hl7_ccow_arch_cm_1_4.pdf

获得积分
资料库会员登录
搜索: [高级搜索]
下载首页 | 资源分类 | 下载排行
您的位置: 首页 > 标准文档  > HL7及CDA
 
分类导航
下载排行
最新资源
hl7_ccow_arch_cm_1_4.pdf
资源大小: 资源类型:文档
下载积分: 0
更多
-->
下载统计:总下载:0,本月下载:0,本周下载:0,今日下载:0
发表评论 错误报告 加入收藏夹
资源介绍
hl7 1.4 标志英文完整版
Table of Contents
1 INTRODUCTION...............................................................................................................................19
1.1 Clinical Context ............................................................................................................................19
1.2 Links and Subjects ........................................................................................................................19
1.3 Annotations and actions ................................................................................................................20
1.4 Architecture Summary ..................................................................................................................20
1.4.1 Component Architecture .......................................................................................................21
1.4.2 Context Organization and Representation.............................................................................23
1.4.3 Application Authentication ...................................................................................................23
1.4.4 Context Transactions.............................................................................................................23
1.4.5 Context Actions ....................................................................................................................24
1.4.6 Context Agents......................................................................................................................24
1.4.6.1 Mapping Agents................................................................................................................25
1.4.6.2 Annotation Agents ............................................................................................................25
1.4.6.3 Action Agents ...................................................................................................................25
1.5 Reading This Document................................................................................................................25
2 SCOPE AND OBJECTIVES................................................................................................................27
2.1 Specification Organization............................................................................................................27
2.2 Assumptions/Assertions................................................................................................................28
2.3 CMA Design Center .....................................................................................................................29
3 TECHNOLOGY NEUTRALITY.........................................................................................................31
4 REQUIREMENTS AND CAPABILITIES ..........................................................................................33
5 SYSTEM ARCHITECTURE ...............................................................................................................35
5.1 Use-Model ...................................................................................................................................35
5.2 Context Management Responsibility ............................................................................................43
Technology and Subject-Independent Component Architecture, Version 1.4
Page 4 HL7 Context Management Standard: Technology and Subject-Independent Component
Architecture, Version 1.4, January 2002. All rights reserved.
5.3 Context Change Detection ............................................................................................................43
5.4 Context Data Representation ........................................................................................................44
5.5 Context Data Access .....................................................................................................................44
5.6 Context Data Interpretation...........................................................................................................45
5.6.1 Context Subject Data Definition Constraints ........................................................................46
5.6.2 Establishing the Meaning of Context Data Item Names .......................................................46
5.6.3 Establishing the Meaning of Context Data Item Values .......................................................46
5.6.4 Representing Context Subjects That Cannot Be Uniquely Identified ...................................47
5.6.5 Context Subjects and Item Name Format .............................................................................47
5.6.6 Standard Context Subjects and Data Items ...........................................................................47
5.6.7 Non-Standard Context Subjects and Data Items ...................................................................47
5.6.8 Representing “Null” Item Values..........................................................................................48
5.6.9 Representing an Empty Context Subject...............................................................................48
5.6.10 Case Sensitivity with Regard to Item Names and Item Values.............................................48
6 COMPONENT MODEL ......................................................................................................................51
6.1 Component and Interface Concepts ..............................................................................................51
6.1.1 Interfaces and References .....................................................................................................51
6.1.2 Interface Interrogation...........................................................................................................52
6.1.3 Principal Interface .................................................................................................................52
6.1.4 Context Management Registry..............................................................................................52
6.1.5 Interface Reference Management .........................................................................................53
7 CONTEXT SESSION MANAGEMENT.............................................................................................55
7.1 Context Session Defined...............................................................................................................55
7.2 Context Session Use Models.........................................................................................................56
7.2.1 Shared Clinical Workstation .................................................................................................56
7.2.2 Interrupt-Driven User............................................................................................................56
7.3 Theory of Operation......................................................................................................................56
7.4 Context Session Management Policies .........................................................................................57
7.4.1 Creating a Context Session ...................................................................................................57
7.4.2 Cloning Context Data............................................................................................................57
Technology and Subject-Independent Component Architecture, Version 1.4
HL7 Context Management Standard: Technology and Subject-Independent Component Architecture, Version 1.4,
January 2002. All rights reserved. Page 5
7.4.3 Deactivated Sessions.............................................................................................................58
7.4.4 Session Participation .............................................................................................................58
7.4.5 Activating a Deactivated Session..........................................................................................58
7.4.6 Session Termination..............................................................................................................58
7.4.7 No Active Session.................................................................................................................59
8 GENERAL THEORY OF OPERATION FOR CLINICAL LINKS ....................................................61
8.1 Multiple Subjects and the Meaning of “Link” ..............................................................................61
8.1.1 Context Manager Support for Multiple Context Subjects.....................................................61
8.1.2 Effect of Multiple Subjects on Context Change Transaction ................................................62
8.1.3 Context Manager Treatment of Multi-Subject Context Data ................................................62
8.1.4 Effect of Multiple Subjects on Mapping Agents...................................................................63
8.1.5 Effect of Multiple Subjects on Annotation Agents ...............................................................63
8.1.6 Application Treatment of Multiple Subjects.........................................................................63
8.2 Context Subjects Dependencies ....................................................................................................63
8.3 Empty Contexts Subjects ..............................................................................................................65
9 THEORY OF OPERATION FOR COMMON LINKS........................................................................67
9.1 Component Architecture for Common Links................................................................................67
9.2 Mapping Agents...........................................................................................................................68
9.3 Annotation Agents ........................................................................................................................69
9.4 Context Change Transactions .......................................................................................................69
9.5 Joining a Common Context Session .............................................................................................70
9.6 Context Change Transactions .......................................................................................................70
9.7 Transactional Consistency ............................................................................................................71
9.8 Context Change Notification Process ...........................................................................................71
9.9 Leaving a Common Context Session ............................................................................................73
9.10 Behavioral Details........................................................................................................................73
9.10.1 Notification Policy When Context Data is Not Changed During A Transaction ..................73
Technology and Subject-Independent Component Architecture, Version 1.4
Page 6 HL7 Context Management Standard: Technology and Subject-Independent Component
Architecture, Version 1.4, January 2002. All rights reserved.
9.10.2 Application Behavior When it Cannot Cancel Context Changes..........................................73
9.10.3 Application Behavior When it Does Not Understand Context Identifiers ............................74
9.10.4 Application Behavior with Regard to an Empty Context......................................................74
9.10.5 Surveying Details..................................................................................................................74
9.11 Common Clinical Context Use Model..........................................................................................75
9.11.1 Lifecycle of Common Context..............................................................................................76
9.11.2 Context Selection Change Use Case .....................................................................................80
9.11.3 Abnormal Termination of Common Context Use Case ........................................................89
9.12 Optimizations...............................................................................................................................91
9.13 The Simplest Application..............................................................................................................91
10 MAPPING AGENTS........................................................................................................................95
10.1 Assumptions and Assertions .........................................................................................................95
10.2 Interfaces......................................................................................................................................96
10.3 Theory of Operation......................................................................................................................96
10.3.1 Mapping Agents and Secure Context Subjects .....................................................................97
10.3.2 Initializing a Context Session When a Mapping Agent is Present ........................................97
10.3.3 Calling Sequence When Multiple Mapping Agents are Present ...........................................98
10.3.4 Terminating a Context Session When a Mapping Agent is Present......................................98
10.3.5 Distinguishing Between Mapping Agents and Context Participants.....................................99
10.3.6 Mapping Agent Updates to Context Data .............................................................................99
10.3.7 Conditions for Mapping Agent Invalidation of Context Changes.......................................100
10.3.8 Treatment of Mapping Agent Invalidation of Context Changes .........................................101
10.3.9 Mapping Null-Valued Identifiers........................................................................................102
10.3.10 Initializing Mapping Agents ...........................................................................................103
10.3.11 Handling Mapping Agent Failures..................................................................................104
10.4 Mapping Agent Effect on Application Security Policies ............................................................104
10.5 Identifying Mapping Agent Implementations .............................................................................104
10.6 Performance Costs and Optimizations ........................................................................................105
11 ANNOTATION AGENTS .............................................................................................................107
Technology and Subject-Independent Component Architecture, Version 1.4
HL7 Context Management Standard: Technology and Subject-Independent Component Architecture, Version 1.4,
January 2002. All rights reserved. Page 7
11.1 Assumptions and Assertions .......................................................................................................107
11.2 Interfaces....................................................................................................................................107
11.3 Theory of Operation....................................................................................................................108
12 THEORY OF OPERATION FOR SECURE LINKS .....................................................................109
12.1 Secure Link Terms......................................................................................................................109
12.2 Point-of-Use Device Assumptions..............................................................................................109
12.3 Secure Link Common Context System Description....................................................................110
12.3.1 Authenticating Secure Subject Access................................................................................110
12.3.2 Secure Mapping Agent........................................................................................................110
12.3.3 Secure Annotation Agent ....................................................................................................110
12.3.4 Context Management Interfaces .........................................................................................111
12.3.5 Overall Secure Link Component Architecture....................................................................111
12.4 Process for Setting a Secure Context Subject .............................................................................112
12.5 Designating Applications for Setting/Getting Secure Subjects...................................................113
12.6 Busy Applications......................................................................................................................113
13 PATIENT LINK THEORY OF OPERATION...............................................................................115
13.1 Patient Link Component Architecture ........................................................................................115
13.2 Patient Subject ............................................................................................................................115
13.3 Patient Mapping Agent ...............................................................................................................115
13.4 Patient Link Context Change Process .........................................................................................116
13.5 Stat Admissions ..........................................................................................................................116
14 USER LINK THEORY OF OPERATION.....................................................................................117
14.1 User Link Terms .........................................................................................................................117
14.2 Point-of-Use Device Assumptions..............................................................................................117
Technology and Subject-Independent Component Architecture, Version 1.4
Page 8 HL7 Context Management Standard: Technology and Subject-Independent Component
Architecture, Version 1.4, January 2002. All rights reserved.
14.3 User Link Component Architecture ............................................................................................117
14.4 User Subject...............................................................................................................................118
14.5 User Authentication Data Is Not Part of the User Context .........................................................118
14.6 User Link Common Context System Description.......................................................................118
14.6.1 User Mapping Agent...........................................................................................................118
14.6.2 Authentication Repository ..................................................................................................119
14.6.3 Overall User Link Component Architecture .......................................................................119
14.7 User Link Context Change Process.............................................................................................120
14.8 Designating Applications for User Authentication .....................................................................121
14.9 Signing on to Applications Not Designated for Authenticating Users........................................122
14.10 Application Behavior When Launched ...................................................................................122
14.11 Access Control Lists ...............................................................................................................122
14.12 Changing Users.......................................................................................................................122
14.13 Logging-Off and Application Termination .............................................................................123
14.14 Automatic Log-Off .................................................................................................................125
14.15 Re-authentication Time-out ....................................................................................................126
14.16 Co-Existence with Applications Not User Link-Enabled .......................................................126
14.17 Populating the User Mapping Agent.......................................................................................127
14.18 Authentication Repository ......................................................................................................127
14.18.1 Repository Implementation Considerations ....................................................................128
14.18.2 Populating the Repository...............................................................................................128
15 CHAIN OF TRUST ........................................................................................................................131
15.1 User Context Change Transactions and the Chain of Trust ........................................................131
15.2 Creating the Chain of Trust.........................................................................................................131
15.2.1 Object Infrastructures..........................................................................................................
下载地址
 下载地址
按字母检索

下载须知:
大部份资源无需注册即可下载
需要积分的资源要在会员中心注册会员并用 积分体系中提示的方法赚取积分才能下载。

免责声明:
所有资源只能用于参考学习,不能用于任何商业用途,否则后果自负!