Skip to content

Latest commit

 

History

History
60 lines (38 loc) · 6.64 KB

1_Gather-Knowledge.md

File metadata and controls

60 lines (38 loc) · 6.64 KB

1. Gather knowledge

The first step towards building a data space is to gather knowledge about IDS core ideas and concepts. This stage is all about expanding your understanding of IDS technologies and core concepts. It is important to leverage every source of information that can help you learn more about the IDS. Once you have a better understanding of IDS, you can start defining your use case and identifying the specific components needed for your solution.

▶️ If you are completely new to data spaces, we recommend starting from the basics, to sharpen your understanding of IDS technologies and core ideas. This will link you to every source that could be of help while learning about the IDS. If you are already familiar with the concept of data spaces, feel free to skip below to the more advanced and in-depth reading materials.

▶️ If you already have a data space implemented and want to learn more about what IDSA can offer, start from Step 4 of the five-step approach which involves preparing for go-live.

What are data spaces? How IDSA defines a data space?

A data space is a secure and standardized digital infrastructure that enables trusted data exchange and data-based services among various stakeholders. In the IDS definition, a data space is a virtual space that provides a standardized framework for data exchange, based on common protocols and formats, as well as secure and trusted data sharing mechanisms. The IDS data space is designed to support data sovereignty, meaning that data owners retain control over their data and can determine who can use it and under what conditions. This is called Data Sovereignty.

The IDS data space is intended to support a wide range of applications and industries. The data space is designed to be interoperable with other data spaces, enabling seamless data exchange across different domains and industries. Overall, the IDS data space is a flexible and scalable domain and technology-agnostic framework that enables secure and trusted data exchange and services, while preserving data sovereignty and privacy.

Data sharing in a data space

▶️IDS Reference Architecture Model (IDS RAM)

[The IDS RAM](https://docs.internationaldata spaces.org/ids-ram-4/) is the beating heart of the IDS. It includes the standards for secure and sovereign data exchange, certification, and governance. The RAM serves as the blueprint for trusted ecosystems for data exchange and processing.

Since the release of v4.0, the IDS RAM is available as a Gitbook page and also has a repository on IDS Github to raise issues and contribute to it.

▶️IDS Rulebook

The [IDSA rulebook](https://docs.internationaldata spaces.org/idsa-rulebook-v2/) serves several purposes regarding the development and operation of data spaces. The aim is to describe clearly which rules are mandatory and which are optional guidelines. This governance framework includes functional, technical, operational, and legal dimensions:

  • Guidelines for the functionality of common services are presented as well as the definition, processes, and services of specific roles.
  • Guidelines how to implement or use a technical artefact of the IDSA.
  • Guidelines for the work and collaboration within data services.
  • Guidelines for the legal basis in compliance with the regulatory environment to ensure trust and security. IDSA Rulebook also has a Github repository, where issues can be created.

Going beyond the basics: Exploring IDS concepts in depth

▶️IDS Glossary - The IDS Glossary is a collection of definitions for key terms related to the International Data Spaces (IDS). It serves as a reference for understanding the fundamental concepts and vocabulary used in the IDS ecosystem.

▶️IDS Standard (DIN SPEC 27070) – The DIN SPEC 27070 is a confidential document that specifies the technical requirements and the reference architecture of a Security Gateway for the exchange of industry data and services. Based on the principles of data sovereignty, the Security Gateway facilitates secure exchange of data and allows providing and using trustworthy data services. [Request access to the document here.](https://internationaldata spaces.org/din-spec-27070/)

▶️IDSA, GAIA-X, DSBA (Data Spaces Business Alliance), DSSC (Data Spaces Support Centre) - To learn about how these initiatives are relevant and complementary to IDSA, you can check:

Looking for more?

▶️ Trainings

Our partners offer hands-on trainings and seminars where you can learn about implementing IDS – and speed up your journey to sovereign data sharing. These trainings vary in depth, intensity, and focus - so you can find the right fit for your needs. Learn more about available trainings here

▶️ IDSA Hubs and Competence Centers

Get localized support and learning materials in your own language! The IDSA has inspired a strong network of international hubs and competence centers that share knowledge and information about IDS in countries around the world. These hubs and competence centers are all facilitated by not-for-profit organizations that understand the importance of sovereign data sharing for future data economies and global value chains. Learn more here

▶️ Position papers, white papers and studies on IDS

You can find a variety of Position Papers, White Papers, Studies and [Scientific Publications](https://internationaldata spaces.org/publications/scientific-publications/) on IDS via the IDSA website.