DavidStables (talk | contribs) (Created page with "These articles provide information about the overall high level software architecture models providing a descriptions and visualisations of the Discovery Data Service and info...") |
DavidStables (talk | contribs) No edit summary |
||
Line 1: | Line 1: | ||
These articles provide information about the overall high level software architecture models providing a descriptions and visualisations of the Discovery Data Service and information service components and how they interact. | These articles provide information about the overall high level software architecture models providing a descriptions and visualisations of the Discovery Data Service and information service components and how they interact. | ||
*The [ | *The [[Data Storage Architecture]] illustrates how data is stored within the service and the various implementation options available for organisations that wish to use some or parts of the services. | ||
*[https://wiki.discoverydataservice.org/Identity_Authentication_Authorisation Identity, authentication and authorisation] specifies the approach taken by Discovery for accessing utilities and controlling some aspects of access to application functionality and some data resources, after all of the other locks have been opened. | *[https://wiki.discoverydataservice.org/Identity_Authentication_Authorisation Identity, authentication and authorisation] specifies the approach taken by Discovery for accessing utilities and controlling some aspects of access to application functionality and some data resources, after all of the other locks have been opened. | ||
*[https://wiki.discoverydataservice.org/Application_zone_architecture Application zone architecture] illustrates how the data is accessed in different places and in different ways according to different use cases | *[https://wiki.discoverydataservice.org/Application_zone_architecture Application zone architecture] illustrates how the data is accessed in different places and in different ways according to different use cases | ||
*[https://wiki.discoverydataservice.org/Pseudonymisation Pseudonymisation] describes how Discovery generates pseudonymised data. | *[https://wiki.discoverydataservice.org/Pseudonymisation Pseudonymisation] describes how Discovery generates pseudonymised data. | ||
*[https://wiki.discoverydataservice.org/Data_linking Data linking] describes how Discovery links several patient records into a single person/citizen record. | *[https://wiki.discoverydataservice.org/Data_linking Data linking] describes how Discovery links several patient records into a single person/citizen record. |
Revision as of 14:22, 27 December 2021
These articles provide information about the overall high level software architecture models providing a descriptions and visualisations of the Discovery Data Service and information service components and how they interact.
- The Data Storage Architecture illustrates how data is stored within the service and the various implementation options available for organisations that wish to use some or parts of the services.
- Identity, authentication and authorisation specifies the approach taken by Discovery for accessing utilities and controlling some aspects of access to application functionality and some data resources, after all of the other locks have been opened.
- Application zone architecture illustrates how the data is accessed in different places and in different ways according to different use cases
- Pseudonymisation describes how Discovery generates pseudonymised data.
- Data linking describes how Discovery links several patient records into a single person/citizen record.