|
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
ACCESS Defined byentitlement, throughresource
relation
role
qualities, access determinescapabilitywith 10 mainaccess types. ACCESS CONTROL Anentitlement-basedprocesstomanageand control access toresources. See also:Reference Monitor. ACCESS TYPE
Resource
behavior
capabilitiesare determined by 10 main access types:Reference,Consult,Modify,Notify,Instantiate,Retire,Recycle,Control,Assign,Master. ACCOUNTING Accounting services are indispensable operating services designed and integrated to
support collaboration (e.g. portal) and knowledge usage (e.g. access) accounting.
Operations like sales (e.g content, services, resources) and time management (e.g.
hr) require accounting,invoicing,metering,reporting, and credit card management. These services are an integral part of collaboration
and sharing. They are typically supported at the consolidated portal level, as well
as for each of portal web site and application. Accounting services also usepublishingservices and resources. Accounting services in collaboration environment, require
partnerorganizationdistribution and coordination. ACQUISITION A basicinformationmanagementpatternthat allows obtaining and deducting information from experience andprocesses. Acquitition patterns include, reading, study,analysis, experience, computing, sensing, deducting, and extrapolation. ACTION Unit (basic)resource
transformation, e.g. generate anevent, pick item ACTIVITY an activity is a time-based orSchedulable
relationdescribing atransformationaction of otherresource(s), in contribution to ataskor process. An activity is typically proportional to itscapabilityandrole
qualities. An activity is aphase
sequence, typically terminated by a completion notification event to the contributed task. ACTUALS Actuals are calculated (e.g. tracked)resource
qualityvalues, from provided or default query/formula (e.g. metrics, XPath). ADDRESS A resource locator. ADNAOSnested resource to store detailed resource locations. Addresses are also typically
used to reference, locate, notify, and contribute to identification of common actor
resources, includingpersonandorganizationtype resources. Addresses are also indispensable in the management, communication,
and sharing of information, knowledge,subscriptions, andmembership. AGGREGATION
Processofassociating
resources, bycomposition, with built-inlinks, as well as throughrelationsand associations. ANALYSIS A basicinformation
acquisition
patternthat uses studying and correlating information to increase understanding, typically
deducting, inducing, and extrapolatingknowledgeand information from the analyzed subjects andresources. APPLICATION Theprocessof applying apattern; computing applications (e.g. programs, code) apply general patterns like networks,
systems, software, pipelines, and data structures to build more specialized patterns
(e.g. word processing, vehicle fleet management) for specific applications. Computing
applications are typically built on/fromarchitecturemodels. APPLICATION RESOURCES
Information and knowledge resourcesused and processed byapplications(e.g. IT), typically as program variables, or content. ARCHETYPE BasicBusinessand infrastructureapplication resource
types. The main basicDNAOSbusinessapplicationresource archetypes (with typical modeling color codes) include:
- time or period based businessevents,schedule, andprocesstyperesources; (action: red/pink)
- roleandassignmentstype resources; (entitlement: yellow)
- allthings, including:activities,components,products,assetstypr resources; (thing: green)
- allparties, including:persons,companies,organizationstype resources; (party: green)
- descriptionstype resources, which are typically associated with any resource type/archetype, including:roles,rates,tasks,phases,processes; (description: blue)
- systemandutilitycomponents andresourcetypes, including:messages,GUI,datasources,system; (utility: transparent).
ARCHITECTURE
Resourcestructuring principle sets, as well as their application and evolution over time and/or
space. Applied in most fields and domains, including:business,applications, infrastructure, IT, building, etc, the foudational reference is that ofKnowledge Architecture. Often used as a high-level perspective of how requirements are structured and aligned
with technology and processes, in a comprehensive and manageable way, architecture
is also often defined by views of models of a reality. By extension, it is a process
of using practices, information, and tools to assess, implement, and change design.
Basic IT infrastructure architecture types, for example, can include: single station,
client-server, distributed, service (e.g.SOA, REST), as well as Grid, Cloud, SaaS, etc. ASSERTION An assertion is astatementclaimed to be true by an actor or authority. It is asynonymforFact. [Sjir Nijssen 2010] ASSESSMENT Considering, analyzing, comparing, and documentingresource
qualities, andbehavior. ASSET
Resourcesowned by other resources (e.g. stocks, inventory, content). ASSIGN One of the 10 mainresource
access types, determining resourceassignment
capabilitiesthat includeconsulting
behaviorsas well as allow control of therelationsthat object resources contribute to. ASSIGNMENT The process ofassigningor grantingrightsandprivileges, with associated responsibilities and constraints. Defined asresource
relation,roles, assignments are also characterized by therulesand conditions (e.g. time, context) thatqualifythem. ASSOCIATION Associations are directionalrelation
linksbetweensubject(e.g.from) andObject(e.g.to)resources. Associations can be direct references withuniversalunique identifiers for the respective referenced resources, or indirect references
throughqueries. ATOM A common news feed and blog protocol, evolved and improving fromRSSprotocols. Atom is the internalDNAOSnews feed and blog protocol. ATOMIC SENTENCE Asentenceform which has no subsentences as syntactic component. Can be either an equation,
or consist of a predicate applied to an argumentsequence. [ISO/IEC 24707:2007(E) inspired]. AUTHENTICATION Asecurityvalidation stage used to verify and confirm resource (e.g. user)identityauthenticity. See alsoEncryption,Authorization,Entitlement. AUTHORIZATION Asecuritystage where authenticated resource (e.g. user) identity is used by systems and environments,
to locate or gather correspondinguser resource
profiles, to pass toapplications, for access control security, to operations and functionality. See alsoEncryption,Authentication,Entitlement. AUTO-LAYOUT Amodeling
operation, available toDNAOSrich graphical modeling and administrationSOAclientapplicationsandusers, to automatically and selectively layout applicationresources,virtual
profiles, and businessprocessessee alsoRotateandZoom. AXIOM Asentenceassumed to be true, from which others are derived, or by which they are entailed.
A sentence which is never posed as a goal to be proved, but only used to prove other
sentences. [ISO/IEC 24707:2007(E) inspired].
|