​​Access control

The regulation of who or what is privileged to enter/use an IT service. Permission to access an IT service is called authorization. ​


The obligation to explain and justify conduct.


An Advanced Clinical Research Information System is a complex constellation of capabilities that can assist in the management of patients during clinical trials and rapidly assemble data assets for research questions. It also provides data mining and research process support to meet the needs of clinical and translational research, and related biostatistics and biocomputation. It may includes open-source components.

See also: Current Research Information System (CRIS)​

Active Directory

Initially, it was a directory service for Windows domain networks included in Windows Server operating systems. Eventually, it became an umbrella term for directory-based identity-related services, which are used to authenticate and authorize users and computers in a Windows domain network.​

Analytics to Data

Within the workspace analytics is created or incorporated from an analytics repository (repository might resides outside workspace). The analytics is sent to one or more federated stored data that resides outside the workspace (could be a different workspace) and returns (aggregated and/or pseudo/anonymized) outcomes to the workspace. There is no (direct) human access to the targeted data.

Click here for linked document


The irreversible delinking of identifying information from associated data.

See also: Pseudonymisation or Coding​ 

Application Layer

The Application Layer depicts application services that support the business, and the application components that realize them (logical level).

Archimate +

ArchiMate is an open and independent enterprise architecture modeling language to support the description, analysis and visualization of architecture within and across business domains in an unambiguous way.​

Lees meer


The fundamental organization of a system embodied in its components, their relationships to each other, and to the environment, and the principles guiding its design and evolution.​

Architecture Building Block (ABB)​ +

A constituent of the architecture model that describes a single aspect of the overall model.​

Assessment of vendor solutions

The process of determining whether the solutions (/products) can be incorporated in the service catalogue and how they are positioned. 

(The (vendor) solutions building blocks can be assessed by deriving the other viewpoints in the Reference Architecture Framework from the solutions viewpoint. Especially important is here the RDM policy viewpoint of the Reference architecture; to which RDM policy requirements does the solution adhere.​)


A systematic review to evaluate adherence to applicable laws and policies. 

Authentication (AuthN)

Verifying the identity of an user by validating the credentials (e.g. username, password) provided by the user.​

(Attribute-based) Authorization (AuthZ)

Determining whether an entity (e.g. user) has permission to access (parts of) IT services. This can be done on the basis of credentials (e.g. username, password) or on the basis of entity attributes (e.g. roles, group memberships).​