Ideation
The process of generating ideas or concepts, commonly employed in brainstorming, problem-solving, and innovation.
Identifier
A distinctive characteristic that is utilized to recognize an entity within the Gaia-X context and adheres to the Gaia-X format.
Identity
An Identity refers to how an entity (such as a Participant, Asset, or Resource) is represented through one or more attributes that enable it to be easily distinguished within a given context. It is possible for an Identity to have multiple Identifiers, further enhancing its ability to be uniquely identified.
Identity
An Identity refers to a representation of an entity, whether it be a Participant, Asset, or Resource, that is defined by one or more attributes that enable the entity to be uniquely identified in a given context. An identity can be composed of multiple Identifiers that serve to distinguish the entity further.
Identity / Access Management
Identity & Access Management (IAM) controls access to data and provides answers to two fundamental questions: Who is the user? The user's identity is verified through authentication and typically stored in an employee directory. What permissions does the user have? This question relates to authorization for specific actions. For example, the right to read or edit data may be tied to the user's role. IAM is an established concept that is also used in big data solutions.
Identity & Trust
Identity and Trust is a key Federation Service provided by Gaia-X that enables Participants in a Gaia-X ecosystem to establish and verify their identities. It is responsible for managing identity and access for both Providers and Consumers within the ecosystem, ensuring that Participants are who they claim to be.
Identity Access Control
Access control is a security measure that allows for the regulation of access to computing resources, determining which individuals or entities are permitted to view or use them.
Identity Provider
An intermediary that provides services to create, uphold, manage, and validate identity data of and for Participants in the International Data Spaces.
Identity System
An Identity System is a Gaia-X component responsible for verifying and augmenting the identity of a Gaia-X Principal, and then passing that identity on to the requester. A Gaia-X accredited Identity System takes a hybrid approach and comprises both centralized components, such as company identity management systems, and decentralized components such as Decentralized Identifiers (DIDs).
Identity Verification
The process of confirming the authenticity of a given proof of identity. Refer to International Data Spaces.
IDS
A secure data exchange is facilitated by a distributed network of Data Endpoints, which are essentially instances of the International Data Spaces Connector. This network ensures data sovereignty by guaranteeing the secure exchange of data.
IDS Connector
The IDS Connector serves as the core element for ensuring secure and reliable data exchange. By utilizing this connector, you can directly transmit your data from your device or database to the intended recipient within a certified and trustworthy data environment. This approach allows the original data provider to retain full control over the data and establish the conditions under which it can be used. The connector employs advanced technology that encapsulates your data within a virtual "container," guaranteeing that it is utilized strictly according to the mutually agreed-upon terms determined by all involved parties.
IDS Information Model
A compilation of vocabularies and correlated schema data for the semantic portrayal of International Data Spaces entities (e.g., Data Endpoints or Data Apps), data origination, or licensing details; the fundamental IDS Vocabulary is domain-agnostic; it is expandable and/or can cite third-party vocabularies to convey domain-specific aspects. See also: GitHub repository IDS-G specification Information Model Acronym: IDS-IM
IDS Reference Architecture Model
Data Exchange, Data Sharing, and Data Sovereignty are crucial for businesses that rely on data. The International Data Spaces Reference Architecture Model (IDS-RAM) provides a framework for ensuring trusted data exchange and defines key concepts related to Data Sovereignty, Data Sharing, and Data Exchange. The IDS-RAM operates at a higher abstraction level than typical software architecture models and consists of five layers that specify the various roles, activities, and interactions involved in creating a secure network of trusted data. The IDS-RAM also includes three perspectives - Security, Certification, and Governance - that are essential for ensuring the security and integrity of the data. Overall, the IDS-RAM provides a comprehensive guide for implementing secure and trusted data exchange in the International Data Spaces.
IDSA Ready Certified
To ensure that every IDS-compliant connector functions as defined by the IDS standard, it undergoes certification, along with the operating environment it operates in, against specific security and interoperability standards. Based on this foundation of trust, participants can initiate their actual data exchange. For more information, visit: https://internationaldataspaces.org/use/certification/
IEC 61850
The international standard describes a transmission protocol used in the protection and control technology for medium- and high-voltage switchgear. The protocol enables reliable transmission of information about the status and control of electric switchgear and thus provides an important basis for the safe operation of power grids.
IEC 62541
OPC UA is an international standard for an industrial-grade M2M communication protocol. It enables interoperable communication between machines in various applications and industries, such as manufacturing, automation, and logistics.
IEC-Standard
An international standard published by the IEC (International Electrotechnical Commission), a significant international standardization organization in the electrical industry.
If This Then That
IFTTT, pronounced to rhyme with "gift," is an online service designed to streamline Web-based tasks. It allows users to automate actions in response to specific events, ensuring efficient handling of subsequent tasks.
Image
A container image is a self-contained package of software that includes everything needed to run an application, including the code, runtime, system tools, libraries, and settings. It is a way of packaging software in a format that can be stored in a container registry, pulled to a local system, and run as an application. Container images contain metadata that describes the image, such as the executable to run, who built it, and other relevant information.
Implementation Stage
The phase beginning with a detailed project plan for a data space initiative, including milestones and resources for developing its governance structure and infrastructure within a pilot framework. This stage is marked by clear identification of the participants involved in the pilot and the value each contributes.
In-Database Analytics
In-Database Analytics refers to the process of performing advanced analytics, such as data mining, predictive modeling, and statistical analysis, directly within a database management system (DBMS). By leveraging the computational capabilities and parallel processing of the DBMS, it eliminates the need to move large datasets to external analytics tools, improving performance and reducing data movement latency.
Industry 4.0
The term "fourth industrial revolution" refers to the integration of information and communication technologies (ICT) into industrial production and related areas to create a connected environment.
Inernet Engineering Task Force
The IETF plays a crucial role in establishing voluntary standards that are frequently embraced by Internet users, network operators, and equipment vendors. Through this contribution, it actively influences the direction of Internet development. However, it is important to note that the IETF does not exercise control over the Internet, nor does it engage in any form of policing.
Information hub in the energy market
Regional platforms in the energy market act as information hubs and provide tariff incentives for energy supply, energy injection, energy transport, and aggregation services. This facilitates market access.
Information Model
The IDS data model encompasses all the known classes, entities, and attributes that are recognized by the IDS actors.
Information Network Berlin-Bonn
IVBB (Integrated Connection and Operations System) is the communication infrastructure that enables reliable and secure transmission of voice and data communication between the highest federal authorities and constitutional organs in Berlin and Bonn.
Information Network of the Federal Administration/Federal Administration Network (BVN)
The Information Network of the Federal Administration (IVBV) or the Federal Administrative Network (BNV) extends the IVBB system to connect federal authorities in different regions.