In previous Posts the security context was too simple so I’ve expanded it to represent which principals are involved as handling authentication is outside of the scope of this exercise which is already going too long. I’ve also added the storage, potential backups and encryption keys to the security context.
The next step is defining the message formats that will be used by the Owner. Having stated that many items could be stored on a single interaction and copying part of the design of John Crickett the following class diagram represents the request and responses for both Store and Remove operations. A map of DataElements and tokens is used to be able to know which values were successfully processed in both operations.
While the internal messages are represented on the following class diagram.
So with this now we can start coding which will be on the next Post