久久久久国产精品www,五月天国产在线,www99com

医盟网-全国首家医疗信息化行业门户网站

<fieldset id="kqooo"><kbd id="kqooo"></kbd></fieldset>
  • <sup id="kqooo"><dl id="kqooo"></dl></sup><sup id="kqooo"><dl id="kqooo"></dl></sup><sup id="kqooo"></sup>
  • <tfoot id="kqooo"><code id="kqooo"></code></tfoot>

  • 獲得積分
    資料庫會員登錄
    搜索: [高級搜索]
    下載首頁 | 資源分類 | 下載排行
    您的位置: 首頁 > 標準文檔  > HL7及CDA
     
    分類導航
    下載排行
    最新資源
    hl7_ccow_arch_cm_1_4.pdf
    資源大小: 資源類型:文檔
    下載積分: 0
    更多
    -->
    下載統計:總下載:0,本月下載:0,本周下載:0,今日下載:0
    發表評論 錯誤報告 加入收藏夾
    資源介紹
    hl7 1.4 標志英文完整版
    Table of Contents
    1 INTRODUCTION...............................................................................................................................19
    1.1 Clinical Context ............................................................................................................................19
    1.2 Links and Subjects ........................................................................................................................19
    1.3 Annotations and actions ................................................................................................................20
    1.4 Architecture Summary ..................................................................................................................20
    1.4.1 Component Architecture .......................................................................................................21
    1.4.2 Context Organization and Representation.............................................................................23
    1.4.3 Application Authentication ...................................................................................................23
    1.4.4 Context Transactions.............................................................................................................23
    1.4.5 Context Actions ....................................................................................................................24
    1.4.6 Context Agents......................................................................................................................24
    1.4.6.1 Mapping Agents................................................................................................................25
    1.4.6.2 Annotation Agents ............................................................................................................25
    1.4.6.3 Action Agents ...................................................................................................................25
    1.5 Reading This Document................................................................................................................25
    2 SCOPE AND OBJECTIVES................................................................................................................27
    2.1 Specification Organization............................................................................................................27
    2.2 Assumptions/Assertions................................................................................................................28
    2.3 CMA Design Center .....................................................................................................................29
    3 TECHNOLOGY NEUTRALITY.........................................................................................................31
    4 REQUIREMENTS AND CAPABILITIES ..........................................................................................33
    5 SYSTEM ARCHITECTURE ...............................................................................................................35
    5.1 Use-Model ...................................................................................................................................35
    5.2 Context Management Responsibility ............................................................................................43
    Technology and Subject-Independent Component Architecture, Version 1.4
    Page 4 HL7 Context Management Standard: Technology and Subject-Independent Component
    Architecture, Version 1.4, January 2002. All rights reserved.
    5.3 Context Change Detection ............................................................................................................43
    5.4 Context Data Representation ........................................................................................................44
    5.5 Context Data Access .....................................................................................................................44
    5.6 Context Data Interpretation...........................................................................................................45
    5.6.1 Context Subject Data Definition Constraints ........................................................................46
    5.6.2 Establishing the Meaning of Context Data Item Names .......................................................46
    5.6.3 Establishing the Meaning of Context Data Item Values .......................................................46
    5.6.4 Representing Context Subjects That Cannot Be Uniquely Identified ...................................47
    5.6.5 Context Subjects and Item Name Format .............................................................................47
    5.6.6 Standard Context Subjects and Data Items ...........................................................................47
    5.6.7 Non-Standard Context Subjects and Data Items ...................................................................47
    5.6.8 Representing “Null” Item Values..........................................................................................48
    5.6.9 Representing an Empty Context Subject...............................................................................48
    5.6.10 Case Sensitivity with Regard to Item Names and Item Values.............................................48
    6 COMPONENT MODEL ......................................................................................................................51
    6.1 Component and Interface Concepts ..............................................................................................51
    6.1.1 Interfaces and References .....................................................................................................51
    6.1.2 Interface Interrogation...........................................................................................................52
    6.1.3 Principal Interface .................................................................................................................52
    6.1.4 Context Management Registry..............................................................................................52
    6.1.5 Interface Reference Management .........................................................................................53
    7 CONTEXT SESSION MANAGEMENT.............................................................................................55
    7.1 Context Session Defined...............................................................................................................55
    7.2 Context Session Use Models.........................................................................................................56
    7.2.1 Shared Clinical Workstation .................................................................................................56
    7.2.2 Interrupt-Driven User............................................................................................................56
    7.3 Theory of Operation......................................................................................................................56
    7.4 Context Session Management Policies .........................................................................................57
    7.4.1 Creating a Context Session ...................................................................................................57
    7.4.2 Cloning Context Data............................................................................................................57
    Technology and Subject-Independent Component Architecture, Version 1.4
    HL7 Context Management Standard: Technology and Subject-Independent Component Architecture, Version 1.4,
    January 2002. All rights reserved. Page 5
    7.4.3 Deactivated Sessions.............................................................................................................58
    7.4.4 Session Participation .............................................................................................................58
    7.4.5 Activating a Deactivated Session..........................................................................................58
    7.4.6 Session Termination..............................................................................................................58
    7.4.7 No Active Session.................................................................................................................59
    8 GENERAL THEORY OF OPERATION FOR CLINICAL LINKS ....................................................61
    8.1 Multiple Subjects and the Meaning of “Link” ..............................................................................61
    8.1.1 Context Manager Support for Multiple Context Subjects.....................................................61
    8.1.2 Effect of Multiple Subjects on Context Change Transaction ................................................62
    8.1.3 Context Manager Treatment of Multi-Subject Context Data ................................................62
    8.1.4 Effect of Multiple Subjects on Mapping Agents...................................................................63
    8.1.5 Effect of Multiple Subjects on Annotation Agents ...............................................................63
    8.1.6 Application Treatment of Multiple Subjects.........................................................................63
    8.2 Context Subjects Dependencies ....................................................................................................63
    8.3 Empty Contexts Subjects ..............................................................................................................65
    9 THEORY OF OPERATION FOR COMMON LINKS........................................................................67
    9.1 Component Architecture for Common Links................................................................................67
    9.2 Mapping Agents...........................................................................................................................68
    9.3 Annotation Agents ........................................................................................................................69
    9.4 Context Change Transactions .......................................................................................................69
    9.5 Joining a Common Context Session .............................................................................................70
    9.6 Context Change Transactions .......................................................................................................70
    9.7 Transactional Consistency ............................................................................................................71
    9.8 Context Change Notification Process ...........................................................................................71
    9.9 Leaving a Common Context Session ............................................................................................73
    9.10 Behavioral Details........................................................................................................................73
    9.10.1 Notification Policy When Context Data is Not Changed During A Transaction ..................73
    Technology and Subject-Independent Component Architecture, Version 1.4
    Page 6 HL7 Context Management Standard: Technology and Subject-Independent Component
    Architecture, Version 1.4, January 2002. All rights reserved.
    9.10.2 Application Behavior When it Cannot Cancel Context Changes..........................................73
    9.10.3 Application Behavior When it Does Not Understand Context Identifiers ............................74
    9.10.4 Application Behavior with Regard to an Empty Context......................................................74
    9.10.5 Surveying Details..................................................................................................................74
    9.11 Common Clinical Context Use Model..........................................................................................75
    9.11.1 Lifecycle of Common Context..............................................................................................76
    9.11.2 Context Selection Change Use Case .....................................................................................80
    9.11.3 Abnormal Termination of Common Context Use Case ........................................................89
    9.12 Optimizations...............................................................................................................................91
    9.13 The Simplest Application..............................................................................................................91
    10 MAPPING AGENTS........................................................................................................................95
    10.1 Assumptions and Assertions .........................................................................................................95
    10.2 Interfaces......................................................................................................................................96
    10.3 Theory of Operation......................................................................................................................96
    10.3.1 Mapping Agents and Secure Context Subjects .....................................................................97
    10.3.2 Initializing a Context Session When a Mapping Agent is Present ........................................97
    10.3.3 Calling Sequence When Multiple Mapping Agents are Present ...........................................98
    10.3.4 Terminating a Context Session When a Mapping Agent is Present......................................98
    10.3.5 Distinguishing Between Mapping Agents and Context Participants.....................................99
    10.3.6 Mapping Agent Updates to Context Data .............................................................................99
    10.3.7 Conditions for Mapping Agent Invalidation of Context Changes.......................................100
    10.3.8 Treatment of Mapping Agent Invalidation of Context Changes .........................................101
    10.3.9 Mapping Null-Valued Identifiers........................................................................................102
    10.3.10 Initializing Mapping Agents ...........................................................................................103
    10.3.11 Handling Mapping Agent Failures..................................................................................104
    10.4 Mapping Agent Effect on Application Security Policies ............................................................104
    10.5 Identifying Mapping Agent Implementations .............................................................................104
    10.6 Performance Costs and Optimizations ........................................................................................105
    11 ANNOTATION AGENTS .............................................................................................................107
    Technology and Subject-Independent Component Architecture, Version 1.4
    HL7 Context Management Standard: Technology and Subject-Independent Component Architecture, Version 1.4,
    January 2002. All rights reserved. Page 7
    11.1 Assumptions and Assertions .......................................................................................................107
    11.2 Interfaces....................................................................................................................................107
    11.3 Theory of Operation....................................................................................................................108
    12 THEORY OF OPERATION FOR SECURE LINKS .....................................................................109
    12.1 Secure Link Terms......................................................................................................................109
    12.2 Point-of-Use Device Assumptions..............................................................................................109
    12.3 Secure Link Common Context System Description....................................................................110
    12.3.1 Authenticating Secure Subject Access................................................................................110
    12.3.2 Secure Mapping Agent........................................................................................................110
    12.3.3 Secure Annotation Agent ....................................................................................................110
    12.3.4 Context Management Interfaces .........................................................................................111
    12.3.5 Overall Secure Link Component Architecture....................................................................111
    12.4 Process for Setting a Secure Context Subject .............................................................................112
    12.5 Designating Applications for Setting/Getting Secure Subjects...................................................113
    12.6 Busy Applications......................................................................................................................113
    13 PATIENT LINK THEORY OF OPERATION...............................................................................115
    13.1 Patient Link Component Architecture ........................................................................................115
    13.2 Patient Subject ............................................................................................................................115
    13.3 Patient Mapping Agent ...............................................................................................................115
    13.4 Patient Link Context Change Process .........................................................................................116
    13.5 Stat Admissions ..........................................................................................................................116
    14 USER LINK THEORY OF OPERATION.....................................................................................117
    14.1 User Link Terms .........................................................................................................................117
    14.2 Point-of-Use Device Assumptions..............................................................................................117
    Technology and Subject-Independent Component Architecture, Version 1.4
    Page 8 HL7 Context Management Standard: Technology and Subject-Independent Component
    Architecture, Version 1.4, January 2002. All rights reserved.
    14.3 User Link Component Architecture ............................................................................................117
    14.4 User Subject...............................................................................................................................118
    14.5 User Authentication Data Is Not Part of the User Context .........................................................118
    14.6 User Link Common Context System Description.......................................................................118
    14.6.1 User Mapping Agent...........................................................................................................118
    14.6.2 Authentication Repository ..................................................................................................119
    14.6.3 Overall User Link Component Architecture .......................................................................119
    14.7 User Link Context Change Process.............................................................................................120
    14.8 Designating Applications for User Authentication .....................................................................121
    14.9 Signing on to Applications Not Designated for Authenticating Users........................................122
    14.10 Application Behavior When Launched ...................................................................................122
    14.11 Access Control Lists ...............................................................................................................122
    14.12 Changing Users.......................................................................................................................122
    14.13 Logging-Off and Application Termination .............................................................................123
    14.14 Automatic Log-Off .................................................................................................................125
    14.15 Re-authentication Time-out ....................................................................................................126
    14.16 Co-Existence with Applications Not User Link-Enabled .......................................................126
    14.17 Populating the User Mapping Agent.......................................................................................127
    14.18 Authentication Repository ......................................................................................................127
    14.18.1 Repository Implementation Considerations ....................................................................128
    14.18.2 Populating the Repository...............................................................................................128
    15 CHAIN OF TRUST ........................................................................................................................131
    15.1 User Context Change Transactions and the Chain of Trust ........................................................131
    15.2 Creating the Chain of Trust.........................................................................................................131
    15.2.1 Object Infrastructures..........................................................................................................
    下載地址
     下載地址
    按字母檢索

    下載須知:
    大部份資源無需注冊即可下載
    需要積分的資源要在會員中心注冊會員并用 積分體系中提示的方法賺取積分才能下載。

    免責聲明:
    所有資源只能用于參考學習,不能用于任何商業用途,否則后果自負!
    主站蜘蛛池模板: 数造云-面向3D打印的云制造平台| 长春互联网运营值选星广传媒,长春短视频运营,长春新媒体运营,长春互联网运营,长春抖音运营,吉林视频号代运营,吉林快手代运营,短视频推广公司,公众号运营,微博运营,新媒体运营 | 康拓威技术(深圳)有限公司|Theia镜头代理商|安讯士AXIS摄像机|安讯士监控系统|博世BOSCH监控|博世会议系统|索尼SONY监控|松下PANASONIC监控|三星韩华SAMSUNG监控|霍尼韦尔Honeywell|海康|大华|华为监控|Theia无畸变镜头|AXIS监控|安讯视摄像机 | 食品厂净化工程-无尘车间装修改造-净化工程-洁净工程-苏州远盈净化公司 | 喵走共享单车网 - 共享电动车_共享电单车骑行门户网站 倡导绿色出行 | 企业认证-山东环鲁认证管理有限公司 | 真空上料机_加料机_天津自动上料机_投料站_包装机加料_吸料机_粉体称重-天津市飞云粉体设备有限公司 | 西安西玛电机销售,西安西玛电机有限公司(原泰富西玛西安电机厂) 西安西雷脉冲功率技术有限公司-高压调制器/加速器与脉冲功率系统的研发/生产/应用推广/高压脉冲电源的应用研究/设计/生产和销售/高功率脉冲器件/材料与仪器设备的研发/生产和销售/高电压/大电流/强磁场环境的模拟及测试服务/会议会展服务/货物及进出口的业务/脉冲功率技术领域类的技术转让 西安网站建设,西安网站设计制作,西安短视频拍摄_短视频运营就选动力无限网络推广公司 | 神马影院电影网_实时更新秒播电视剧、电影、动漫的网站 _ 神马影院 | 中国建材信息总网-中国建材行业权威的信息资讯平台 | 空气消毒机厂家-医用空气消毒机-医用空气净化器-山东佳境医疗 | 重庆中医针灸推拿培训_产后康复理疗师培训_重庆市六合职业培训学校 | 青州市科信水处理设备有限公司-ic卡水处理设备厂家-畜牧养殖水处理设备 | 南京空压机出租,发电机租赁,南京牧德田空压机租赁回收公司 | 直流电源|Chroma直流电源|可程控直流电源-卓定电子Chroma代理 | 全降解塑料厂家_淋膜_秸秆_手机壳_气泡袋_牙刷牙线_GRS可回收包装材料-东莞全球环保科技有限公司 | 天津成考网-天津成人高考网| 石英砂过滤器_砂滤器_石家庄工泉水处理科技有限公司 | 装盒机|全自动封盒机|纸盒子包装机|高速装盒机定制-温州胜泰机械有限公司 | 金属网帘|金属帘|装饰网帘|金属环网|金属幕墙网|金属垂帘|金属扣帘-安平县名图金属丝网制品有限公司 | 南京叉车|电瓶叉车|电动叉车|电动堆高车|电动搬运车-南京诺嘉机械 | 曙海培训-ZEMAX培训射频培训无线电培训GMS培训EMC培训电磁兼容性培训Maxwell培训欧姆龙培训procast培训可靠性培训光学培训工业机器人培训NI培训Linux培训5G培训Hadoop培训CFD培训 | 上海钧尚电器有限公司 - Faulhaber电机 AMETEK pittman电机 AMETEK ROTRON军用航空风机 Exlar电动缸 MAE电机 MCG电机 CP电动工具 马头工具 AMCI驱动器 直流电机 减速箱 直流伺服电机,无刷电机,直线电机 直流防爆电机 防爆电机 汽车助力转向电机 EPS电机 faulhaber motor faulhaber gearbox NANOTEC电机 ELWOOD电机 PHYTRON电机 EXLAR伺服电动缸 高力矩、高性能直流电机,音圈电机,风机,直流风机,航空风机 | 小型环境空气质量连续监测系统-烟气排放连续监测仪(碳排放)-青岛明德环保仪器有限公司 | 铨盛国际供应链-PC增韧剂/硅系增韧剂/耐寒增韧剂/耐化学增韧剂 | 荆门市彩富机械有限责任公司|精铸件|五金|机械配件 | 泊头市特种油泵阀制造有限公司&nbsp;-&nbsp;渣油泵,重油泵,沥青泵,高压齿轮泵,煤焦油泵,导热油泵,三螺杆泵,圆弧齿轮泵,不锈钢齿轮泵, | 有机肥设备|有机肥生产线|有机肥料生产设备|河南通达重工科技有限公司 | 宁波公司注册_宁波注册公司_宁波代理记账_宁波做内账|安隆会计专业服务机构 | 亚克力游泳池_透明/空中/无边泳池_别墅亚克力泳池设计生产厂家_瑞地格乐-深圳他拍档 | 活性氧化铝球-活性氧化铝干燥剂厂家价格-3A-5A分子筛-巩义市亿洋水处理材料有限公司 | 智能化解决方案 智能家居 家庭影院 灯光音箱 会议室报告厅 剧场剧院 指挥中心 大数据中心_沈阳天哲科技有限公司 | 日职联直播_日职联免费视频直播_日职联直播在线观看无插件-24直播网 | 精密机械加工_零件加工_机械零部件加工厂_高精密零件加工定制—深圳精密机械加工厂 | 太原重卡叔叔运输有限公司-山西太原大件运输、太原物流公司、太原货运物流、太原大件运输、太原货运信息、长治物流公司、长治大件运输、晋城物流公司、晋城大件运输、忻州大件运输、朔州大件运输、阳泉大件运输、大同大件运输、吕梁大件运输、临汾大件运输、运城大件运城 | 质检报告_COC_CE认证_LFGB测试_REACH_FCC_FDA-冠通检测 | 泰安铭德机械有限公司,有机肥设备,山东有机肥设备厂家,铭德机械 泰安华特玻璃钢有限公司|泰安玻璃钢|泰安华特玻璃钢 | 雷达液位计_耐磨热电偶_蒸汽_柴油,汽油_天然气流量计_巴歇尔槽_一体化温度变送器-江苏翔腾仪表有限公司 | 山东金起起重机械有限公司[官网]-金桥银路悬臂吊,金起龙门吊,山东金起起重行吊,单梁起重机 | 青州市科信水处理设备有限公司-ic卡水处理设备厂家-畜牧养殖水处理设备 | 金属探测机_食品金属探测仪_食品金属探测器_广东善安金属检测机 金属剪切机,金属打包机,废钢剪切机,废铁压块机,金属压块机,废纸打包机,重废龙门剪,废钢龙门剪,箱式剪,液压剪切机-瑞顿机械装备制造江阴有限公司 |