Sunteți pe pagina 1din 1

INTERNATIONAL DATA SPACES MISSION STATEMENT DIGITAL IDENTITIES

APPROACH
Endless Connectivity Secure Data E
 xchange International A network of trusted entities 
Standards
Standard for data flows between It forms the basis for a va- in the data economy requires
A TRUSTWORTHY ARCHITECTURE all kinds of data endpoints riety of certifiable software
solutions, smart services …
IDSA defines the basic
conditions and gover-
nance for a reference ar-
a mechanism for digital entities,
that can reliably identify a partic-
FOR THE DATA ECONOMY
Trust between different security domains
chitecture and interfaces
Comprehensive and audit-proo security func- ipant and can provide more infor-
tions providing a maximum level of trust
mation on transaction partners.
Business Models Use Cases Additional information must be
The IDS provides self-determined control Governance for the data economy Data Owners remain This standard is actively
updated regularly and be provid-
Usage control and enforcement f or sovereign owners of developed and updated
between all imaginable data endpoints data flows and assignments of data their data at any time on the basis of use cases ed in a trusted manner.

CLEARING
Broker HOUSE Clearing House
IDS Connectors register the description of their data end- Intermediary providing clearing and set-
points at an IDS Broker.Thus, potential Data Consumers can tlement services for all financial and data
look up available data sources and data in terms of their exchange transactions within the IDS.
content, structure quality, actuality and other attributes.

App Stores APP BROKER VOCABULARY Vocabulary


App Stores provide Data Apps, i.e. applica- Vocabulary Providers manage and offer
tions that can be deployed in IDS Connec- vocabularies (ontologies, reference data
tors to execute tasks like transformation, models, metadata elements) which can be
aggregation or analytics on the data. Data used to annotate and describe datasets.
Apps may be certified by IDS-approved Vocabulary Providers provide (domain spe-
certification bodies. App Stores can be cific) vocabularies and their reference to
provided by IDS members and must, them- the IDS Information Model, which is the
selves, be certified under IDS standards. basis for the description of data sources.

DATA PROVIDER/ DATA PROVIDER/


Data Provider DATA CONSUMER DATA CONSUMER Data Consumer
Data Providers give access to data under Data Consumers can search for data
specific usage and price models. They are and use the data of different data pro-
able to control the access to data and the
usage of data at the Data Consumer.
CONNECTOR CONNECTOR viders. Data Consumers are bound to
the usage policy of the Data Provider.

Identity Provider Connector


Data exchange or Software injection
Identity Providers offer a range of services IDS Connectors provide standardized
to create, maintain, manage and validate connectivity in the IDS Ecosystem. Con-
identity information of and for IDS partici- nectors are responsible for connectiv-
pants, regardless under which of the above ity and Usage Control. They allow the
roles they consider to take part. Proven execution of trusted apps in an isolat-
identity of all participants in the IDS rep- ed Identity Provider environment.
resent an essential imperative to the IDS
architecture.
IDENTITY
PROVIDER

Data - the economic asset in data driven business models


The key focus for any data-driven economy is on exploiting and sharing data from various data sources.

Mobility Technical Sensor Financial  Material Medical Quality Origin Planning Geographical … and billions
Metadata flow Data flow Software flow Identification Certification
Data Drawings Data Data Features Data Data Data Data Data of other data

USE CASES COMMUNITIES 10 THINGS TO KNOW ABOUT CERTIFICATION CALL TO


APPROACH ACTION
Services and functionalities of the IDS are spec- Interest and user groups of same or similar domains with Enterprise The IDS Certification Body is appointed by the IDSA and Become a member in
ified and validated in use cases. common challenges validate and proliferate the IDS ap- Containerization, Integration Patterns regularly aligns with the IDSA to manage the certification
proach, technology and eco-system. Based on their prac- e.g. Docker Webservices, e.g. https, MQTT, process, defines the standardized evaluation procedures
the International Data
Additional tical experience the IDS reference architecture and the
REST, Multi Part Messages and supervises the actions of the Evaluation Facilities. Spaces Association:
requirements eco-system around it are continuously developed. Thus, Software Engineering,  An Evaluation Facility is contracted by an Applicant and
are fed into the specific application scenarios for verticals are set up, im- Message Oriented e.g. tools like Maven, git is responsible for carrying out the detailed technical and
architecture plemented and systematically pushed forward, allowing Middleware Digital Identities and  organizational evaluation work during a certification.
development. participants to enhance existing or to launch new services.
The IDS
Digital Certificates, e.g. X509
approach is Semantic Data Descriptions,  Data Ecosystems
applied and Medical Banking/ Smart e.g. Ressource Description Framework
tested in Smart Services are devel- Health Insurances Cities Certification, e.g. 
Pilots. oped facilitating the Data
Owner and Data Consum-
Energy Farm & Food
Requirements Engineering, 
IEC 62443, ISO 27001 Participant  Digital Technical 
ers to exploit the IDS. Materials Industrial Logistics Processes and tools, e.g. UML and BPMN Certification Certificate Certification

Concept and Design: INFOGRAFIK PRO GmbH – www.infografik.pro

S-ar putea să vă placă și