The process of generating ideas or concepts, commonly employed in brainstorming, problem-solving, and innovation. external-link


A distinctive characteristic that is utilized to recognize an entity within the Gaia-X context and adheres to the Gaia-X format. external-link


An Identity refers to how an entity (such as a Participant, Asset, or Resource) is represented through one or more attributes that enable it to be easily distinguished within a given context. It is possible for an Identity to have multiple Identifiers, further enhancing its ability to be uniquely identified. external-link


An Identity refers to a representation of an entity, whether it be a Participant, Asset, or Resource, that is defined by one or more attributes that enable the entity to be uniquely identified in a given context. An identity can be composed of multiple Identifiers that serve to distinguish the entity further. external-link

Identity / Access Management

Identity & Access Management (IAM) controls access to data and provides answers to two fundamental questions: Who is the user? The user's identity is verified through authentication and typically stored in an employee directory. What permissions does the user have? This question relates to authorization for specific actions. For example, the right to read or edit data may be tied to the user's role. IAM is an established concept that is also used in big data solutions. external-link

Identity & Trust 

Identity and Trust is a key Federation Service provided by Gaia-X that enables Participants in a Gaia-X ecosystem to establish and verify their identities. It is responsible for managing identity and access for both Providers and Consumers within the ecosystem, ensuring that Participants are who they claim to be. external-link

Identity Access Control

Access control is a security measure that allows for the regulation of access to computing resources, determining which individuals or entities are permitted to view or use them. external-link

Identity Provider

An intermediary that provides services to create, uphold, manage, and validate identity data of and for Participants in the International Data Spaces. external-link

Identity System 

An Identity System is a Gaia-X component responsible for verifying and augmenting the identity of a Gaia-X Principal, and then passing that identity on to the requester. A Gaia-X accredited Identity System takes a hybrid approach and comprises both centralized components, such as company identity management systems, and decentralized components such as Decentralized Identifiers (DIDs). external-link

Identity Verification

The process of confirming the authenticity of a given proof of identity. Refer to International Data Spaces. external-link


A secure data exchange is facilitated by a distributed network of Data Endpoints, which are essentially instances of the International Data Spaces Connector. This network ensures data sovereignty by guaranteeing the secure exchange of data. external-link

IDS Connector

The IDS Connector serves as the core element for ensuring secure and reliable data exchange. By utilizing this connector, you can directly transmit your data from your device or database to the intended recipient within a certified and trustworthy data environment. This approach allows the original data provider to retain full control over the data and establish the conditions under which it can be used. The connector employs advanced technology that encapsulates your data within a virtual "container," guaranteeing that it is utilized strictly according to the mutually agreed-upon terms determined by all involved parties. external-link

IDS Information Model

A compilation of vocabularies and correlated schema data for the semantic portrayal of International Data Spaces entities (e.g., Data Endpoints or Data Apps), data origination, or licensing details; the fundamental IDS Vocabulary is domain-agnostic; it is expandable and/or can cite third-party vocabularies to convey domain-specific aspects. See also: GitHub repository IDS-G specification Information Model Acronym: IDS-IM external-link

IDS Reference Architecture Model

Data Exchange, Data Sharing, and Data Sovereignty are crucial for businesses that rely on data. The International Data Spaces Reference Architecture Model (IDS-RAM) provides a framework for ensuring trusted data exchange and defines key concepts related to Data Sovereignty, Data Sharing, and Data Exchange. The IDS-RAM operates at a higher abstraction level than typical software architecture models and consists of five layers that specify the various roles, activities, and interactions involved in creating a secure network of trusted data. The IDS-RAM also includes three perspectives - Security, Certification, and Governance - that are essential for ensuring the security and integrity of the data. Overall, the IDS-RAM provides a comprehensive guide for implementing secure and trusted data exchange in the International Data Spaces. external-link

IDSA Ready Certified

To ensure that every IDS-compliant connector functions as defined by the IDS standard, it undergoes certification, along with the operating environment it operates in, against specific security and interoperability standards. Based on this foundation of trust, participants can initiate their actual data exchange. For more information, visit:

Data Intelligence Hub

IEC 61850

The international standard describes a transmission protocol used in the protection and control technology for medium- and high-voltage switchgear. The protocol enables reliable transmission of information about the status and control of electric switchgear and thus provides an important basis for the safe operation of power grids. external-link

IEC 62541

OPC UA is an international standard for an industrial-grade M2M communication protocol. It enables interoperable communication between machines in various applications and industries, such as manufacturing, automation, and logistics. external-link


An international standard published by the IEC (International Electrotechnical Commission), a significant international standardization organization in the electrical industry. external-link

If This Then That

IFTTT, pronounced to rhyme with "gift," is an online service designed to streamline Web-based tasks. It allows users to automate actions in response to specific events, ensuring efficient handling of subsequent tasks. external-link


A container image is a self-contained package of software that includes everything needed to run an application, including the code, runtime, system tools, libraries, and settings. It is a way of packaging software in a format that can be stored in a container registry, pulled to a local system, and run as an application. Container images contain metadata that describes the image, such as the executable to run, who built it, and other relevant information. external-link

Implementation Stage

The phase beginning with a detailed project plan for a data space initiative, including milestones and resources for developing its governance structure and infrastructure within a pilot framework. This stage is marked by clear identification of the participants involved in the pilot and the value each contributes. external-link

In-Database Analytics

In-Database Analytics refers to the process of performing advanced analytics, such as data mining, predictive modeling, and statistical analysis, directly within a database management system (DBMS). By leveraging the computational capabilities and parallel processing of the DBMS, it eliminates the need to move large datasets to external analytics tools, improving performance and reducing data movement latency. external-link

Industry 4.0

The term "fourth industrial revolution" refers to the integration of information and communication technologies (ICT) into industrial production and related areas to create a connected environment. external-link

Inernet Engineering Task Force

The IETF plays a crucial role in establishing voluntary standards that are frequently embraced by Internet users, network operators, and equipment vendors. Through this contribution, it actively influences the direction of Internet development. However, it is important to note that the IETF does not exercise control over the Internet, nor does it engage in any form of policing. external-link

Information hub in the energy market

Regional platforms in the energy market act as information hubs and provide tariff incentives for energy supply, energy injection, energy transport, and aggregation services. This facilitates market access. external-link

Information Model

The IDS data model encompasses all the known classes, entities, and attributes that are recognized by the IDS actors. external-link

Information Network Berlin-Bonn

IVBB (Integrated Connection and Operations System) is the communication infrastructure that enables reliable and secure transmission of voice and data communication between the highest federal authorities and constitutional organs in Berlin and Bonn. external-link

Information Network of the Federal Administration/Federal Administration Network (BVN)

The Information Network of the Federal Administration (IVBV) or the Federal Administrative Network (BNV) extends the IVBB system to connect federal authorities in different regions. external-link