A sandbox is a self-contained testing environment that allows users to execute programs or access files without impacting the application, system, or platform in which they are operating. external-link

Scaling Stage

The development stage where a data space initiative consistently attracts new participants and integrates new use cases, demonstrating financial and operational sustainability, and the ability to adapt and expand over time in response to market changes. external-link

Schema on Read

Schema on read is a progressive approach to data analysis employed by modern data management tools such as Hadoop and advanced database technologies. In schema on read, data is associated with a structure or schema during retrieval from a stored location, rather than during its initial storage. This stands in contrast to the traditional approach of schema on write, where data is structured and organized before it is stored.,What%20Does%20Schema%20on%20Read%20Mean%3F,than%20as%20it%20goes%20in. external-link

Schema on Write

In traditional business intelligence systems based on relational databases, it is necessary to define queries in advance before data is even stored. This process is referred to by technicians as "schema on write." external-link


The Supply Chain Operation Reference (SCOR) is a comprehensive, cross-industry approach to establishing more efficient and effective information exchange within supply networks. SCORVoc is an OWL vocabulary that fully formalizes the latest SCOR standard and addresses any limitations identified in existing formalizations. external-link

Seamless Communication Platform

On the Service Control Platform (SCP), various standardized service stacks can be implemented. These services encompass different functions such as telephony, voice, desktop video and web conferencing, telepresence, instant messaging, or BYOD and mobility services. They can support a variety of front-end systems. external-link

Search & Discovery

The capability of data search and discovery empowers users to find, understand, and trust the information essential for making informed decisions based on data. It plays a critical role in fostering a data-driven culture. Irrespective of the existence of data governance or the proficiency of employees in data literacy, ensuring the availability of the required data remains crucial. external-link


Secrets are used to securely store confidential data such as passwords, OAuth tokens, and SSH keys in a Kubernetes cluster. By utilizing Secrets, you can exercise more control over how sensitive data is used and minimize the risk of accidental disclosure. By default, Secret values are encoded as base64 strings and stored unencrypted, but it's possible to configure Secrets to be encrypted when at rest. Pods can reference a Secret in various ways, including as an environment variable or a volume mount. It's worth noting that Secrets are intended for confidential data, while ConfigMaps are better suited for non-confidential data. external-link

Secure Digital Identity

Reliable and verifiable representation of an individual's personal information in a digital format. It enables individuals to securely access online services, conduct financial transactions, and protect their personal data. external-link

Secure electronic communication

In contrast to e-mail, De-Mail enables both the unequivocal identification of the communication partners and the verifiable sending and receiving of De-Mails. The contents of De-Mails cannot be read or changed during transmission via the Internet, as secure logon procedures, encrypted connections and transport routes between De-Mail providers ensure confidential communication. external-link

Secure Socket Layer

An outdated network protocol for secure data transmission that is no longer current. Since the introduction of SSL version 3.0, the protocol is referred to as TLS. external-link

Security by Design

Security by Design (SBD) is the approach that integrates security requirements into the development phase of a product for software and hardware, in order to prevent security gaps from emerging in the later stages. external-link

Security Context

The Security Context field allows you to set privilege and access control configurations for a container or Pod in Kubernetes. This field allows you to specify parameters such as the user and group that processes should run as well as the privilege settings. Additionally, you can implement security policies such as SELinux, AppArmor, or seccomp. It's worth noting that the securityContext setting defined within PodSpec applies to all containers within the Pod. external-link

Security in transit

Data in transit refers to any data that is currently being transmitted between components, devices, or systems. Using secure data exchange protocols, such as TLS (Transport Layer Security), helps ensure the confidentiality and integrity of the data while it is being transmitted.

Data Intelligence Hub

Security Profile

A specific collection of security properties for connectors is established that outlines various security aspects such as isolation level, attestation, and authentication. These properties express the minimum requirements that a Data Consumer must meet in order to access the exposed Data Endpoints. external-link


Selectors in Kubernetes enable users to filter a list of resources based on their labels. By applying selectors, it's possible to retrieve a subset of resources from a larger set of resources that match specific label criteria. Selectors are utilized when querying lists of resources to filter them based on their associated labels. external-link

Self Service Bi Self Service

In this context, self-service business intelligence refers to the ability of end users to independently create and implement their own analyses and reports using a set of approved tools and architecture provided and supported by the organization. external-link


A metadata record used by providers to detail themselves, their data product offerings, and the elements and services that make up their data products. external-link

Self-Description Graph

The Self-Description Graph receives data from Self-Descriptions that have been identified by the Catalogue and are presently in an active state within their lifecycle. external-link

Self-Description Schema

Within Gaia-X, a schema refers to a comprehensive set of class data that encompasses shapes, ontologies, and controlled vocabularies. Shapes establish the criteria for validation, whereas ontologies outline the terminology and connections between them, forming the foundation for constructing claims. Controlled vocabularies make up a significant portion of the vocabulary and are more expansive and straightforward than the more intricate ontology, consisting of extensive collections of standard references and country codes. external-link

Self-Description Taxonomy

The entities identified within Gaia-X are defined by the Self-Description Schema, which establishes an inheritance structure. Each entity inherits characteristics from a single entity in the Conceptual Model, resulting in an inheritance hierarchy known as the Self-Description Taxonomy. external-link

Self-Sovereign Identity (SSI)

Self-sovereign identity (SSI) enables individuals to locally manage and possess their digital identities and other verifiable digital credentials. The usage of a dominant cloud service provider is not mandatory, nor is the creation of a central Gaia-X Identity provider. This grants users complete autonomy from third parties, empowering them to determine which identity information to share with others. All identity data is kept securely in the user's SSI wallet, ensuring that it is exclusively accessible by the individual.predominant cloud service provider, nor is the establishment of a central Gaia-X Identity provider necessary. Users are thus completely independent of third parties and decide themselves which identity data they share with whom, as all identity data is securely stored only with the individual user in their SSI wallet. external-link

Semantic (described) Information

Semantically described data refers to information that possesses a specific significance within a particular context. It comprises both data and the relevant contextual details. external-link

Semantic Data

A data organization technique that represents the fundamental meaning of data elements and their interconnections. external-link

Semantic Data Model

The semantic data model is a method of structuring data that includes semantic information that adds a basic meaning to the data and the relationships that lie between them. external-link

Semantic Hub

Semantic models play a vital role in organizing data, providing a foundational understanding of data and its interconnections. In the context of data modeling and organization, semantic models facilitate the seamless development of applications and ensure data consistency. In the Catena-X framework, semantic data models are accessible through a well-suited publishing system called the Semantic Hub. For data and service providers, the Semantic Hub acts as a platform for leveraging and reusing semantic models. As a result, the publication of a semantic data model includes the specification of a version, enhancing transparency and enabling control over all semantic models and their release status. external-link

Semantic interoperability

The term refers to the ability to exchange data between organizations as part of seamless, integrated business processes. It uses an approach designed to avoid misunderstandings and erroneous interpretations in the use of terms, data structures, writing conventions, and so on. Semantic interoperability is crucial for efficient exchange of data within an organization as well as for efficient data integration with external cooperation partners. external-link

semi-structured data

Semi-structured data, also referred to as partially structured data, is a form of data that does not adhere to the rigid tabular structure commonly found in relational databases or other structured data tables. Instead, it incorporates tags and metadata to delineate semantic elements and establish hierarchies among records and fields. external-link

Sentiment Analysis

Sentiment analysis (also known as opinion mining) is a natural language processing (NLP) technique used to determine whether data is positive, negative, or neutral. Sentiment analysis is often performed on text-based data to help businesses monitor brand and product sentiments in customer feedback and gain a better understanding of customer needs. external-link

Serial, I2C, USB, CAN und Ethernet

Interfaces with serial communication enable data exchange between computers and peripheral devices or components. These interfaces are characterized by the transmission of data in bit sequences. However, different synchronization methods between the sender and receiver, as well as access procedures to the transmission medium, are used. Furthermore, these interfaces differ in their application area: CAN, for example, was developed for automotive applications, while Ethernet is used for LAN applications. external-link