精品美女在线观看,色网站观看,久久一级毛片

a级一a一级在线观看_a级在线观看视频_a极毛片_a毛片_全部免费毛片在线播放_全部孕妇丰满孕妇孕交


        获得积分
        资料库会员登录
        搜索: [高级搜索]
        下载首页 | 资源分类 | 下载排行
        您的位置: 首页 > 标准文档  > HL7及CDA
         
        分类导航
        下载排行
        最新资源
        hl7_ccow_arch_cm_1_4.pdf
        资源大小: 资源类型:文档
        下载积分: 0
        更多
        -->
        下载统计:总下载:0,本月下载:0,本周下载:0,今日下载:0
        发表评论 错误报告 加入收藏夹
        资源介绍
        hl7 1.4 标志英文完整版
        Table of Contents
        1 INTRODUCTION...............................................................................................................................19
        1.1 Clinical Context ............................................................................................................................19
        1.2 Links and Subjects ........................................................................................................................19
        1.3 Annotations and actions ................................................................................................................20
        1.4 Architecture Summary ..................................................................................................................20
        1.4.1 Component Architecture .......................................................................................................21
        1.4.2 Context Organization and Representation.............................................................................23
        1.4.3 Application Authentication ...................................................................................................23
        1.4.4 Context Transactions.............................................................................................................23
        1.4.5 Context Actions ....................................................................................................................24
        1.4.6 Context Agents......................................................................................................................24
        1.4.6.1 Mapping Agents................................................................................................................25
        1.4.6.2 Annotation Agents ............................................................................................................25
        1.4.6.3 Action Agents ...................................................................................................................25
        1.5 Reading This Document................................................................................................................25
        2 SCOPE AND OBJECTIVES................................................................................................................27
        2.1 Specification Organization............................................................................................................27
        2.2 Assumptions/Assertions................................................................................................................28
        2.3 CMA Design Center .....................................................................................................................29
        3 TECHNOLOGY NEUTRALITY.........................................................................................................31
        4 REQUIREMENTS AND CAPABILITIES ..........................................................................................33
        5 SYSTEM ARCHITECTURE ...............................................................................................................35
        5.1 Use-Model ...................................................................................................................................35
        5.2 Context Management Responsibility ............................................................................................43
        Technology and Subject-Independent Component Architecture, Version 1.4
        Page 4 HL7 Context Management Standard: Technology and Subject-Independent Component
        Architecture, Version 1.4, January 2002. All rights reserved.
        5.3 Context Change Detection ............................................................................................................43
        5.4 Context Data Representation ........................................................................................................44
        5.5 Context Data Access .....................................................................................................................44
        5.6 Context Data Interpretation...........................................................................................................45
        5.6.1 Context Subject Data Definition Constraints ........................................................................46
        5.6.2 Establishing the Meaning of Context Data Item Names .......................................................46
        5.6.3 Establishing the Meaning of Context Data Item Values .......................................................46
        5.6.4 Representing Context Subjects That Cannot Be Uniquely Identified ...................................47
        5.6.5 Context Subjects and Item Name Format .............................................................................47
        5.6.6 Standard Context Subjects and Data Items ...........................................................................47
        5.6.7 Non-Standard Context Subjects and Data Items ...................................................................47
        5.6.8 Representing “Null” Item Values..........................................................................................48
        5.6.9 Representing an Empty Context Subject...............................................................................48
        5.6.10 Case Sensitivity with Regard to Item Names and Item Values.............................................48
        6 COMPONENT MODEL ......................................................................................................................51
        6.1 Component and Interface Concepts ..............................................................................................51
        6.1.1 Interfaces and References .....................................................................................................51
        6.1.2 Interface Interrogation...........................................................................................................52
        6.1.3 Principal Interface .................................................................................................................52
        6.1.4 Context Management Registry..............................................................................................52
        6.1.5 Interface Reference Management .........................................................................................53
        7 CONTEXT SESSION MANAGEMENT.............................................................................................55
        7.1 Context Session Defined...............................................................................................................55
        7.2 Context Session Use Models.........................................................................................................56
        7.2.1 Shared Clinical Workstation .................................................................................................56
        7.2.2 Interrupt-Driven User............................................................................................................56
        7.3 Theory of Operation......................................................................................................................56
        7.4 Context Session Management Policies .........................................................................................57
        7.4.1 Creating a Context Session ...................................................................................................57
        7.4.2 Cloning Context Data............................................................................................................57
        Technology and Subject-Independent Component Architecture, Version 1.4
        HL7 Context Management Standard: Technology and Subject-Independent Component Architecture, Version 1.4,
        January 2002. All rights reserved. Page 5
        7.4.3 Deactivated Sessions.............................................................................................................58
        7.4.4 Session Participation .............................................................................................................58
        7.4.5 Activating a Deactivated Session..........................................................................................58
        7.4.6 Session Termination..............................................................................................................58
        7.4.7 No Active Session.................................................................................................................59
        8 GENERAL THEORY OF OPERATION FOR CLINICAL LINKS ....................................................61
        8.1 Multiple Subjects and the Meaning of “Link” ..............................................................................61
        8.1.1 Context Manager Support for Multiple Context Subjects.....................................................61
        8.1.2 Effect of Multiple Subjects on Context Change Transaction ................................................62
        8.1.3 Context Manager Treatment of Multi-Subject Context Data ................................................62
        8.1.4 Effect of Multiple Subjects on Mapping Agents...................................................................63
        8.1.5 Effect of Multiple Subjects on Annotation Agents ...............................................................63
        8.1.6 Application Treatment of Multiple Subjects.........................................................................63
        8.2 Context Subjects Dependencies ....................................................................................................63
        8.3 Empty Contexts Subjects ..............................................................................................................65
        9 THEORY OF OPERATION FOR COMMON LINKS........................................................................67
        9.1 Component Architecture for Common Links................................................................................67
        9.2 Mapping Agents...........................................................................................................................68
        9.3 Annotation Agents ........................................................................................................................69
        9.4 Context Change Transactions .......................................................................................................69
        9.5 Joining a Common Context Session .............................................................................................70
        9.6 Context Change Transactions .......................................................................................................70
        9.7 Transactional Consistency ............................................................................................................71
        9.8 Context Change Notification Process ...........................................................................................71
        9.9 Leaving a Common Context Session ............................................................................................73
        9.10 Behavioral Details........................................................................................................................73
        9.10.1 Notification Policy When Context Data is Not Changed During A Transaction ..................73
        Technology and Subject-Independent Component Architecture, Version 1.4
        Page 6 HL7 Context Management Standard: Technology and Subject-Independent Component
        Architecture, Version 1.4, January 2002. All rights reserved.
        9.10.2 Application Behavior When it Cannot Cancel Context Changes..........................................73
        9.10.3 Application Behavior When it Does Not Understand Context Identifiers ............................74
        9.10.4 Application Behavior with Regard to an Empty Context......................................................74
        9.10.5 Surveying Details..................................................................................................................74
        9.11 Common Clinical Context Use Model..........................................................................................75
        9.11.1 Lifecycle of Common Context..............................................................................................76
        9.11.2 Context Selection Change Use Case .....................................................................................80
        9.11.3 Abnormal Termination of Common Context Use Case ........................................................89
        9.12 Optimizations...............................................................................................................................91
        9.13 The Simplest Application..............................................................................................................91
        10 MAPPING AGENTS........................................................................................................................95
        10.1 Assumptions and Assertions .........................................................................................................95
        10.2 Interfaces......................................................................................................................................96
        10.3 Theory of Operation......................................................................................................................96
        10.3.1 Mapping Agents and Secure Context Subjects .....................................................................97
        10.3.2 Initializing a Context Session When a Mapping Agent is Present ........................................97
        10.3.3 Calling Sequence When Multiple Mapping Agents are Present ...........................................98
        10.3.4 Terminating a Context Session When a Mapping Agent is Present......................................98
        10.3.5 Distinguishing Between Mapping Agents and Context Participants.....................................99
        10.3.6 Mapping Agent Updates to Context Data .............................................................................99
        10.3.7 Conditions for Mapping Agent Invalidation of Context Changes.......................................100
        10.3.8 Treatment of Mapping Agent Invalidation of Context Changes .........................................101
        10.3.9 Mapping Null-Valued Identifiers........................................................................................102
        10.3.10 Initializing Mapping Agents ...........................................................................................103
        10.3.11 Handling Mapping Agent Failures..................................................................................104
        10.4 Mapping Agent Effect on Application Security Policies ............................................................104
        10.5 Identifying Mapping Agent Implementations .............................................................................104
        10.6 Performance Costs and Optimizations ........................................................................................105
        11 ANNOTATION AGENTS .............................................................................................................107
        Technology and Subject-Independent Component Architecture, Version 1.4
        HL7 Context Management Standard: Technology and Subject-Independent Component Architecture, Version 1.4,
        January 2002. All rights reserved. Page 7
        11.1 Assumptions and Assertions .......................................................................................................107
        11.2 Interfaces....................................................................................................................................107
        11.3 Theory of Operation....................................................................................................................108
        12 THEORY OF OPERATION FOR SECURE LINKS .....................................................................109
        12.1 Secure Link Terms......................................................................................................................109
        12.2 Point-of-Use Device Assumptions..............................................................................................109
        12.3 Secure Link Common Context System Description....................................................................110
        12.3.1 Authenticating Secure Subject Access................................................................................110
        12.3.2 Secure Mapping Agent........................................................................................................110
        12.3.3 Secure Annotation Agent ....................................................................................................110
        12.3.4 Context Management Interfaces .........................................................................................111
        12.3.5 Overall Secure Link Component Architecture....................................................................111
        12.4 Process for Setting a Secure Context Subject .............................................................................112
        12.5 Designating Applications for Setting/Getting Secure Subjects...................................................113
        12.6 Busy Applications......................................................................................................................113
        13 PATIENT LINK THEORY OF OPERATION...............................................................................115
        13.1 Patient Link Component Architecture ........................................................................................115
        13.2 Patient Subject ............................................................................................................................115
        13.3 Patient Mapping Agent ...............................................................................................................115
        13.4 Patient Link Context Change Process .........................................................................................116
        13.5 Stat Admissions ..........................................................................................................................116
        14 USER LINK THEORY OF OPERATION.....................................................................................117
        14.1 User Link Terms .........................................................................................................................117
        14.2 Point-of-Use Device Assumptions..............................................................................................117
        Technology and Subject-Independent Component Architecture, Version 1.4
        Page 8 HL7 Context Management Standard: Technology and Subject-Independent Component
        Architecture, Version 1.4, January 2002. All rights reserved.
        14.3 User Link Component Architecture ............................................................................................117
        14.4 User Subject...............................................................................................................................118
        14.5 User Authentication Data Is Not Part of the User Context .........................................................118
        14.6 User Link Common Context System Description.......................................................................118
        14.6.1 User Mapping Agent...........................................................................................................118
        14.6.2 Authentication Repository ..................................................................................................119
        14.6.3 Overall User Link Component Architecture .......................................................................119
        14.7 User Link Context Change Process.............................................................................................120
        14.8 Designating Applications for User Authentication .....................................................................121
        14.9 Signing on to Applications Not Designated for Authenticating Users........................................122
        14.10 Application Behavior When Launched ...................................................................................122
        14.11 Access Control Lists ...............................................................................................................122
        14.12 Changing Users.......................................................................................................................122
        14.13 Logging-Off and Application Termination .............................................................................123
        14.14 Automatic Log-Off .................................................................................................................125
        14.15 Re-authentication Time-out ....................................................................................................126
        14.16 Co-Existence with Applications Not User Link-Enabled .......................................................126
        14.17 Populating the User Mapping Agent.......................................................................................127
        14.18 Authentication Repository ......................................................................................................127
        14.18.1 Repository Implementation Considerations ....................................................................128
        14.18.2 Populating the Repository...............................................................................................128
        15 CHAIN OF TRUST ........................................................................................................................131
        15.1 User Context Change Transactions and the Chain of Trust ........................................................131
        15.2 Creating the Chain of Trust.........................................................................................................131
        15.2.1 Object Infrastructures..........................................................................................................
        下载地址
         下载地址
        按字母检索

        下载须知:
        大部份资源无需注册即可下载
        需要积分的资源要在会员中心注册会员并用 积分体系中提示的方法赚取积分才能下载。

        免责声明:
        所有资源只能用于参考学习,不能用于任何商业用途,否则后果自负!
        主站蜘蛛池模板: 国产福利在线小视频 | 激情奇米 | 日韩欧美手机在线 | 国产一区精品在线观看 | 啪啪99久久综合精品色 | 欧美三级在线观看视频 | 极品女神白富美露脸啪啪 | 欧美精品在线一区二区三区 | 国产精品一区高清在线观看 | 国产亚洲欧美久久精品 | 精品国产日韩一区三区 | 999福利视频 | 激情国产视频 | 成人亚洲网 | 国产成人91一区二区三区 | 91视频免费入口 | 久久精品爱国产免费久久 | 欧美午夜视频 | 国产精品国内免费一区二区三区 | 99视频网站 | 欧洲亚洲一区二区三区 | 国产特级黄色片 | 成人欧美一区二区三区视频 | a网站免费 | 精品一区二区三区中文 | sao虎在线精品永久 snh48欧洲大片在线观看 | 国产传媒一区二区三区呀 | 精品一区二区三区中文字幕 | 奇米色在线视频 | 成人午夜影视全部免费看 | 国产伦理久久精品久久久久 | 成人在免费观看视频国产 | 日韩免费高清视频网站 | 成人18毛片 | 欧美亚洲视频 | 国产精品一区二 | 青青视频免费观看在线播放 | 成人午夜在线观看国产 | 精品国产免费人成高清 | 国产一区三区二区中文在线 | 国内精品免费久久久久妲己 |