Update Glossary authored by Kai van Lopik's avatar Kai van Lopik
...@@ -2,7 +2,7 @@ This page lists key concepts and terminology related to the PEP system, and prov ...@@ -2,7 +2,7 @@ This page lists key concepts and terminology related to the PEP system, and prov
| Concept | Abbreviation | Description | | Concept | Abbreviation | Description |
| ------- | ------------ | ----------- | | ------- | ------------ | ----------- |
| Access Administrator | AA | The PEP role responsible for [data access management](Access-control#data-access) and [assignment of users to access groups](Access-control#role-determination). Not to be confused with the "Acccess Manager" service. | | Access Administrator | AA | The PEP role responsible for [data access management](Access-control#data-access) and [assignment of users to access groups](Access-control#role-determination). Users with this role are called "access administrators". Not to be confused with the "Acccess Manager" service. |
| access group | | A named group of users that can be [authorized](Access-control) for specific actions. Also called a "role" in the system. | | access group | | A named group of users that can be [authorized](Access-control) for specific actions. Also called a "role" in the system. |
| Access Manager | AM | The PEP service responsible for [data access authorization](Access-control#data-access). It also cooperates with the Transcryptor (TS) service to issue data access [tickets](Access-control#tickets). Not to be confused with the "Access Administrator" role. | | Access Manager | AM | The PEP service responsible for [data access authorization](Access-control#data-access). It also cooperates with the Transcryptor (TS) service to issue data access [tickets](Access-control#tickets). Not to be confused with the "Access Administrator" role. |
| [authorization](Access-control#authorization) | | Determining whether a user is allowed to perform certain actions in a software system. | | [authorization](Access-control#authorization) | | Determining whether a user is allowed to perform certain actions in a software system. |
...@@ -15,7 +15,7 @@ This page lists key concepts and terminology related to the PEP system, and prov ...@@ -15,7 +15,7 @@ This page lists key concepts and terminology related to the PEP system, and prov
| column group | | A named set of columns that can be used as a basis for [data access management](Access-control#data-access). | | column group | | A named set of columns that can be used as a basis for [data access management](Access-control#data-access). |
| command line interface | CLI | A facility to interact with computer software by means of textual input and output. Contrast with GUI, which provides an image-based interface. PEP's main CLI utility is called `pepcli`. | | command line interface | CLI | A facility to interact with computer software by means of textual input and output. Contrast with GUI, which provides an image-based interface. PEP's main CLI utility is called `pepcli`. |
| download | | As a verb: the act of retrieving data from PEP.<br>As a noun: a data set that has been retrieved from PEP. | | download | | As a verb: the act of retrieving data from PEP.<br>As a noun: a data set that has been retrieved from PEP. |
| Data Administrator | DA | The PEP role responsible for [data structuring](Data-structure) and management. | | Data Administrator | DA | The PEP role responsible for [data structuring](Data-structure) and management. Users with this role are called "data administrators". |
| Electronic Data Capturing system | EDC | (Third-party) software used to collect and store data, e.g. from academic research study subjects. PEP provides out-of-the-box integration with the [Castor EDC](https://www.castoredc.com/electronic-data-capture-system/). | | Electronic Data Capturing system | EDC | (Third-party) software used to collect and store data, e.g. from academic research study subjects. PEP provides out-of-the-box integration with the [Castor EDC](https://www.castoredc.com/electronic-data-capture-system/). |
| [ElGamal encryption](https://en.wikipedia.org/wiki/ElGamal_encryption) | | The cryptographic algorithm used as a basis for PEP's polymorphism. | | [ElGamal encryption](https://en.wikipedia.org/wiki/ElGamal_encryption) | | The cryptographic algorithm used as a basis for PEP's polymorphism. |
| encryption | | A technique to make information readable only to parties that are in possession of an associated secret. Also see "polymorphic encryption". | | encryption | | A technique to make information readable only to parties that are in possession of an associated secret. Also see "polymorphic encryption". |
... ...
......