This page is part of the HL7 Terminology (v5.4.0: Release) based on FHIR R4. This is the current published version in its permanent home (it will always be available at this URL). For a full list of available versions, see the Directory of published versions
: SecurityObservationType - TTL Representation
Raw ttl | Download
@prefix fhir: <http://hl7.org/fhir/> .
@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix xsd: <http://www.w3.org/2001/XMLSchema#> .
# - resource -------------------------------------------------------------------
a fhir:ValueSet ;
fhir:nodeRole fhir:treeRoot ;
fhir:id [ fhir:v "v3-SecurityObservationType"] ; #
fhir:language [ fhir:v "en"] ; #
fhir:text [
fhir:status [ fhir:v "generated" ] ;
fhir:div "<div xmlns=\"http://www.w3.org/1999/xhtml\" xml:lang=\"en\" lang=\"en\"><ul><li>Include codes from <a href=\"CodeSystem-v3-ActCode.html\"><code>http://terminology.hl7.org/CodeSystem/v3-ActCode</code></a> where concept is-a <a href=\"CodeSystem-v3-ActCode.html#v3-ActCode-SECOBS\">SECOBS</a></li></ul></div>"
] ; #
fhir:url [ fhir:v "http://terminology.hl7.org/ValueSet/v3-SecurityObservationType"^^xsd:anyURI] ; #
fhir:identifier ( [
fhir:system [ fhir:v "urn:ietf:rfc:3986"^^xsd:anyURI ] ;
fhir:value [ fhir:v "urn:oid:2.16.840.1.113883.1.11.20457" ]
] ) ; #
fhir:version [ fhir:v "3.0.0"] ; #
fhir:name [ fhir:v "SecurityObservationType"] ; #
fhir:title [ fhir:v "SecurityObservationType"] ; #
fhir:status [ fhir:v "active"] ; #
fhir:experimental [ fhir:v "false"^^xsd:boolean] ; #
fhir:date [ fhir:v "2023-06-02"^^xsd:date] ; #
fhir:publisher [ fhir:v "Health Level Seven International"] ; #
fhir:contact ( [
( fhir:telecom [
fhir:system [ fhir:v "url" ] ;
fhir:value [ fhir:v "http://hl7.org" ] ] [
fhir:system [ fhir:v "email" ] ;
fhir:value [ fhir:v "hq@HL7.org" ] ] )
] ) ; #
fhir:description [ fhir:v "Type of security metadata observation made about an IT resource (data, information object, service, or system capability), which may be used to make access control decisions. Security metadata are used in security labels. According to ISO/TS 22600-3:2009(E) A.9.1.7 SECURITY LABEL MATCHING, Security label matching compares the initiator's clearance to the target's security label. All of the following must be true for authorization to be granted:\r\n\r\n * The security policy identifiers shall be identical,\r\n * The classification level of the initiator shall be greater than or equal to that of the target (that is, there shall be at least one value in the classification list of the clearance greater than or equal to the classification of the target), and\r\n * For each security category in the target label, there shall be a security category of the same type in the initiator'ijs clearance and the initiator's classification level shall dominate that of the target."] ; #
fhir:immutable [ fhir:v "true"^^xsd:boolean] ; #
fhir:copyright [ fhir:v "This material derives from the HL7 Terminology THO. THO is copyright ©1989+ Health Level Seven International and is made available under the CC0 designation. For more licensing information see: https://terminology.hl7.org/license"] ; #
fhir:compose [
( fhir:include [
fhir:system [ fhir:v "http://terminology.hl7.org/CodeSystem/v3-ActCode"^^xsd:anyURI ] ;
( fhir:filter [
fhir:property [ fhir:v "concept" ] ;
fhir:op [ fhir:v "is-a" ] ;
fhir:value [ fhir:v "SECOBS" ] ] ) ] )
] . #