................................................................................................51
            6.1 Component and Interface Concepts ..............................................................................................51
            6.1.1 Interfaces and References .....................................................................................................51
            6.1.2 Interface Interrogation...........................................................................................................52
            6.1.3 Principal Interface .................................................................................................................52
            6.1.4 Context Management Registry..............................................................................................52
            6.1.5 Interface Reference Management .........................................................................................53
            7 CONTEXT SESSION MANAGEMENT.............................................................................................55
            7.1 Context Session Defined...............................................................................................................55
            7.2 Context Session Use Models.........................................................................................................56
            7.2.1 Shared Clinical Workstation .................................................................................................56
            7.2.2 Interrupt-Driven User............................................................................................................56
            7.3 Theory of Operation......................................................................................................................56
            7.4 Context Session Management Policies .........................................................................................57
            7.4.1 Creating a Context Session ...................................................................................................57
            7.4.2 Cloning Context Data............................................................................................................57
            Technology and Subject-Independent Component Architecture, Version 1.4
            HL7 Context Management Standard: Technology and Subject-Independent Component Architecture, Version 1.4,
            January 2002. All rights reserved. Page 5
            7.4.3 Deactivated Sessions.............................................................................................................58
            7.4.4 Session Participation .............................................................................................................58
            7.4.5 Activating a Deactivated Session..........................................................................................58
            7.4.6 Session Termination..............................................................................................................58
            7.4.7 No Active Session.................................................................................................................59
            8 GENERAL THEORY OF OPERATION FOR CLINICAL LINKS ....................................................61
            8.1 Multiple Subjects and the Meaning of “Link” ..............................................................................61
            8.1.1 Context Manager Support for Multiple Context Subjects.....................................................61
            8.1.2 Effect of Multiple Subjects on Context Change Transaction ................................................62
            8.1.3 Context Manager Treatment of Multi-Subject Context Data ................................................62
            8.1.4 Effect of Multiple Subjects on Mapping Agents...................................................................63
            8.1.5 Effect of Multiple Subjects on Annotation Agents ...............................................................63
            8.1.6 Application Treatment of Multiple Subjects.........................................................................63
            8.2 Context Subjects Dependencies ....................................................................................................63
            8.3 Empty Contexts Subjects ..............................................................................................................65
            9 THEORY OF OPERATION FOR COMMON LINKS........................................................................67
            9.1 Component Architecture for Common Links................................................................................67
            9.2 Mapping Agents...........................................................................................................................68
            9.3 Annotation Agents ........................................................................................................................69
            9.4 Context Change Transactions .......................................................................................................69
            9.5 Joining a Common Context Session .............................................................................................70
            9.6 Context Change Transactions .......................................................................................................70
            9.7 Transactional Consistency ............................................................................................................71
            9.8 Context Change Notification Process ...........................................................................................71
            9.9 Leaving a Common Context Session ............................................................................................73
            9.10 Behavioral Details........................................................................................................................73
            9.10.1 Notification Policy When Context Data is Not Changed During A Transaction ..................73
            Technology and Subject-Independent Component Architecture, Version 1.4
            Page 6 HL7 Context Management Standard: Technology and Subject-Independent Component
            Architecture, Version 1.4, January 2002. All rights reserved.
            9.10.2 Application Behavior When it Cannot Cancel Context Changes..........................................73
            9.10.3 Application Behavior When it Does Not Understand Context Identifiers ............................74
            9.10.4 Application Behavior with Regard to an Empty Context......................................................74
            9.10.5 Surveying Details..................................................................................................................74
            9.11 Common Clinical Context Use Model..........................................................................................75
            9.11.1 Lifecycle of Common Context..............................................................................................76
            9.11.2 Context Selection Change Use Case .....................................................................................80
            9.11.3 Abnormal Termination of Common Context Use Case ........................................................89
            9.12 Optimizations...............................................................................................................................91
            9.13 The Simplest Application..............................................................................................................91
            10 MAPPING AGENTS........................................................................................................................95
            10.1 Assumptions and Assertions .........................................................................................................95
            10.2 Interfaces......................................................................................................................................96
            10.3 Theory of Operation......................................................................................................................96
            10.3.1 Mapping Agents and Secure Context Subjects .....................................................................97
            10.3.2 Initializing a Context Session When a Mapping Agent is Present ........................................97
            10.3.3 Calling Sequence When Multiple Mapping Agents are Present ...........................................98
            10.3.4 Terminating a Context Session When a Mapping Agent is Present......................................98
            10.3.5 Distinguishing Between Mapping Agents and Context Participants.....................................99
            10.3.6 Mapping Agent Updates to Context Data .............................................................................99
            10.3.7 Conditions for Mapping Agent Invalidation of Context Changes.......................................100
            10.3.8 Treatment of Mapping Agent Invalidation of Context Changes .........................................101
            10.3.9 Mapping Null-Valued Identifiers........................................................................................102
            10.3.10 Initializing Mapping Agents ...........................................................................................103
            10.3.11 Handling Mapping Agent Failures..................................................................................104
            10.4 Mapping Agent Effect on Application Security Policies ............................................................104
            10.5 Identifying Mapping Agent Implementations .............................................................................104
            10.6 Performance Costs and Optimizations ........................................................................................105
            11 ANNOTATION AGENTS .............................................................................................................107
            Technology and Subject-Independent Component Architecture, Version 1.4
            HL7 Context Management Standard: Technology and Subject-Independent Component Architecture, Version 1.4,
            January 2002. All rights reserved. Page 7
            11.1 Assumptions and Assertions .......................................................................................................107
            11.2 Interfaces....................................................................................................................................107
            11.3 Theory of Operation....................................................................................................................108
            12 THEORY OF OPERATION FOR SECURE LINKS .....................................................................109
            12.1 Secure Link Terms......................................................................................................................109
            12.2 Point-of-Use Device Assumptions..............................................................................................109
            12.3 Secure Link Common Context System Description....................................................................110
            12.3.1 Authenticating Secure Subject Access................................................................................110
            12.3.2 Secure Mapping Agent........................................................................................................110
            12.3.3 Secure Annotation Agent ....................................................................................................110
            12.3.4 Context Management Interfaces .........................................................................................111
            12.3.5 Overall Secure Link Component Architecture....................................................................111
            12.4 Process for Setting a Secure Context Subject .............................................................................112
            12.5 Designating Applications for Setting/Getting Secure Subjects...................................................113
            12.6 Busy Applications......................................................................................................................113
            13 PATIENT LINK THEORY OF OPERATION...............................................................................115
            13.1 Patient Link Component Architecture ........................................................................................115
            13.2 Patient Subject ............................................................................................................................115
            13.3 Patient Mapping Agent ...............................................................................................................115
            13.4 Patient Link Context Change Process .........................................................................................116
            13.5 Stat Admissions ..........................................................................................................................116
            14 USER LINK THEORY OF OPERATION.....................................................................................117
            14.1 User Link Terms .........................................................................................................................117
            14.2 Point-of-Use Device Assumptions..............................................................................................117
            Technology and Subject-Independent Component Architecture, Version 1.4
            Page 8 HL7 Context Management Standard: Technology and Subject-Independent Component
            Architecture, Version 1.4, January 2002. All rights reserved.
            14.3 User Link Component Architecture ............................................................................................117
            14.4 User Subject...............................................................................................................................118
            14.5 User Authentication Data Is Not Part of the User Context .........................................................118
            14.6 User Link Common Context System Description.......................................................................118
            14.6.1 User Mapping Agent...........................................................................................................118
            14.6.2 Authentication Repository ..................................................................................................119
            14.6.3 Overall User Link Component Architecture .......................................................................119
            14.7 User Link Context Change Process.............................................................................................120
            14.8 Designating Applications for User Authentication .....................................................................121
            14.9 Signing on to Applications Not Designated for Authenticating Users........................................122
            14.10 Application Behavior When Launched ...................................................................................122
            14.11 Access Control Lists ...............................................................................................................122
            14.12 Changing Users.......................................................................................................................122
            14.13 Logging-Off and Application Termination .............................................................................123
            14.14 Automatic Log-Off .................................................................................................................125
            14.15 Re-authentication Time-out ....................................................................................................126
            14.16 Co-Existence with Applications Not User Link-Enabled .......................................................126
            14.17 Populating the User Mapping Agent.......................................................................................127
            14.18 Authentication Repository ......................................................................................................127
            14.18.1 Repository Implementation Considerations ....................................................................128
            14.18.2 Populating the Repository...............................................................................................128
            15 CHAIN OF TRUST ........................................................................................................................131
            15.1 User Context Change Transactions and the Chain of Trust ........................................................131
            15.2 Creating the Chain of Trust.........................................................................................................131
            15.2.1 Object Infrastructures..........................................................................................................
            下载地址
             下载地址
            按字母检索

            下载须知:
            大部份资源无需注册即可下载
            需要积分的资源要在会员中心注册会员并用 积分体系中提示的方法赚取积分才能下载。

            免责声明:
            所有资源只能用于参考学习,不能用于任何商业用途,否则后果自负!
            主站蜘蛛池模板: 国产成人一区二区精品非洲 | 99在线免费播放 | 老司机精品在线观看 | 韩国黄色一级视频 | 欧美亚洲韩国 | 精品国产一区二区三区香蕉事 | 国产精品一在线观看 | 国产成人一区二区三区免费观看 | 国产69页 | 国产成人性毛片 | 91精品在线播放 | 考逼小视频 | 91tv最新永久在线地址 | 日韩免费专区 | 成人做爰视频www片 成人做爰网站免费看 | 欧美自拍 | 日韩欧美国产亚洲 | 国产情侣一区二区 | 国产成人一区二区三区影院免费 | 久久精品视频观看 | 久久中国| 91久久免费视频 | 本土自拍 | 国产末成年女噜噜片 | 成人精品免费网站 | 成人福利在线播放 | 69国产| 1769国产精品视频免费观看 | 国产片免费观看 | 国产精品高清免费网站 | 日韩高清一区二区三区不卡 | 国产成人永久免费视 | www.亚洲黄色 | 欧美一区二区在线免费观看 | 国产精品视频播放 | 成人免费网址在线 | 国产一级做a爰片久久毛片 国产一区2区 | 欧美视频精品一区二区三区 | 69视频在线免费观看 | 94在线成人免费视频 | 国产成人久久精品推最新 |