You may be trying to access this site from a secured browser on the server. Please enable scripts and reload this page.
Turn on more accessible mode
Turn off more accessible mode
Skip Ribbon Commands
Skip to main content
Turn off Animations
Turn on Animations
To navigate through the Ribbon, use standard browser navigation keys. To skip between groups, use Ctrl+LEFT or Ctrl+RIGHT. To jump to the first Ribbon tab use Ctrl+[. To jump to the last selected command use Ctrl+]. To activate a command, use Enter.
Browse
Tab 1 of 3.
Page
Tab 2 of 3.
Publish
Tab 3 of 3.
Home
RDM glossary
Currently selected
Welkom
Meeschrijven
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Blog
RDM-L
LCRDM.nl
English
A
It looks like your browser does not have JavaScript enabled. Please turn on JavaScript and try again.
Updated Pages
C
B
A
Community Cloud
nieuw
Home
LCRDM handreikingen
RDM in de praktijk
Pool van experts
Pitches
Taakgroepen
Over LCRDM
Contact
Meeschrijven
Begrippenlijst(en) / Glossary
RDM in de praktijk
Disclaimer
Site Contents
A
Access control
The regulation of who or what is privileged to enter/use an IT service. Permission to access an IT service is called authorization.
Accountability
The obligation to explain and justify conduct.
ACRIS
An Advanced Clinical Research Information System is a complex constellation of capabilities that can assist in the management of patients during clinical trials and rapidly assemble data assets for research questions. It also provides data mining and research process support to meet the needs of clinical and translational research, and related biostatistics and biocomputation. It may includes open-source components.
See also:
Current Research Information System (CRIS)
Active Directory
Initially, it was a directory service for Windows domain networks included in Windows Server operating systems. Eventually, it became an umbrella term for directory-based identity-related services, which are used to authenticate and authorize users and computers in a Windows domain network.
Analytics to Data
Within the workspace analytics is created or incorporated from an analytics repository (repository might resides outside workspace). The analytics is sent to one or more federated stored data that resides outside the workspace (could be a different workspace) and returns (aggregated and/or pseudo/anonymized) outcomes to the workspace. There is no (direct) human access to the targeted data.
Click here for linked document
Anonymisation
The irreversible delinking of identifying information from associated data.
See also:
Pseudonymisation or Coding
Application Layer
The Application Layer depicts application services that support the business, and the application components that realize them (logical level).
Archimate
+
ArchiMate is an open and independent enterprise architecture modeling language to support the description, analysis and visualization of architecture within and across business domains in an unambiguous way.
Lees meer
Architecture
The fundamental organization of a system embodied in its components, their relationships to each other, and to the environment, and the principles guiding its design and evolution.
See also:
RDM Reference Architecture
Architecture Building Block (ABB)
+
A constituent of the architecture model that describes a single aspect of the overall model.
Lees meer
See also:
Building Block
Assessment of vendor solutions
The process of determining whether the solutions (/products) can be incorporated in the service catalogue and how they are positioned.
(The (vendor) solutions building blocks can be assessed by deriving the other viewpoints in the Reference Architecture Framework from the solutions viewpoint. Especially important is here the RDM policy viewpoint of the Reference architecture; to which RDM policy requirements does the solution adhere.)
See:
Self Assessment of Vendor solutions
Audit
A systematic review to evaluate adherence to applicable laws and policies.
Authentication (AuthN)
Verifying the identity of an user by validating the credentials (e.g. username, password) provided by the user.
(Attribute-based) Authorization (AuthZ)
Determining whether an entity (e.g. user) has permission to access (parts of) IT services. This can be done on the basis of credentials (e.g. username, password) or on the basis of entity attributes (e.g. roles, group memberships).
top
false,false,1