Focusing on the generalization of concepts, functionality, and overall processes involved in the creation of a secure 'network of trusted data' , the IDS-RAM resides at a higher abstraction level than common architecture models of concrete software solutions do. The document provides an overview and dedicated architecture specifications.
The remaining processes in section 3.4 might stay unchanged for the time being. The relation to Contracts and Usage Control might be too complex to address until End of the year, but
We might think about the relationship of Vocabularies and Apps.
Section 3.4: The Process Layer should also include the Vocabulary Hub interactions during the different phases
The remaining processes in section 3.4 might stay unchanged for the time being. The relation to Contracts and Usage Control might be too complex to address until End of the year, but
We might think about the relationship of Vocabularies and Apps.