Term |
BDI |
Adherence (BDI) |
A BDI Adhering Party adheres to the principles of the BDI.
|
Artifact |
BDI Artifacts are supporting documentation for the building blocks. These can be functional/non-functional specifications, process flows, sample documentation, etc.
|
Association |
Legal entity that serves as trust anchor for both federated trust/authentication and local onboarding.
|
BDI Association |
A BDI Association is the “root Association” for its Members
|
Association Administrator |
Functionary responsible for operating the services of a BDI Association reporting to its Members.
|
Association Articles
|
Legal terms and conditions a Member has to agree on when joining a specific Association. |
Association Register |
Register of onboarded Members, and Preferred Business Partners of a particular BDI Association instance.
|
Authentication |
Authentication involves validating the Digital Identity of an entity, person or Process
|
Authorization |
Authorization ensures that the authenticated entity, person or Process has been granted permission to gain access to the specific (data) resource requested.
|
Authorization Register
AR-DM Authorization Register Data Management |
Holds authorization policies for one or more Data Owners on access to data |
Basic Data Infrastructure (BDI)
|
The Basic Data Infrastructure (BDI) is a framework for controlled data sharing, supporting automated advanced information logistics within next-generation OSCM networks. Departing from traditional messaging paradigms, the BDI shifts towards event-driven information collection at the source, fostering efficient and secure communication through proven publish-and-subscribe architectures.
|
Basic Data Infrastructure Framework BDI Framework
|
The Basic Data Infrastructure (BDI) framework defines the creation of a perimeterless data grid supporting multiple concurrent ODS, enabling controlled system-to-system automation of processes initiated by event-based notifications. |
BDI Component |
BDI components are software that implement functionalities of the BDI building block. A distinction is made between BDI demo software and BDI reference software (see below)
|
BDI Authentication Processor
|
Standard software to make APIs BDI compliant Processing of part of protocol: client assertion to token.
|
BDI KIT |
Specify the capabilities of the BDI. It is a combination of building blocks required to perform a function of the BDI for a specific business situation. This includes core building blocks for Identity, Authentication and Authorization (IAA). On top of these core building blocks, additional capabilities can be added via kits, such as event capabilities. This could, for example, include the Pub/Sub building block, which can be added to work event-driven.
|
BDI Network |
The BDI network is the collection of participants and associations that are established, maintained and governed accordingly with the principles of the BDI Framework.
|
BDI principles |
BDI Principles are the core principles of the BDI that guide the further development of the framework. They form the basis for specifications of building blocks, artefacts, components and kits.
|
Business Partner Reputation model |
Register within BDI Association, holding the Reputation scores of Business Partners.
|
Business Partners |
Members of other BDI Associations than the root BDI Association.
|
Certified Roles |
|
Credentials |
|
Data Consumer Data User |
|
Data Exchange or sharing |
Controlled data exchange according to BDI principles in operational business networks
|
Data Governance Act |
|
Data holder |
|
Data Licenses |
|
Data Model |
The semantic model used to describe the data to be exchanged
|
Data Owner |
|
Data Protocol |
The protocol used to exchange the data
|
Data Service Provider |
A Data Service Provider that acts under supervision and on behalf of the Data Owner
|
Data Sharing Reference Architecture |
A tool-independent description of all that is needed for controlled data exchange using BDI principles in operational and supply chain networks for coordination, control and compliance..
|
Delegation |
|
Demo software |
BDI Demo Software is software to test and demonstrate concepts or processes within the DIL program and to external parties. These components are not made for production.
|
Discovery |
Means to identify specific endpoints of a given party.
|
Edge Agreements |
Standards on interacting with entities and/or persons that have IT-systems that are less mature or not BDI-compliant.
|
Event |
|
Event Pub/Sub Service |
|
Federation of Associations |
A series of collaborating BDI associations
|
Governance |
The BDI Framework recognizes three interacting voluntary governance structures: Data exchange space governance, BDI Association (local trust and onboarding anchor) governance and BDI Framework governance.
|
Identification |
|
Identity Broker (role)
|
|
Identity Provider (role)
|
|
Levels of Assurance (LoA) |
|
Logistic Roles |
Legal entity which is Member of its instance:
|
Member |
Legal entity as member of a root BDI Association
|
Notifications |
The purpose of publishing a pulse to a subscriber
|
Onboarding |
Becoming part of a BDI association and accepting the relevant terms and conditions
|
Ontology |
A semantic description of a standard with focus on making the meaning of the used concepts broadly accessible and understandable
|
Operations and Supply Chain Data Spaces |
Operations and Supply Chain Data Spaces (ODS) are logical constructs — networks of parties, both businesses and authorities, created to generate value from the production and distribution of goods and services. Parties may participate in multiple ODS concurrently, with participation frequency and duration varying based on business characteristics.
|
Operations and Supply Chain Management |
Operations and Supply Chain Management (OSCM) represents the science and expertise of value creation in the production and distribution networks of goods and services.
|
Outsider |
Member of a different BDI Association than the root. Note: this a relative perspective, from the position of a Member of a given instance (BDI Association). Members of your instance are “insiders”, anybody else is an Outsider and vice versa.
|
Payload |
The content of a message, could be Events, Data sets, streaming sensor data or any other type of data
|
Perimeter-less trust |
In a perimeterless trust system there is no fixed common perimeter with a binary status (onboarded and trusted or unknown and not trusted): perimeters are custom made by each entity or group of entities. Trust is in principle assessed by each data owner for each entity that desires to exchange data. A data owner has trust sovereignty. In practice the drive for efficiency will lead to groups that create their own trust perimeter: however that perimeter does not hinder them in data exchanges with outsiders.
|
Policies |
|
Policy Agreements |
A basis set of policies which are agreed to when onboarding into an association
|
Preferred Business Partners |
Outsiders who have agreed to specific terms and conditions of the local BDI Association that maintains its own Business Partner Reputation Model
|
Professional Qualifications Register |
Holds proof of the professional qualifications (verifiable credentials of for instance licenses) of natural persons related to them acting as a representative of a legal entity
|
Provenance Traceability |
Provenance is the chronology of the ownership of a data element allowing to trace back data to its original owner or creator
|
Publisher Data Service Provider |
|
Pulse Trigger |
|
Reference software |
BDI Reference Software is third-party software that is referenced for certain components.
|
Representation |
When employees or contractors act on behalf of an organisation, the organisation mandates them up to a set limit. The organisation is accountable for their actions and is liable if they act outside the set limits.
|
Representation Register Mandate register |
|
Role-based Authorization |
Access granted to data and services based on the Logistic Role a member or its representation has.
|
Roles (BDI) (Certified Roles: iSHARE) |
Roles in the framework, such as Data Consumer, Data Service Provider, Data Owner. (No certification of Roles.)
|
Root Association |
The principle association a member is part of.
|
Stack |
An architecture reference model. The stack builds up on both the management and technical level, offering a versatile architecture adaptable to the unique network requirements it serves.
|
Subscriber |
|
Topic |
|
Trust |
Trust is the design and implementation of measures that evaluate the chain of trust per presented credential by any party; the decision to accept a certain level of trust is dependent on the risk of making a mistake.
|
Verifiable Credentials Digital Identity |
Verifiable Credentials are digital credentials. They can represent information found in physical credentials, such as a passport or licence, as well as new things that have no physical equivalent, such as ownership of a bank account.
|
Visitor |
Outsider with a better reputation score than a set minimum
|
Zero-trust check |
When identity, authentication, trust and authorization is checked with every data exchange.
|