This is the Continuous Integration Build of FHIR (will be incorrect/inconsistent at times).
See the Directory of published versions
Terminology Infrastructure Work Group | Maturity Level: N/A | Standards Status: Informative |
Raw JSON (canonical form + also see JSON Format Specification)
Definition for Value SetAudit Event Source Type
{ "resourceType" : "ValueSet", "id" : "security-source-type", "meta" : { "lastUpdated" : "2024-12-12T18:56:29.677+00:00", "profile" : ["http://hl7.org/fhir/StructureDefinition/shareablevalueset"] }, "text" : { "status" : "extensions", "div" : "<div xmlns=\"http://www.w3.org/1999/xhtml\"><p class=\"res-header-id\"><b>Generated Narrative: ValueSet security-source-type</b></p><a name=\"security-source-type\"> </a><a name=\"hcsecurity-source-type\"> </a><a name=\"security-source-type-en-US\"> </a><ul><li>Include these codes as defined in <a href=\"http://terminology.hl7.org/6.1.0/CodeSystem-security-source-type.html\"><code>http://terminology.hl7.org/CodeSystem/security-source-type</code></a><table class=\"none\"><tr><td style=\"white-space:nowrap\"><b>Code</b></td><td><b>Display</b></td><td><b>Definition</b></td></tr><tr><td><a href=\"http://terminology.hl7.org/6.1.0/CodeSystem-security-source-type.html#security-source-type-1\">1</a></td><td style=\"color: #cccccc\">User Device</td><td>End-user display device, diagnostic device.</td></tr><tr><td><a href=\"http://terminology.hl7.org/6.1.0/CodeSystem-security-source-type.html#security-source-type-2\">2</a></td><td style=\"color: #cccccc\">Data Interface</td><td>Data acquisition device or instrument.</td></tr><tr><td><a href=\"http://terminology.hl7.org/6.1.0/CodeSystem-security-source-type.html#security-source-type-3\">3</a></td><td style=\"color: #cccccc\">Web Server</td><td>Web Server process or thread.</td></tr><tr><td><a href=\"http://terminology.hl7.org/6.1.0/CodeSystem-security-source-type.html#security-source-type-4\">4</a></td><td style=\"color: #cccccc\">Application Server</td><td>Application Server process or thread.</td></tr><tr><td><a href=\"http://terminology.hl7.org/6.1.0/CodeSystem-security-source-type.html#security-source-type-5\">5</a></td><td style=\"color: #cccccc\">Database Server</td><td>Database Server process or thread.</td></tr><tr><td><a href=\"http://terminology.hl7.org/6.1.0/CodeSystem-security-source-type.html#security-source-type-6\">6</a></td><td style=\"color: #cccccc\">Security Server</td><td>Security server, e.g. a domain controller.</td></tr><tr><td><a href=\"http://terminology.hl7.org/6.1.0/CodeSystem-security-source-type.html#security-source-type-7\">7</a></td><td style=\"color: #cccccc\">Network Device</td><td>ISO level 1-3 network component.</td></tr><tr><td><a href=\"http://terminology.hl7.org/6.1.0/CodeSystem-security-source-type.html#security-source-type-8\">8</a></td><td style=\"color: #cccccc\">Network Router</td><td>ISO level 4-6 operating software.</td></tr></table></li></ul></div>" }, "extension" : [{ "url" : "http://hl7.org/fhir/StructureDefinition/structuredefinition-wg", "valueCode" : "sec" }], "url" : "http://hl7.org/fhir/ValueSet/security-source-type", "identifier" : [{ "system" : "urn:ietf:rfc:3986", "value" : "urn:oid:2.16.840.1.113883.4.642.3.2981" }], "version" : "6.0.0-ballot2", "name" : "AuditEventSourceType", "title" : "Audit Event Source Type", "status" : "active", "experimental" : false, "date" : "2010-08-26", "publisher" : "HL7 International / Security", "contact" : [{ "telecom" : [{ "system" : "url", "value" : "http://www.hl7.org/Special/committees/secure" }, { "system" : "email", "value" : "fhir@lists.hl7.org" }] }], "description" : "The type of process where the audit event originated from. Use of these codes is not required but is encouraged to maintain translation with DICOM AuditMessage schema.", "jurisdiction" : [{ "coding" : [{ "system" : "http://unstats.un.org/unsd/methods/m49/m49.htm", "code" : "001", "display" : "World" }] }], "copyright" : "These codes are excerpted from Digital Imaging and Communications in Medicine (DICOM) Standard, Part 16: Content Mapping Resource, Copyright © 2011 by the National Electrical Manufacturers Association. Additional codes added by HL7 FHIR use-case analysis", "compose" : { "include" : [{ "system" : "http://terminology.hl7.org/CodeSystem/security-source-type", "concept" : [{ "code" : "1" }, { "code" : "2" }, { "code" : "3" }, { "code" : "4" }, { "code" : "5" }, { "code" : "6" }, { "code" : "7" }, { "code" : "8" }] }] } }
Usage note: every effort has been made to ensure that the examples are correct and useful, but they are not a normative part of the specification.
FHIR ®© HL7.org 2011+. FHIR R6 hl7.fhir.core#6.0.0-ballot2 generated on Thu, Dec 12, 2024 19:27+0000.
Links: Search |
Version History |
Contents |
Glossary |
QA |
Compare to R5 |
|
Propose a change