Architectures: Difference between revisions

From Endeavour Knowledge Base
No edit summary
No edit summary
 
Line 2: Line 2:


*The [[Data Storage Architecture]] illustrates how data is stored within the service and the various implementation options available for organisations that wish to use some or parts of the services.
*The [[Data Storage Architecture]] illustrates how data is stored within the service and the various implementation options available for organisations that wish to use some or parts of the services.
*[https://wiki.discoverydataservice.org/Identity_Authentication_Authorisation Identity, authentication and authorisation] specifies the approach taken by Discovery for accessing utilities and controlling some aspects of access to application functionality and some data resources, after all of the other locks have been opened.
*[[Identity Authentication Authorisation|Identity, authentication and authorisation]] specifies the approach taken by Discovery for accessing utilities and controlling some aspects of access to application functionality and some data resources, after all of the other locks have been opened.
*[https://wiki.discoverydataservice.org/Application_zone_architecture Application zone architecture] illustrates how the data is accessed in different places and in different ways according to different use cases
*[[Application zone architecture]] illustrates how the data is accessed in different places and in different ways according to different use cases
*[https://wiki.discoverydataservice.org/Pseudonymisation Pseudonymisation] describes how Discovery generates pseudonymised data.
*[[Pseudonymisation]] describes how Discovery generates pseudonymised data.
*[https://wiki.discoverydataservice.org/Data_linking Data linking] describes how Discovery links several patient records into a single person/citizen record.
*[[Data linking]] describes how Discovery links several patient records into a single person/citizen record.

Latest revision as of 14:24, 27 December 2021

These articles provide information about the overall high level software architecture models providing a descriptions and visualisations of the Discovery Data Service and information service components and how they interact.

  • The Data Storage Architecture illustrates how data is stored within the service and the various implementation options available for organisations that wish to use some or parts of the services.
  • Identity, authentication and authorisation specifies the approach taken by Discovery for accessing utilities and controlling some aspects of access to application functionality and some data resources, after all of the other locks have been opened.
  • Application zone architecture illustrates how the data is accessed in different places and in different ways according to different use cases
  • Pseudonymisation describes how Discovery generates pseudonymised data.
  • Data linking describes how Discovery links several patient records into a single person/citizen record.