cdocutils.nodes document q)q}q(U nametypesq}q(X0object discovery, access, creation, modificationqNX$logging, reporting, and notificationqNX'sequential list of functional use casesqNXabout use casesq NXsynchronization and replicationq NXsystem and content integrityq NX use casesq NX1user and system authentication and access controlq NuUsubstitution_defsq}qUparse_messagesq]qUcurrent_sourceqNU decorationqNUautofootnote_startqKUnameidsq}q(hU-object-discovery-access-creation-modificationqhU"logging-reporting-and-notificationqhU'sequential-list-of-functional-use-casesqh Uabout-use-casesqh Usynchronization-and-replicationqh Usystem-and-content-integrityqh U use-casesqh U1user-and-system-authentication-and-access-controlquUchildrenq]q cdocutils.nodes section q!)q"}q#(U rawsourceq$UUparentq%hUsourceq&Xd/var/lib/jenkins/jobs/API_Documentation_trunk/workspace/api-documentation/source/design/usecases.txtq'Utagnameq(Usectionq)U attributesq*}q+(Udupnamesq,]Uclassesq-]Ubackrefsq.]Uidsq/]q0haUnamesq1]q2h auUlineq3KUdocumentq4hh]q5(cdocutils.nodes title q6)q7}q8(h$X Use Casesq9h%h"h&h'h(Utitleq:h*}q;(h,]h-]h.]h/]h1]uh3Kh4hh]qq?}q@(h$h9h%h7ubaubcdocutils.nodes paragraph qA)qB}qC(h$XThe following technical use cases describe the component and system interactions in the DataONE infrastructure. The use cases describe functionality to address the broader scope user scenarios and overall project requirements.qDh%h"h&h'h(U paragraphqEh*}qF(h,]h-]h.]h/]h1]uh3Kh4hh]qGh=XThe following technical use cases describe the component and system interactions in the DataONE infrastructure. The use cases describe functionality to address the broader scope user scenarios and overall project requirements.qHqI}qJ(h$hDh%hBubaubh!)qK}qL(h$Uh%h"h&h'h(h)h*}qM(h,]h-]h.]h/]qNhah1]qOhauh3K h4hh]qP(h6)qQ}qR(h$X0Object Discovery, Access, Creation, ModificationqSh%hKh&h'h(h:h*}qT(h,]h-]h.]h/]h1]uh3K h4hh]qUh=X0Object Discovery, Access, Creation, ModificationqVqW}qX(h$hSh%hQubaubcdocutils.nodes compound qY)qZ}q[(h$Uh%hKh&h'h(Ucompoundq\h*}q](h,]h-]q^Utoctree-wrapperq_ah.]h/]h1]uh3Nh4hh]q`csphinx.addnodes toctree qa)qb}qc(h$Uh%hZh&h'h(Utoctreeqdh*}qe(UnumberedqfKU includehiddenqgh%Xdesign/usecasesqhUcaptionqiNUglobqjh/]h.]U titlesonlyqkh,]h-]h1]Uentriesql]qm(NXdesign/UseCases/01_ucqnqoNXdesign/UseCases/02_ucqpqqNXdesign/UseCases/04_ucqrqsNXdesign/UseCases/05_ucqtquNXdesign/UseCases/11_ucqvqwNXdesign/UseCases/24_ucqxqyNXdesign/UseCases/29_ucqzq{NXdesign/UseCases/33_ucq|q}NXdesign/UseCases/34_ucq~qNXdesign/UseCases/35_ucqqNXdesign/UseCases/36_ucqqNXdesign/UseCases/37_ucqqNXdesign/UseCases/38_ucqqNXdesign/UseCases/41_ucqqeUhiddenqU includefilesq]q(hnhphrhthvhxhzh|h~hhhhheUmaxdepthqKuh3K h]ubaubeubh!)q}q(h$Uh%h"h&h'h(h)h*}q(h,]h-]h.]h/]qhah1]qh auh3K h4hh]q(h6)q}q(h$XSynchronization and Replicationqh%hh&h'h(h:h*}q(h,]h-]h.]h/]h1]uh3K h4hh]qh=XSynchronization and Replicationqq}q(h$hh%hubaubhY)q}q(h$Uh%hh&h'h(h\h*}q(h,]h-]qh_ah.]h/]h1]uh3Nh4hh]qha)q}q(h$Uh%hh&h'h(hdh*}q(hfKhgh%hhhiNhjh/]h.]hkh,]h-]h1]hl]q(NXdesign/UseCases/06_ucqqNXdesign/UseCases/08_ucqqNXdesign/UseCases/09_ucqqNXdesign/UseCases/35_ucqqNXdesign/UseCases/37_ucqqNXdesign/UseCases/40_ucqqehh]q(hhhhhhehKuh3K"h]ubaubeubh!)q}q(h$Uh%h"h&h'h(h)h*}q(h,]h-]h.]h/]qhah1]qh auh3K-h4hh]q(h6)q}q(h$X1User and System Authentication and Access Controlqh%hh&h'h(h:h*}q(h,]h-]h.]h/]h1]uh3K-h4hh]qh=X1User and System Authentication and Access Controlqq}q(h$hh%hubaubhY)q}q(h$Uh%hh&h'h(h\h*}q(h,]h-]qh_ah.]h/]h1]uh3Nh4hh]qha)q}q(h$Uh%hh&h'h(hdh*}q(hfKhgh%hhhiNhjh/]h.]hkh,]h-]h1]hl]q(NXdesign/UseCases/12_ucqɆqNXdesign/UseCases/13_ucqˆqNXdesign/UseCases/14_ucq͆qNXdesign/UseCases/15_ucqφqNXdesign/UseCases/31_ucqцqNXdesign/UseCases/32_ucqӆqehh]q(hhhhhhehKuh3K/h]ubaubeubh!)q}q(h$Uh%h"h&h'h(h)h*}q(h,]h-]h.]h/]qhah1]qh auh3K;h4hh]q(h6)q}q(h$XSystem and Content Integrityqh%hh&h'h(h:h*}q(h,]h-]h.]h/]h1]uh3K;h4hh]qh=XSystem and Content Integrityqᅁq}q(h$hh%hubaubhY)q}q(h$Uh%hh&h'h(h\h*}q(h,]h-]qh_ah.]h/]h1]uh3Nh4hh]qha)q}q(h$Uh%hh&h'h(hdh*}q(hfKhgh%hhhiNhjh/]h.]hkh,]h-]h1]hl]q(NXdesign/UseCases/03_ucqqNXdesign/UseCases/10_ucqqNXdesign/UseCases/23_ucqqNXdesign/UseCases/24_ucqqNXdesign/UseCases/25_ucqqNXdesign/UseCases/26_ucqqNXdesign/UseCases/27_ucqqNXdesign/UseCases/29_ucqqNXdesign/UseCases/30_ucqqNXdesign/UseCases/35_ucqrNXdesign/UseCases/37_ucrrNXdesign/UseCases/39_ucrrNXdesign/UseCases/42_ucrrNXdesign/UseCases/43_ucrrNXdesign/UseCases/44_ucr r ehh]r (hhhhhhhhhhjjjjj ehKuh3K=h]ubaubeubh!)r }r (h$Uh%h"h&h'h(h)h*}r(h,]h-]h.]h/]rhah1]rhauh3KRh4hh]r(h6)r}r(h$X$Logging, Reporting, and Notificationrh%j h&h'h(h:h*}r(h,]h-]h.]h/]h1]uh3KRh4hh]rh=X$Logging, Reporting, and Notificationrr}r(h$jh%jubaubhY)r}r(h$Uh%j h&h'h(h\h*}r(h,]h-]rh_ah.]h/]h1]uh3Nh4hh]rha)r}r (h$Uh%jh&h'h(hdh*}r!(hfKhgh%hhhiNhjh/]h.]hkh,]h-]h1]hl]r"(NXdesign/UseCases/16_ucr#r$NXdesign/UseCases/17_ucr%r&NXdesign/UseCases/18_ucr'r(NXdesign/UseCases/19_ucr)r*NXdesign/UseCases/20_ucr+r,NXdesign/UseCases/21_ucr-r.NXdesign/UseCases/28_ucr/r0NXdesign/UseCases/30_ucr1r2ehh]r3(j#j%j'j)j+j-j/j1ehKuh3KTh]ubaubeubcdocutils.nodes transition r4)r5}r6(h$X----r7h%h"h&h'h(U transitionr8h*}r9(h,]h-]h.]h/]h1]uh3K`h4hh]ubh!)r:}r;(h$Uh%h"h&h'h(h)h*}r<(h,]h-]h.]h/]r=hah1]r>hauh3Kch4hh]r?(h6)r@}rA(h$X'Sequential List of Functional Use CasesrBh%j:h&h'h(h:h*}rC(h,]h-]h.]h/]h1]uh3Kch4hh]rDh=X'Sequential List of Functional Use CasesrErF}rG(h$jBh%j@ubaubhY)rH}rI(h$Uh%j:h&h'h(h\h*}rJ(h,]h-]rKh_ah.]h/]h1]uh3Nh4hh]rLha)rM}rN(h$Uh%jHh&h'h(hdh*}rO(hfKhgh%hhhiNhjh/]h.]hkh,]h-]h1]hl]rP(NXdesign/UseCases/01_ucrQrRNXdesign/UseCases/02_ucrSrTNXdesign/UseCases/03_ucrUrVNXdesign/UseCases/04_ucrWrXNXdesign/UseCases/05_ucrYrZNXdesign/UseCases/06_ucr[r\NXdesign/UseCases/07_ucr]r^NXdesign/UseCases/08_ucr_r`NXdesign/UseCases/09_ucrarbNXdesign/UseCases/10_ucrcrdNXdesign/UseCases/11_ucrerfNXdesign/UseCases/12_ucrgrhNXdesign/UseCases/13_ucrirjNXdesign/UseCases/14_ucrkrlNXdesign/UseCases/15_ucrmrnNXdesign/UseCases/16_ucrorpNXdesign/UseCases/17_ucrqrrNXdesign/UseCases/18_ucrsrtNXdesign/UseCases/19_ucrurvNXdesign/UseCases/20_ucrwrxNXdesign/UseCases/21_ucryrzNXdesign/UseCases/22_ucr{r|NXdesign/UseCases/23_ucr}r~NXdesign/UseCases/24_ucrrNXdesign/UseCases/25_ucrrNXdesign/UseCases/26_ucrrNXdesign/UseCases/27_ucrrNXdesign/UseCases/28_ucrrNXdesign/UseCases/29_ucrrNXdesign/UseCases/30_ucrrNXdesign/UseCases/31_ucrrNXdesign/UseCases/32_ucrrNXdesign/UseCases/33_ucrrNXdesign/UseCases/34_ucrrNXdesign/UseCases/35_ucrrNXdesign/UseCases/36_ucrrNXdesign/UseCases/37_ucrrNXdesign/UseCases/38_ucrrNXdesign/UseCases/39_ucrrNXdesign/UseCases/40_ucrrNXdesign/UseCases/41_ucrrNXdesign/UseCases/42_ucrrNXdesign/UseCases/43_ucrrNXdesign/UseCases/44_ucrrehh]r(jQjSjUjWjYj[j]j_jajcjejgjijkjmjojqjsjujwjyj{j}jjjjjjjjjjjjjjjjjjjjjehKuh3Keh]ubaubeubj4)r}r(h$X----rh%h"h&h'h(j8h*}r(h,]h-]h.]h/]h1]uh3Kkh4hh]ubh!)r}r(h$Uh%h"h&h'h(h)h*}r(h,]h-]h.]h/]rhah1]rh auh3Knh4hh]r(h6)r}r(h$XAbout Use Casesrh%jh&h'h(h:h*}r(h,]h-]h.]h/]h1]uh3Knh4hh]rh=XAbout Use Casesrr}r(h$jh%jubaubhA)r}r(h$XAn important early part in the process of system architecture is identifying the functional requirements that the resulting system should be able to address. Use cases are helpful for this as they describe how actors (typically entities external to the system) interact with system components. Interaction diagrams help define the interfaces and messages transmitted between components.rh%jh&h'h(hEh*}r(h,]h-]h.]h/]h1]uh3Kph4hh]rh=XAn important early part in the process of system architecture is identifying the functional requirements that the resulting system should be able to address. Use cases are helpful for this as they describe how actors (typically entities external to the system) interact with system components. Interaction diagrams help define the interfaces and messages transmitted between components.rr}r(h$jh%jubaubhA)r}r(h$X**Use Case Layout**rh%jh&h'h(hEh*}r(h,]h-]h.]h/]h1]uh3Kwh4hh]rcdocutils.nodes strong r)r}r(h$jh*}r(h,]h-]h.]h/]h1]uh%jh]rh=XUse Case Layoutrr}r(h$Uh%jubah(UstrongrubaubhA)r}r(h$XgEach use case document is structured following a common template which includes the following elements.rh%jh&h'h(hEh*}r(h,]h-]h.]h/]h1]uh3Kyh4hh]rh=XgEach use case document is structured following a common template which includes the following elements.rr}r(h$jh%jubaubcdocutils.nodes block_quote r)r}r(h$Uh%jh&Nh(U block_quoterh*}r(h,]h-]h.]h/]h1]uh3Nh4hh]rcdocutils.nodes definition_list r)r}r(h$Uh*}r(h,]h-]h.]h/]h1]uh%jh]r(cdocutils.nodes definition_list_item r)r}r(h$XTRevisions A link to the revision history of the document as recorded by subversion. h%jh&h'h(Udefinition_list_itemrh*}r(h,]h-]h.]h/]h1]uh3K}h]r(cdocutils.nodes term r)r}r(h$X Revisionsrh%jh&h'h(Utermrh*}r(h,]h-]h.]h/]h1]uh3K}h]rh=X Revisionsrr}r(h$jh%jubaubcdocutils.nodes definition r)r}r(h$Uh*}r(h,]h-]h.]h/]h1]uh%jh]rhA)r}r(h$XIA link to the revision history of the document as recorded by subversion.rh%jh&h'h(hEh*}r(h,]h-]h.]h/]h1]uh3K}h]rh=XIA link to the revision history of the document as recorded by subversion.rr}r(h$jh%jubaubah(U definitionrubeubj)r}r(h$X>Goal Brief description of what is intended with the use case. h%jh&h'h(jh*}r(h,]h-]h.]h/]h1]uh3Kh]r(j)r}r(h$XGoalr h%jh&h'h(jh*}r (h,]h-]h.]h/]h1]uh3Kh]r h=XGoalr r }r(h$j h%jubaubj)r}r(h$Uh*}r(h,]h-]h.]h/]h1]uh%jh]rhA)r}r(h$X8Brief description of what is intended with the use case.rh%jh&h'h(hEh*}r(h,]h-]h.]h/]h1]uh3Kh]rh=X8Brief description of what is intended with the use case.rr}r(h$jh%jubaubah(jubeubj)r}r(h$XNSummary An overview of the use case which includes the goal and major actors. h%jh&h'h(jh*}r(h,]h-]h.]h/]h1]uh3Kh]r(j)r}r (h$XSummaryr!h%jh&h'h(jh*}r"(h,]h-]h.]h/]h1]uh3Kh]r#h=XSummaryr$r%}r&(h$j!h%jubaubj)r'}r((h$Uh*}r)(h,]h-]h.]h/]h1]uh%jh]r*hA)r+}r,(h$XEAn overview of the use case which includes the goal and major actors.r-h%j'h&h'h(hEh*}r.(h,]h-]h.]h/]h1]uh3Kh]r/h=XEAn overview of the use case which includes the goal and major actors.r0r1}r2(h$j-h%j+ubaubah(jubeubj)r3}r4(h$XWUse case diagram A diagram representation of the use case, somewhat following the UML. h%jh&h'h(jh*}r5(h,]h-]h.]h/]h1]uh3Kh]r6(j)r7}r8(h$XUse case diagramr9h%j3h&h'h(jh*}r:(h,]h-]h.]h/]h1]uh3Kh]r;h=XUse case diagramr<r=}r>(h$j9h%j7ubaubj)r?}r@(h$Uh*}rA(h,]h-]h.]h/]h1]uh%j3h]rBhA)rC}rD(h$XEA diagram representation of the use case, somewhat following the UML.rEh%j?h&h'h(hEh*}rF(h,]h-]h.]h/]h1]uh3Kh]rGh=XEA diagram representation of the use case, somewhat following the UML.rHrI}rJ(h$jEh%jCubaubah(jubeubj)rK}rL(h$XcSequence diagram A sequence diagram that shows the operations involved in addressing the use case. h%jh&h'h(jh*}rM(h,]h-]h.]h/]h1]uh3Kh]rN(j)rO}rP(h$XSequence diagramrQh%jKh&h'h(jh*}rR(h,]h-]h.]h/]h1]uh3Kh]rSh=XSequence diagramrTrU}rV(h$jQh%jOubaubj)rW}rX(h$Uh*}rY(h,]h-]h.]h/]h1]uh%jKh]rZhA)r[}r\(h$XQA sequence diagram that shows the operations involved in addressing the use case.r]h%jWh&h'h(hEh*}r^(h,]h-]h.]h/]h1]uh3Kh]r_h=XQA sequence diagram that shows the operations involved in addressing the use case.r`ra}rb(h$j]h%j[ubaubah(jubeubj)rc}rd(h$XGActors The participants in the use case - includes people and systems. h%jh&h'h(jh*}re(h,]h-]h.]h/]h1]uh3Kh]rf(j)rg}rh(h$XActorsrih%jch&h'h(jh*}rj(h,]h-]h.]h/]h1]uh3Kh]rkh=XActorsrlrm}rn(h$jih%jgubaubj)ro}rp(h$Uh*}rq(h,]h-]h.]h/]h1]uh%jch]rrhA)rs}rt(h$X?The participants in the use case - includes people and systems.ruh%joh&h'h(hEh*}rv(h,]h-]h.]h/]h1]uh3Kh]rwh=X?The participants in the use case - includes people and systems.rxry}rz(h$juh%jsubaubah(jubeubj)r{}r|(h$XPreconditions The conditions that must exist for the use case. For example, a particular use case may only be valid if the use has been authenticated. h%jh&h'h(jh*}r}(h,]h-]h.]h/]h1]uh3Kh]r~(j)r}r(h$X Preconditionsrh%j{h&h'h(jh*}r(h,]h-]h.]h/]h1]uh3Kh]rh=X Preconditionsrr}r(h$jh%jubaubj)r}r(h$Uh*}r(h,]h-]h.]h/]h1]uh%j{h]rhA)r}r(h$XThe conditions that must exist for the use case. For example, a particular use case may only be valid if the use has been authenticated.rh%jh&h'h(hEh*}r(h,]h-]h.]h/]h1]uh3Kh]rh=XThe conditions that must exist for the use case. For example, a particular use case may only be valid if the use has been authenticated.rr}r(h$jh%jubaubah(jubeubj)r}r(h$XFTriggers Describes the even that causes the use case to be initiated. h%jh&h'h(jh*}r(h,]h-]h.]h/]h1]uh3Kh]r(j)r}r(h$XTriggersrh%jh&h'h(jh*}r(h,]h-]h.]h/]h1]uh3Kh]rh=XTriggersrr}r(h$jh%jubaubj)r}r(h$Uh*}r(h,]h-]h.]h/]h1]uh%jh]rhA)r}r(h$X<Describes the even that causes the use case to be initiated.rh%jh&h'h(hEh*}r(h,]h-]h.]h/]h1]uh3Kh]rh=X<Describes the even that causes the use case to be initiated.rr}r(h$jh%jubaubah(jubeubj)r}r(h$XvPostconditions The state of the system after the use case - what conditions are true after the use case is completed. h%jh&h'h(jh*}r(h,]h-]h.]h/]h1]uh3Kh]r(j)r}r(h$XPostconditionsrh%jh&h'h(jh*}r(h,]h-]h.]h/]h1]uh3Kh]rh=XPostconditionsrr}r(h$jh%jubaubj)r}r(h$Uh*}r(h,]h-]h.]h/]h1]uh%jh]rhA)r}r(h$XfThe state of the system after the use case - what conditions are true after the use case is completed.rh%jh&h'h(hEh*}r(h,]h-]h.]h/]h1]uh3Kh]rh=XfThe state of the system after the use case - what conditions are true after the use case is completed.rr}r(h$jh%jubaubah(jubeubj)r}r(h$XNotes Miscellaneous notes and discussion items that can't be placed in the various categories. Comments should be annotated with time and author. h%jh&h'h(jh*}r(h,]h-]h.]h/]h1]uh3Kh]r(j)r}r(h$XNotesrh%jh&h'h(jh*}r(h,]h-]h.]h/]h1]uh3Kh]rh=XNotesrr}r(h$jh%jubaubj)r}r(h$Uh*}r(h,]h-]h.]h/]h1]uh%jh]rhA)r}r(h$XMiscellaneous notes and discussion items that can't be placed in the various categories. Comments should be annotated with time and author.rh%jh&h'h(hEh*}r(h,]h-]h.]h/]h1]uh3Kh]rh=XMiscellaneous notes and discussion items that can't be placed in the various categories. Comments should be annotated with time and author.rr}r(h$jh%jubaubah(jubeubeh(Udefinition_listrubaubcdocutils.nodes comment r)r}r(h$Xdigraph uc_dependencies { fontname = "Bitstream Vera Sans"; fontsize = 8; edge [ fontname = "Bitstream Vera Sans" fontsize = 8 color = "#888888" arrowhead = "open" arrowsize = 0.5 len = 0.2 style="dashed" ]; node [ shape = "record" fontname = "Courier" fontsize = 8 fontcolor = "black"]; UC01 [label="UC01\nGet Object Identified by PID" URL="UseCases/01_uc.html"]; UC02 [label="UC02\nList PIDs By Search" URL="UseCases/02_uc.html"]; UC03 [label="UC03\nRegister MN" URL="UseCases/03_uc.html"]; UC04 [label="UC04\nCreate New Object" URL="UseCases/04_uc.html"]; UC05 [label="UC05\nUpdate Metadata" URL="UseCases/05_uc.html"]; UC06 [label="UC06\nMN Synchronize" URL="UseCases/06_uc.html"]; UC07 [label="UC07\nCN Batch Upload" URL="UseCases/07_uc.html"]; UC08 [label="UC08\nReplication Policy Communication" URL="UseCases/08_uc.html"]; UC09 [label="UC09\nReplicate MN to MN" URL="UseCases/09_uc.html"]; UC10 [label="UC10\nMN Status Reports" URL="UseCases/10_uc.html"]; UC11 [label="UC11\nCRUD Workflow Objects" URL="UseCases/11_uc.html"]; UC12 [label="UC12\nUser Authentication" URL="UseCases/12_uc.html"]; UC13 [label="UC13\nUser Authorization" URL="UseCases/13_uc.html"]; UC14 [label="UC14\nSystem Authentication and Authorization" URL="UseCases/14_uc.html"]; UC15 [label="UC15\nAccount Management" URL="UseCases/15_uc.html"]; UC16 [label="UC16\nLog CRUD Operations" URL="UseCases/16_uc.html"]; UC17 [label="UC17\nCRUD Logs Aggregated at CNs" URL="UseCases/17_uc.html"]; UC18 [label="UC18\nMN Retrieve Aggregated Logs" URL="UseCases/18_uc.html"]; UC19 [label="UC19\nRetrieve Object Download Summary" URL="UseCases/19_uc.html"]; UC20 [label="UC20\nOwner Retrieve Aggregate Logs" URL="UseCases/20_uc.html"]; UC21 [label="UC21\nOwner Subscribe to CRUD Operations" URL="UseCases/21_uc.html"]; UC22 [label="UC22\nLink/Citation Report for Owner" URL="UseCases/22_uc.html"]; UC23 [label="UC23\nOwner Expunge Content" URL="UseCases/23_uc.html"]; UC24 [label="UC24\nMNs and CNs Support Transactions" URL="UseCases/24_uc.html"]; UC25 [label="UC25\nDetect Damaged Content" URL="UseCases/25_uc.html"]; UC26 [label="UC26\nData Quality Checks" URL="UseCases/26_uc.html"]; UC27 [label="UC27\nMetadata Version Migration" URL="UseCases/27_uc.html"]; UC28 [label="UC28\nDerived Product Original Change Notification" URL="UseCases/28_uc.html"]; UC29 [label="UC29\nCN Load Balancing" URL="UseCases/29_uc.html"]; UC30 [label="UC30\nMN Outage Notification" URL="UseCases/30_uc.html"]; UC31 [label="UC31\nManage Access Policies" URL="UseCases/31_uc.html"]; UC32 [label="UC32\nTransfer Object Ownership" URL="UseCases/32_uc.html"]; UC33 [label="UC33\nSearch for Data" URL="UseCases/33_uc.html"]; UC34 [label="UC34\nCNs Support Other Discovery Mechanisms (e.g. Google)" URL="UseCases/34_uc.html"]; UC35 [label="UC35\nQuery Coordinating Node for Metadata Describing a Member Node" URL="UseCases/35_uc.html"]; UC36 [label="UC36\nResolve an Object Location" URL="UseCases/36_uc.html"]; UC37 [label="UC37\nGet System Metadata for Object" URL="UseCases/37_uc.html"]; UC38 [label="UC38\nReserve an Identifier" URL="UseCases/38_uc.html"]; UC39 [label="UC39\nTest Node APIs" URL="UseCases/39_uc.html"]; UC01 -> UC12; UC01 -> UC13; UC01 -> UC16; UC01 -> UC21; UC02 -> UC12; UC02 -> UC13; UC03 -> UC12; UC03 -> UC13; UC04 -> UC06; UC04 -> UC12; UC04 -> UC13; UC05 -> UC06; UC05 -> UC12; UC05 -> UC13; UC06 -> UC12; UC07 -> UC13; }h%jh&h'h(Ucommentrh*}r(U xml:spacerUpreserverh/]h.]h,]h-]h1]uh3Mh4hh]rh=Xdigraph uc_dependencies { fontname = "Bitstream Vera Sans"; fontsize = 8; edge [ fontname = "Bitstream Vera Sans" fontsize = 8 color = "#888888" arrowhead = "open" arrowsize = 0.5 len = 0.2 style="dashed" ]; node [ shape = "record" fontname = "Courier" fontsize = 8 fontcolor = "black"]; UC01 [label="UC01\nGet Object Identified by PID" URL="UseCases/01_uc.html"]; UC02 [label="UC02\nList PIDs By Search" URL="UseCases/02_uc.html"]; UC03 [label="UC03\nRegister MN" URL="UseCases/03_uc.html"]; UC04 [label="UC04\nCreate New Object" URL="UseCases/04_uc.html"]; UC05 [label="UC05\nUpdate Metadata" URL="UseCases/05_uc.html"]; UC06 [label="UC06\nMN Synchronize" URL="UseCases/06_uc.html"]; UC07 [label="UC07\nCN Batch Upload" URL="UseCases/07_uc.html"]; UC08 [label="UC08\nReplication Policy Communication" URL="UseCases/08_uc.html"]; UC09 [label="UC09\nReplicate MN to MN" URL="UseCases/09_uc.html"]; UC10 [label="UC10\nMN Status Reports" URL="UseCases/10_uc.html"]; UC11 [label="UC11\nCRUD Workflow Objects" URL="UseCases/11_uc.html"]; UC12 [label="UC12\nUser Authentication" URL="UseCases/12_uc.html"]; UC13 [label="UC13\nUser Authorization" URL="UseCases/13_uc.html"]; UC14 [label="UC14\nSystem Authentication and Authorization" URL="UseCases/14_uc.html"]; UC15 [label="UC15\nAccount Management" URL="UseCases/15_uc.html"]; UC16 [label="UC16\nLog CRUD Operations" URL="UseCases/16_uc.html"]; UC17 [label="UC17\nCRUD Logs Aggregated at CNs" URL="UseCases/17_uc.html"]; UC18 [label="UC18\nMN Retrieve Aggregated Logs" URL="UseCases/18_uc.html"]; UC19 [label="UC19\nRetrieve Object Download Summary" URL="UseCases/19_uc.html"]; UC20 [label="UC20\nOwner Retrieve Aggregate Logs" URL="UseCases/20_uc.html"]; UC21 [label="UC21\nOwner Subscribe to CRUD Operations" URL="UseCases/21_uc.html"]; UC22 [label="UC22\nLink/Citation Report for Owner" URL="UseCases/22_uc.html"]; UC23 [label="UC23\nOwner Expunge Content" URL="UseCases/23_uc.html"]; UC24 [label="UC24\nMNs and CNs Support Transactions" URL="UseCases/24_uc.html"]; UC25 [label="UC25\nDetect Damaged Content" URL="UseCases/25_uc.html"]; UC26 [label="UC26\nData Quality Checks" URL="UseCases/26_uc.html"]; UC27 [label="UC27\nMetadata Version Migration" URL="UseCases/27_uc.html"]; UC28 [label="UC28\nDerived Product Original Change Notification" URL="UseCases/28_uc.html"]; UC29 [label="UC29\nCN Load Balancing" URL="UseCases/29_uc.html"]; UC30 [label="UC30\nMN Outage Notification" URL="UseCases/30_uc.html"]; UC31 [label="UC31\nManage Access Policies" URL="UseCases/31_uc.html"]; UC32 [label="UC32\nTransfer Object Ownership" URL="UseCases/32_uc.html"]; UC33 [label="UC33\nSearch for Data" URL="UseCases/33_uc.html"]; UC34 [label="UC34\nCNs Support Other Discovery Mechanisms (e.g. Google)" URL="UseCases/34_uc.html"]; UC35 [label="UC35\nQuery Coordinating Node for Metadata Describing a Member Node" URL="UseCases/35_uc.html"]; UC36 [label="UC36\nResolve an Object Location" URL="UseCases/36_uc.html"]; UC37 [label="UC37\nGet System Metadata for Object" URL="UseCases/37_uc.html"]; UC38 [label="UC38\nReserve an Identifier" URL="UseCases/38_uc.html"]; UC39 [label="UC39\nTest Node APIs" URL="UseCases/39_uc.html"]; UC01 -> UC12; UC01 -> UC13; UC01 -> UC16; UC01 -> UC21; UC02 -> UC12; UC02 -> UC13; UC03 -> UC12; UC03 -> UC13; UC04 -> UC06; UC04 -> UC12; UC04 -> UC13; UC05 -> UC06; UC05 -> UC12; UC05 -> UC13; UC06 -> UC12; UC07 -> UC13; }rr}r(h$Uh%jubaubeubeubah$UU transformerrNU footnote_refsr}rUrefnamesr}rUsymbol_footnotesr]rUautofootnote_refsr]rUsymbol_footnote_refsr]rU citationsr]rh4hU current_linerNUtransform_messagesr]rUreporterrNUid_startrKU autofootnotesr]rU citation_refsr}rUindirect_targetsr]rUsettingsr(cdocutils.frontend Values ror}r(Ufootnote_backlinksrKUrecord_dependenciesrNU rfc_base_urlrUhttps://tools.ietf.org/html/rU tracebackrUpep_referencesrNUstrip_commentsr NU toc_backlinksr Uentryr U language_coder Uenr U datestamprNU report_levelrKU _destinationrNU halt_levelrKU strip_classesrNh:NUerror_encoding_error_handlerrUbackslashreplacerUdebugrNUembed_stylesheetrUoutput_encoding_error_handlerrUstrictrU sectnum_xformrKUdump_transformsrNU docinfo_xformrKUwarning_streamrNUpep_file_url_templaterUpep-%04drUexit_status_levelrKUconfigr NUstrict_visitorr!NUcloak_email_addressesr"Utrim_footnote_reference_spacer#Uenvr$NUdump_pseudo_xmlr%NUexpose_internalsr&NUsectsubtitle_xformr'U source_linkr(NUrfc_referencesr)NUoutput_encodingr*Uutf-8r+U source_urlr,NUinput_encodingr-U utf-8-sigr.U_disable_configr/NU id_prefixr0UU tab_widthr1KUerror_encodingr2UUTF-8r3U_sourcer4h'Ugettext_compactr5U generatorr6NUdump_internalsr7NU smart_quotesr8U pep_base_urlr9U https://www.python.org/dev/peps/r:Usyntax_highlightr;Ulongr<Uinput_encoding_error_handlerr=jUauto_id_prefixr>Uidr?Udoctitle_xformr@Ustrip_elements_with_classesrANU _config_filesrB]Ufile_insertion_enabledrCU raw_enabledrDKU dump_settingsrENubUsymbol_footnote_startrFKUidsrG}rH(hhhh"hhKhj:hjhj hhhhuUsubstitution_namesrI}rJh(h4h*}rK(h,]h/]h.]Usourceh'h-]h1]uU footnotesrL]rMUrefidsrN}rOub.