πŸ—„οΈBoundary Management

1. Introduction

Usually, many parties are involved in a logistic process. Each of these parties maintains a set of valuable assets that they needs to protect. In abstract terms, this protection is realized by creating an perimeter, a boundary around the assets that is controlled by the party. Other parties can not cross the boundary without permission of the owner, hence the value is protected. However it is often required that parties do cross the boundary to facilitate cooperation.

Three different kinds of assets and their associated boundaries are distinguished:

  • Digital assets, such as IT systems (applications, processes) and data

  • Physical assets, such as distribution centers and production facilities

  • Legal (ownership, liability and accountability) assets, such as responsibilities for and ownership of cargo

The nature and implementation of the protecting boundaries is different for each kind of assets and each one requires specific measures to allow third parties to cross them in order to cooperate in a logistic process.

There are two reasons to allow others (representatives as in human and IT-processes) to cross a boundary:

  • To allow them to use an asset

  • To transfer an asset between parties

Boundary Management is about managing boundaries in practice.

2. Interlinkages with other building blocks

Digital Identity M2M Digital Identity H2M Authorization Federation KIT

Last updated