日本一区二区不卡97,日韩熟女精品一区二区三区,99精品国产在热久久无码

蜜臀98精品国产免费观看-欧美亚洲日本高清不卡-亚洲国产精品成人久久-无码精品人妻一区二区三区中-欧美巨大黑人精品videos

  • <p id="vmkv1"></p>
      1. <sub id="vmkv1"></sub>


        獲得積分
        資料庫會員登錄
        搜索: [高級搜索]
        下載首頁 | 資源分類 | 下載排行
        您的位置: 首頁 > 標準文檔  > HL7及CDA
         
        分類導航
        下載排行
        最新資源
        hl7_ccow_arch_cm_1_4.pdf
        資源大。 資源類型:文檔
        下載積分: 0
        更多
        -->
        下載統計:總下載:0,本月下載:0,本周下載:0,今日下載:0
        發表評論 錯誤報告 加入收藏夾
        資源介紹
        hl7 1.4 標志英文完整版
        Table of Contents
        1 INTRODUCTION...............................................................................................................................19
        1.1 Clinical Context ............................................................................................................................19
        1.2 Links and Subjects ........................................................................................................................19
        1.3 Annotations and actions ................................................................................................................20
        1.4 Architecture Summary ..................................................................................................................20
        1.4.1 Component Architecture .......................................................................................................21
        1.4.2 Context Organization and Representation.............................................................................23
        1.4.3 Application Authentication ...................................................................................................23
        1.4.4 Context Transactions.............................................................................................................23
        1.4.5 Context Actions ....................................................................................................................24
        1.4.6 Context Agents......................................................................................................................24
        1.4.6.1 Mapping Agents................................................................................................................25
        1.4.6.2 Annotation Agents ............................................................................................................25
        1.4.6.3 Action Agents ...................................................................................................................25
        1.5 Reading This Document................................................................................................................25
        2 SCOPE AND OBJECTIVES................................................................................................................27
        2.1 Specification Organization............................................................................................................27
        2.2 Assumptions/Assertions................................................................................................................28
        2.3 CMA Design Center .....................................................................................................................29
        3 TECHNOLOGY NEUTRALITY.........................................................................................................31
        4 REQUIREMENTS AND CAPABILITIES ..........................................................................................33
        5 SYSTEM ARCHITECTURE ...............................................................................................................35
        5.1 Use-Model ...................................................................................................................................35
        5.2 Context Management Responsibility ............................................................................................43
        Technology and Subject-Independent Component Architecture, Version 1.4
        Page 4 HL7 Context Management Standard: Technology and Subject-Independent Component
        Architecture, Version 1.4, January 2002. All rights reserved.
        5.3 Context Change Detection ............................................................................................................43
        5.4 Context Data Representation ........................................................................................................44
        5.5 Context Data Access .....................................................................................................................44
        5.6 Context Data Interpretation...........................................................................................................45
        5.6.1 Context Subject Data Definition Constraints ........................................................................46
        5.6.2 Establishing the Meaning of Context Data Item Names .......................................................46
        5.6.3 Establishing the Meaning of Context Data Item Values .......................................................46
        5.6.4 Representing Context Subjects That Cannot Be Uniquely Identified ...................................47
        5.6.5 Context Subjects and Item Name Format .............................................................................47
        5.6.6 Standard Context Subjects and Data Items ...........................................................................47
        5.6.7 Non-Standard Context Subjects and Data Items ...................................................................47
        5.6.8 Representing “Null” Item Values..........................................................................................48
        5.6.9 Representing an Empty Context Subject...............................................................................48
        5.6.10 Case Sensitivity with Regard to Item Names and Item Values.............................................48
        6 COMPONENT MODEL ......................................................................................................................51
        6.1 Component and Interface Concepts ..............................................................................................51
        6.1.1 Interfaces and References .....................................................................................................51
        6.1.2 Interface Interrogation...........................................................................................................52
        6.1.3 Principal Interface .................................................................................................................52
        6.1.4 Context Management Registry..............................................................................................52
        6.1.5 Interface Reference Management .........................................................................................53
        7 CONTEXT SESSION MANAGEMENT.............................................................................................55
        7.1 Context Session Defined...............................................................................................................55
        7.2 Context Session Use Models.........................................................................................................56
        7.2.1 Shared Clinical Workstation .................................................................................................56
        7.2.2 Interrupt-Driven User............................................................................................................56
        7.3 Theory of Operation......................................................................................................................56
        7.4 Context Session Management Policies .........................................................................................57
        7.4.1 Creating a Context Session ...................................................................................................57
        7.4.2 Cloning Context Data............................................................................................................57
        Technology and Subject-Independent Component Architecture, Version 1.4
        HL7 Context Management Standard: Technology and Subject-Independent Component Architecture, Version 1.4,
        January 2002. All rights reserved. Page 5
        7.4.3 Deactivated Sessions.............................................................................................................58
        7.4.4 Session Participation .............................................................................................................58
        7.4.5 Activating a Deactivated Session..........................................................................................58
        7.4.6 Session Termination..............................................................................................................58
        7.4.7 No Active Session.................................................................................................................59
        8 GENERAL THEORY OF OPERATION FOR CLINICAL LINKS ....................................................61
        8.1 Multiple Subjects and the Meaning of “Link” ..............................................................................61
        8.1.1 Context Manager Support for Multiple Context Subjects.....................................................61
        8.1.2 Effect of Multiple Subjects on Context Change Transaction ................................................62
        8.1.3 Context Manager Treatment of Multi-Subject Context Data ................................................62
        8.1.4 Effect of Multiple Subjects on Mapping Agents...................................................................63
        8.1.5 Effect of Multiple Subjects on Annotation Agents ...............................................................63
        8.1.6 Application Treatment of Multiple Subjects.........................................................................63
        8.2 Context Subjects Dependencies ....................................................................................................63
        8.3 Empty Contexts Subjects ..............................................................................................................65
        9 THEORY OF OPERATION FOR COMMON LINKS........................................................................67
        9.1 Component Architecture for Common Links................................................................................67
        9.2 Mapping Agents...........................................................................................................................68
        9.3 Annotation Agents ........................................................................................................................69
        9.4 Context Change Transactions .......................................................................................................69
        9.5 Joining a Common Context Session .............................................................................................70
        9.6 Context Change Transactions .......................................................................................................70
        9.7 Transactional Consistency ............................................................................................................71
        9.8 Context Change Notification Process ...........................................................................................71
        9.9 Leaving a Common Context Session ............................................................................................73
        9.10 Behavioral Details........................................................................................................................73
        9.10.1 Notification Policy When Context Data is Not Changed During A Transaction ..................73
        Technology and Subject-Independent Component Architecture, Version 1.4
        Page 6 HL7 Context Management Standard: Technology and Subject-Independent Component
        Architecture, Version 1.4, January 2002. All rights reserved.
        9.10.2 Application Behavior When it Cannot Cancel Context Changes..........................................73
        9.10.3 Application Behavior When it Does Not Understand Context Identifiers ............................74
        9.10.4 Application Behavior with Regard to an Empty Context......................................................74
        9.10.5 Surveying Details..................................................................................................................74
        9.11 Common Clinical Context Use Model..........................................................................................75
        9.11.1 Lifecycle of Common Context..............................................................................................76
        9.11.2 Context Selection Change Use Case .....................................................................................80
        9.11.3 Abnormal Termination of Common Context Use Case ........................................................89
        9.12 Optimizations...............................................................................................................................91
        9.13 The Simplest Application..............................................................................................................91
        10 MAPPING AGENTS........................................................................................................................95
        10.1 Assumptions and Assertions .........................................................................................................95
        10.2 Interfaces......................................................................................................................................96
        10.3 Theory of Operation......................................................................................................................96
        10.3.1 Mapping Agents and Secure Context Subjects .....................................................................97
        10.3.2 Initializing a Context Session When a Mapping Agent is Present ........................................97
        10.3.3 Calling Sequence When Multiple Mapping Agents are Present ...........................................98
        10.3.4 Terminating a Context Session When a Mapping Agent is Present......................................98
        10.3.5 Distinguishing Between Mapping Agents and Context Participants.....................................99
        10.3.6 Mapping Agent Updates to Context Data .............................................................................99
        10.3.7 Conditions for Mapping Agent Invalidation of Context Changes.......................................100
        10.3.8 Treatment of Mapping Agent Invalidation of Context Changes .........................................101
        10.3.9 Mapping Null-Valued Identifiers........................................................................................102
        10.3.10 Initializing Mapping Agents ...........................................................................................103
        10.3.11 Handling Mapping Agent Failures..................................................................................104
        10.4 Mapping Agent Effect on Application Security Policies ............................................................104
        10.5 Identifying Mapping Agent Implementations .............................................................................104
        10.6 Performance Costs and Optimizations ........................................................................................105
        11 ANNOTATION AGENTS .............................................................................................................107
        Technology and Subject-Independent Component Architecture, Version 1.4
        HL7 Context Management Standard: Technology and Subject-Independent Component Architecture, Version 1.4,
        January 2002. All rights reserved. Page 7
        11.1 Assumptions and Assertions .......................................................................................................107
        11.2 Interfaces....................................................................................................................................107
        11.3 Theory of Operation....................................................................................................................108
        12 THEORY OF OPERATION FOR SECURE LINKS .....................................................................109
        12.1 Secure Link Terms......................................................................................................................109
        12.2 Point-of-Use Device Assumptions..............................................................................................109
        12.3 Secure Link Common Context System Description....................................................................110
        12.3.1 Authenticating Secure Subject Access................................................................................110
        12.3.2 Secure Mapping Agent........................................................................................................110
        12.3.3 Secure Annotation Agent ....................................................................................................110
        12.3.4 Context Management Interfaces .........................................................................................111
        12.3.5 Overall Secure Link Component Architecture....................................................................111
        12.4 Process for Setting a Secure Context Subject .............................................................................112
        12.5 Designating Applications for Setting/Getting Secure Subjects...................................................113
        12.6 Busy Applications......................................................................................................................113
        13 PATIENT LINK THEORY OF OPERATION...............................................................................115
        13.1 Patient Link Component Architecture ........................................................................................115
        13.2 Patient Subject ............................................................................................................................115
        13.3 Patient Mapping Agent ...............................................................................................................115
        13.4 Patient Link Context Change Process .........................................................................................116
        13.5 Stat Admissions ..........................................................................................................................116
        14 USER LINK THEORY OF OPERATION.....................................................................................117
        14.1 User Link Terms .........................................................................................................................117
        14.2 Point-of-Use Device Assumptions..............................................................................................117
        Technology and Subject-Independent Component Architecture, Version 1.4
        Page 8 HL7 Context Management Standard: Technology and Subject-Independent Component
        Architecture, Version 1.4, January 2002. All rights reserved.
        14.3 User Link Component Architecture ............................................................................................117
        14.4 User Subject...............................................................................................................................118
        14.5 User Authentication Data Is Not Part of the User Context .........................................................118
        14.6 User Link Common Context System Description.......................................................................118
        14.6.1 User Mapping Agent...........................................................................................................118
        14.6.2 Authentication Repository ..................................................................................................119
        14.6.3 Overall User Link Component Architecture .......................................................................119
        14.7 User Link Context Change Process.............................................................................................120
        14.8 Designating Applications for User Authentication .....................................................................121
        14.9 Signing on to Applications Not Designated for Authenticating Users........................................122
        14.10 Application Behavior When Launched ...................................................................................122
        14.11 Access Control Lists ...............................................................................................................122
        14.12 Changing Users.......................................................................................................................122
        14.13 Logging-Off and Application Termination .............................................................................123
        14.14 Automatic Log-Off .................................................................................................................125
        14.15 Re-authentication Time-out ....................................................................................................126
        14.16 Co-Existence with Applications Not User Link-Enabled .......................................................126
        14.17 Populating the User Mapping Agent.......................................................................................127
        14.18 Authentication Repository ......................................................................................................127
        14.18.1 Repository Implementation Considerations ....................................................................128
        14.18.2 Populating the Repository...............................................................................................128
        15 CHAIN OF TRUST ........................................................................................................................131
        15.1 User Context Change Transactions and the Chain of Trust ........................................................131
        15.2 Creating the Chain of Trust.........................................................................................................131
        15.2.1 Object Infrastructures..........................................................................................................
        下載地址
         下載地址
        按字母檢索

        下載須知:
        大部份資源無需注冊即可下載
        需要積分的資源要在會員中心注冊會員并用 積分體系中提示的方法賺取積分才能下載。

        免責聲明:
        所有資源只能用于參考學習,不能用于任何商業用途,否則后果自負!
        主站蜘蛛池模板: 波多野42部无码喷潮在线| 久久精品国产99国产精品| 亚洲精品乱码久久久久久| 国产成人亚洲综合色影视| 日韩午夜精品免费理论片| 高清国产天干天干天干不卡顿| 国产午夜高潮熟女精品av| 欧美无线码一区在线观看| 国产精品久久久精品一区| 无套内谢少妇毛片aaaa片免费| 免费观看又污又黄的网站| 国产日韩综合一区在线观看| 人人妻人人爽日日人人| 狠狠婷婷综合久久久久久| 国产精品久久人妻互换毛片| 狠狠色狠狠色狠狠五月| 黑人大荫道bbwbbb高潮潮喷| 亚洲国产成人久久综合同性| 欧美成人a在线网站| 欧美日韩成人一区| 视频一区二区免费| 国产精品久久二区二区| 国产成人啪精品午夜网站a片免费| 精品乱码卡1卡2卡3免费开放| 久久国产热这里只有精品| 99热精品国产三级在线| 少妇人妻一区二区三区| 黄色国产视频| 欧美丰满肥婆videos| 男女裸体影院高潮| 亚洲成a人片在线观看www| 欧美日韓性视頻在線| 欧美日韩视频在线观看一区二区三区| 日本一区二区三区免费播放视频了 | 无码人妻丰满熟妇啪啪网不卡 | 伊人久久五月丁香综合中文亚洲| 亚洲欧美日韩综合俺去了| 国产欧美成aⅴ人高清| 五月激情视频一区二区| 欧美人与动人物牲交免费观看久久 | 亚洲淫片一区二区三区|