BDI Terms

chevron-rightAdherencehashtag

A BDI Adhering Party adheres to the principles of the BDI.

chevron-rightAssociationhashtag

Legal entity that serves as trust anchor for both federated trust/authentication and local onboarding.

chevron-rightBDI Associationhashtag

A BDI Association is the “root Association” for its Members

chevron-rightAssociation Administrator, Association Authorityhashtag

Functionary responsible for operating the services of a BDI Association reporting to its Members.

chevron-rightAssociation Articles (BDI agreement system, Association T&C’s)hashtag

Legal terms and conditions a Member has to agree on when joining a specific Association.

chevron-rightAssociation Register (Branch Register)hashtag

Register of onboarded Members, and Preferred Business Partners of a particular BDI Association instance.

chevron-rightAuthenticationhashtag

Authentication involves validating the Digital Identity of an entity, person or Process

chevron-rightAuthorizationhashtag

Authorization ensures that the authenticated entity, person or Process has been granted permission to gain access to the specific (data) resource requested.

chevron-rightAuthorization Register Data Management (AR-DM)hashtag

Holds authorization policies for one or more Data Owners on access to data

chevron-rightBasic Data Infrastructurehashtag

The Basic Data Infrastructure (BDI) is a framework for controlled data sharing, supporting automated advanced information logistics within next-generation OSCM networks. Departing from traditional messaging paradigms, the BDI shifts towards event-driven information collection at the source, fostering efficient and secure communication through proven publish-and-subscribe architectures.

chevron-rightBDI Frameworkhashtag

The Basic Data Infrastructure (BDI) framework defines the creation of a perimeterless data grid supporting multiple concurrent ODS, enabling controlled system-to-system automation of processes initiated by event-based notifications.

chevron-rightBDI Authentication Processorhashtag

Standard software to make APIs BDI compliant

Processing of part of protocol: client assertion to token.

chevron-rightBDI Networkhashtag

The BDI network is the collection of participants and associations that are established, maintained and governed accordingly with the principles of the BDI Framework.

chevron-rightBusiness Partner Reputation Modelhashtag

Register within BDI Association, holding the Reputation scores of Business Partners.

chevron-rightBusiness Partnershashtag

Member of a different BDI Association than the root. Note: this a relative perspective, from the position of a Member of a given instance (BDI Association).

chevron-rightCertified Roleshashtag

Roles for which certification is required. Facilitate certain functions for BDI that every member within the Association must be able to rely upon.

chevron-rightCredentialshashtag

In the context of information security, credentials are used to control access of someone or something to something, for example to services, data or other functionalities. The right credentials validate (i.e. Authentication) the identity claimed during Identification.

The best-known example of credentials is a password, but other forms include electronic keycards, biometrics and, for machines, public key certificates.

chevron-rightData Consumer, Data Userhashtag
  • Requests access to data and/or Representation Register and/or Professional Qualification Register of the Data Owner

  • Controls discovery and endpoints

  • Requests subscription to Event Pub/Sub Service of the Data Owner, receives and evaluates events.

chevron-rightData Custodianhashtag

Similar to DCCS's Data Providerarrow-up-right. A data custodian...

  • Regulates the data access

  • Provides the data to recipients that should have access

Optionally, the data custodian is a Data Service Provider.

chevron-rightData Exchange, Data Sharinghashtag

Controlled data exchange according to BDI principles in operational business networks

chevron-rightData Licenseshashtag

Descriptions of terms and conditions of using data

Either in free form text, of in ODRL

chevron-rightData Modelhashtag

The semantic model used to describe the data to be exchanged

chevron-rightData Ownerhashtag

The data Owner is a legal entity who:

  • Has control over data and access to data

  • Controls decisions on Data Sovereignty and Trust Sovereignty

  • Controls authorization policies, representation rules, professional qualification verification of staff and contractors

  • Controls subscription to the Event Pub/Sub Service, and publishing of events to subscribers

  • Controls discovery and endpoints

  • Controls roles assumed by entity

chevron-rightData Protocolhashtag

The protocol used to exchange the data

chevron-rightData Service Providerhashtag

A Data Service Provider that acts under supervision and on behalf of the Data Owner

chevron-rightData Sharing Reference Architecturehashtag

A tool-independent description of all that is needed for controlled data exchange using BDI principles in operational and supply chain networks for coordination, control and compliance..

chevron-rightData Sovereigntyhashtag

chevron-rightDelegationhashtag

Delegation is the act of empowering someone or something to act for another or to represent others.

chevron-rightDiscoveryhashtag

Means to identify specific endpoints of a given party.

chevron-rightEdge Agreementshashtag

Standards on interacting with entities and/or persons that have IT-systems that are less mature or not BDI-compliant.

· Processes, technology, terms and conditions, liabilities

chevron-rightEventhashtag

· Structured data set, describing an action in physical world, or an administrative milestone

· Multiple statuses are possible: e.g. planned, in transit, historic

chevron-rightEvent Pub/Sub Servicehashtag

· Accepts subscription to Event Pub/Sub Service managed by or on behalf of the Data Owner

· Sends pulses that the Data Owner sends to topics to subscribers of topics

· Manages a list of topics as identified by the Data Owner as channels for pulses.

chevron-rightFederation of Associationshashtag

A series of collaborating BDI associations

chevron-rightGovernancehashtag

The BDI Framework recognizes three interacting voluntary governance structures: Data exchange space governance, BDI Association (local trust and onboarding anchor) governance and BDI Framework governance.

chevron-rightIdentificationhashtag

Identification is the process of someone or something claiming an identity by presenting characteristics called identity attributes. Such attributes include a name, user name, e-mail address, etc. The claimed identity can be validated (i.e. Authentication) with the right credentials.

chevron-rightIdentity Brokerhashtag

In order to support multiple Identity Providers (with possible multiple rules) and Data Service Providers, an Identity Broker is required. An Identity Broker allows Data Consumer to select the Identity Provider they prefer to authenticate themselves at. It prevents the need for a direct relationship between all Data Service Providers and all Identity Providers.

chevron-rightIdentity Providerhashtag

The Identity Provider:

  • Provides identifiers for Data Consumer;

  • Issues credentials to Data Consumers;

Identifies and authenticates Data Consumers based on provided credentials.

chevron-rightMemberhashtag

Legal entity as member of a root BDI Association

chevron-rightOnboardinghashtag

Becoming part of a BDI association and accepting the relevant terms and conditions

chevron-rightOntologyhashtag

A semantic description of a standard with focus on making the meaning of the used concepts broadly accessible and understandable

chevron-rightOperational Data Storehashtag

An Operational Data Store (ODS) is designed to integrate data integrate from multiple sources for additional operations on the data, for reporting, controls and operational decision support.

In the BDI the ODS is intended to hold Logistics Event information, representing state, access (delegations) to source data for reliant parties etc. during the live transaction and distribute the relevant parts of this truth to the operationally involved or further eligible parties.

It enables controlled system-to-system automation of processes triggered by event-based notifications.

chevron-rightOperations and Supply Chain Data Spaceshashtag

Operations and Supply Chain Data Spaces (ODS) are logical constructs — networks of parties, both businesses and authorities, created to generate value from the production and distribution of goods and services. Parties may participate in multiple ODS concurrently, with participation frequency and duration varying based on business characteristics.

chevron-rightOperations and Supply Chain Managementhashtag

Operations and Supply Chain Management (OSCM) represents the science and expertise of value creation in the production and distribution networks of goods and services.

chevron-rightOutsiderhashtag

Anyone who is not a Member of a BDI Association.

chevron-rightPayloadhashtag

The content of a message, could be Events, Data sets, streaming sensor data or any other type of data

chevron-rightPolicieshashtag

· Definitions of access policies to data elements

· In operational data spaces, policies relate to role, (authenticated) organisation, and order-dependent authorization of access to data elements.

chevron-rightPolicy Agreementshashtag

A basis set of policies which are agreed to when onboarding into an association

chevron-rightPreferred Business Partnershashtag

Business Partners who have agreed to specific terms and conditions of the local BDI Association that maintains its own Business Partner Reputation Model

chevron-rightProfessional Qualifications Registerhashtag

Holds proof of the professional qualifications (verifiable credentials of for instance licenses) of natural persons related to them acting as a representative of a legal entity

chevron-rightProvenance Traceabilityhashtag

Provenance is the chronology of the ownership of a data element allowing to trace back data to its original owner or creator

chevron-rightPublisherhashtag

· Publishes Pulses with Payload within a Topic

· Distributes Pulses To Subscribers to a Topic

· Any party can be a Publisher (unlimited number of publishers)

chevron-rightPulse (Trigger)hashtag

· Datagram, distributed to Subscriber to a Topic

· A signal from the data Owner that there is data ready for the consumer to come and access

chevron-rightRepresentationhashtag

· When employees or contractors act on behalf of an organisation, the organisation mandates them up to a set limit. The organisation is accountable for their actions and is liable if they act outside the set limits.

chevron-rightRepresentation Register (Mandate register)hashtag

· Holds proof of the mandate of natural persons acting as a representative of a specific legal entity

· Holds proof of the mandate of organisations acting as a representative of a specific legal entity

chevron-rightRole-based Authorizationhashtag

Access granted to data and services based on the Logistic Role a member or its representation has.

chevron-rightRoot Associationhashtag

The association to which a BDI participant belongs.

chevron-rightStackhashtag

An architecture reference model. The stack builds up on both the management and technical level, offering a versatile architecture adaptable to the unique network requirements it serves.

chevron-rightSubscriberhashtag

· Subscribes to one of more Topics of a Publisher

· Has no knowledge of other Subscribers to a Topic (isolated)

· Receives Pulses distributed by a Publisher

· Any party can be a Publisher (unlimited number of Publishers)

chevron-rightTopichashtag

· Subject or channel a Subscriber subscribes to, to receive Topis related events

· Defined by Publisher

· Used to limit amount of Pulses with non-information for Subscriber

chevron-rightTrusthashtag

Trust is the design and implementation of measures that evaluate the chain of trust per presented credential by any party; the decision to accept a certain level of trust is dependent on the risk of making a mistake.

chevron-rightVerifiable Credentials (Digital Identity)hashtag

Verifiable Credentials are digital credentials. They can represent information found in physical credentials, such as a passport or licence, as well as new things that have no physical equivalent, such as ownership of a bank account.

chevron-rightVisitorhashtag

Outsider with a better reputation score than a set minimum

chevron-rightZero-trust checkhashtag

When identity, authentication, trust and authorization is checked with every data exchange.

Last updated