language en

Industry 4.0 Knowledge Graph Ontology

Release 2019-12-04

This version:
https://w3id.org/i40/sto
Latest version:
https://w3id.org/i40/sto
Revision:
0.8
Authors:
Steffen Lohmann, Fraunhofer IAIS
Irlan Grangel Gonzalez, Fraunhofer IAIS
Paul Baptista
Sebastian Bader, Fraunhofer IAIS
Publisher:
Fraunhofer-Gesellschaft, FhG
Download serialization:
JSON-LD RDF/XML N-Triples TTL
License:
http://creativecommons.org/licenses/by-nc-sa/3.0/
Provenance of this page

Abstract

The Industry 4.0 Knowledge Graph, I40KG or previously Standards Ontology (STO), represents standards, standardization organizations and standardization frameworks for the Industry 4.0 area.

Introduction back to ToC

This documentation presents STO, an ontology to describe standards, organizations for publishing standards as well as standardization frameworks in the context of Industry 4.0.

Namespace declarations

Table 1: Namespaces used in the document
cc <http://creativecommons.org/ns#>
dbo <http://dbpedia.org/ontology/>
dbr <http://dbpedia.org/resource/>
dc <http://purl.org/dc/elements/1.1/>
dcterms <http://purl.org/dc/terms/>
deo <http://purl.org/spar/deo/>
doap <http://usefulinc.com/ns/doap#>
dul <http://www.ontologydesignpatterns.org/ont/dul/DUL.owl#>
foaf <http://xmlns.com/foaf/0.1/>
geo <http://www.geonames.org/ontology#>
lang <http://lexvo.org/id/iso639-3/>
muto <http://purl.org/muto/core#>
oa <https://www.w3.org/ns/oa>
obda <https://w3id.org/obda/vocabulary#>
om2 <http://www.ontology-of-units-of-measure.org/resource/om-2/>
owl <http://www.w3.org/2002/07/owl#>
prov <http://www.w3.org/ns/prov#>
rami <https://w3id.org/i40/rami#>
rdf <http://www.w3.org/1999/02/22-rdf-syntax-ns#>
rdfs <http://www.w3.org/2000/01/rdf-schema#>
schema <http://schema.org/>
skos <http://www.w3.org/2004/02/skos/core#>
sto <https://w3id.org/i40/sto#>
sto_iot <https://w3id.org/i40/sto/iot#>
vann <http://purl.org/vocab/vann/>
voaf <http://purl.org/vocommons/voaf#>
voag <http://voag.linkedmodel.org/voag#>
xml <http://www.w3.org/XML/1998/namespace>
xsd <http://www.w3.org/2001/XMLSchema#>

Industry 4.0 Knowledge Graph: Overview back to ToC

This ontology has the following classes and properties.

Classes

Object Properties

Data Properties

Named Individuals

Industry 4.0 Knowledge Graph: Description back to ToC

Classes and properties from existing ontologies are reused, e.g., PROV for describing provenance of entities, and FOAF for representing and linking documents. DCTERMS for document metadata, such as licenses and titles as well as the RAMI4.0 ontology for linking Standards with RAMI4.0 concepts.

Cross reference for Industry 4.0 Knowledge Graph classes, properties and dataproperties back to ToC

This section provides details for each class and property defined by Industry 4.0 Knowledge Graph.

Classes

Admin Shell Sub Modelc back to ToC or Class ToC

IRI: https://w3id.org/i40/rami#AdminShellSubmodel

Describes the Administration Shell concept to organize/classify standards into submodels
Is defined by
https://www.plattform-i40.de/I40/Redaktion/EN/Downloads/Publikation/structure-of-the-administration-shell.pdf?__blob=publicationFile&v=7
has super-classes
Standard Classification c
has members
Energy Efficiency ni, communication ni

Alliance of Industrial Internet Architecture Classificationc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#AiiClassification

has super-classes
Standard Classification c
has members
AII Data Classification ni, AII Network Classification ni, AII Security Classification ni

Architecture Descriptionc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#ArchitectureDescription

A Reference Architecture describes the structure of a system with its element types and their structures, as well as their interaction types, among each other and with their environment. Describing this, a Reference Architecture defines restrictions for an instantiation (concrete architecture). Through abstraction from individual details, a Reference Architecture is universally valid within a specific domain. Further architectures with the same functional requirements can be constructed based on the reference architecture. Along with reference architectures comes a recommendation, based on experiences from existing developments as well as from a wide acceptance and recognition by its users or per definition. [ISO/IEC42010] Note: It is important to distinguish the Reference Architecture from a Reference Architecture Description. While the first refers to a mental model or shared concept, the second is potentially only one of several different documents describing this model.
has super-classes
Standarization Framework c
has members
AII Industrial Internet Architecture ni, DMA Architecture ni, Data Transfer Project Architecture ni, Edgecross Architecture ni, FIWARE Architecture ni, IDS RAM ni, Industrial Internet Reference Architecture ni, Industrial Value Chain Reference Architecture ni, IoT-A Reference Architecture ni, OpenFog Reference Architecture ni, x-Tee ni

Business Cycle SCMc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#BusinessCycleSCM

Suply Chain Management Business Cycle.
Is defined by
http://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8107.pdf
has super-classes
Standard Classification c

Connectivity Layerc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#ConnectivityLayer

Connectivity Layer of the Internet Connectivity Framework
Is defined by
https://www.iiconsortium.org/pdf/IIC_PUB_G5_V1.01_PB_20180228.pdf
has super-classes
Standard Classification c

Connectivity Layerc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#IicfConnectivityLayer

has super-classes
Standard Classification c
has members
IICF Framework Layer ni, IICF Link Layer ni, IICF Network Layer ni, IICF Physical Layer ni, IICF Transport Layer ni
is also defined as
named individual

Data Sharing Initiativec back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#DataSharingInitiative

has super-classes
organization c
has members
DMA ni, Data Transfer Project ni, x-road ni
is also defined as
named individual

Domainc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#Domain

Represents the Domains in which the Standards can be used
is in domain of
has Domain Name dp
is in range of
has domain op

Edgecross Layerc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#EdgecrossLayer

has super-classes
Standard Classification c
has members
Edgecross Edgecomputing Layer ni, Edgecross FA ni, Edgecross IT Systems Layer ni

Fiware Chapterc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#FiwareChapter

has super-classes
Standard Classification c
has members
FIWARE Advanced Web-based User Interface ni, FIWARE Applications Services and Data Delivery ni, FIWARE Cloud Hosting ni, FIWARE Data/Context Management ni, FIWARE Interface to Networks and Devices ni, FIWARE IoT Services Enablement ni, FIWARE Security ni
is also defined as
named individual

i io t consortiumc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#IIoTConsortium

has super-classes
organization c
has members
AllSeen Alliance ni, Alliance Industrie du Futur ni, Alliance of Industrial Internet ni, Arrowhead Framework ni, Edgecross Consortium ni, IDSA ni, IIC ni, IPSO ni, IVI ni, IoT-A ni, Open Mobile Alliance ni, OpenFog Consortium ni, Platform Industry 4.0 ni

IDS RAM Layerc back to ToC or Class ToC

IRI: https://w3id.org/ids/ram/Layer

is equivalent to
{ business layer , functional layer , information layer , process layer , system layer }
has super-classes
Standard Classification c

IDS RAM Perspectivec back to ToC or Class ToC

IRI: http://w3id.org/ids/ram/Perspective

is equivalent to
{ certification , governance , security }
has super-classes
Standard Classification c

IDS RAM Perspectivec back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#IdsPerspective

is equivalent to
{ IDS RAM Certification Perspective , IDS RAM Governance Perspective , IDS RAM Security Perspective }
has super-classes
Standard Classification c
has members
IDS RAM Certification Perspective ni, IDS RAM Governance Perspective ni, IDS RAM Security Perspective ni
is also defined as
named individual

IIRA Crosscutting Functionc back to ToC or Class ToC

IRI: http://example.org/iira#CrosscuttingFunction

Often these enabling functions, the so-called crosscutting functions, need to be made available across many of the system functional components. For Reference Architecture 6: Functional Viewpoint example, system functions need to be connected so they can interact with each other to complete functionality at the system level.
has super-classes
Standard Classification c

IIRA Crosscutting Functionc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#IIRACrosscuttingFunction

has super-classes
Standard Classification c
has members
IIRA Connectivity ni, IIRA Distributed Data Management ni, IIRA Intelligent and Resilient Control ni, i i r a industrial analytics ni
is also defined as
named individual

IIRA Functional Domainc back to ToC or Class ToC

IRI: http://example.org/iira#FunctionalDomain

has super-classes
Standard Classification c

IIRA Functional Domainc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#IIRAFunctionalDomain

has super-classes
Standard Classification c
has members
IIRA Application Domain ni, IIRA Business Domain ni, IIRA Control Domain ni, IIRA Information Domain ni, IIRA Operation Domain ni
is also defined as
named individual

IIRA System Characteristicc back to ToC or Class ToC

IRI: http://example.org/iira#SystemCharacteristics

has super-classes
Standard Classification c

IIRA System Characteristicc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#IIRASystemCharacteristics

has super-classes
Standard Classification c
has members
IIRA Privacy ni, IIRA Reliability ni, IIRA Resilience ni, IIRA Safety ni, IIRA Scalability ni, IIRA Security ni
is also defined as
named individual

IoT-A Perspectivec back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#IotaPerspective

has super-classes
Standard Classification c
has members
IoT-A Availability and Resilience ni, IoT-A Evolution and Interoperability ni, IoT-A Performance and Scalability ni, IoT-A Trust Security and Privacy ni
is also defined as
named individual

ISA 95 Levelc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#ISA95Level

Describes the ISA95 levels to classify the industry Standards according to those levels. Eg., Device, SCADA, etc. It has strong relation to the RAMI Hierarchy levels
has super-classes
Standard Classification c
is in domain of
has Objective dp, has Task dp

IVI Layerc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#IviLayer

A IVI Layer describes one of three layers of smart manufactoring as proposed by the Industrial Value Chain Initiative (IVI).
Is defined by
https://iv-i.org/wp/wp-content/uploads/2018/04/IVRA-Next_en.pdf
has super-classes
Standard Classification c
has members
IVI Activity Layer ni, IVI Business Layer ni, IVI Specification Layer ni

Layerc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#Layer

Describes the layers of the standardization frameworks. In some cases, the layers are connected to dimensions of the frameworks.

Layerc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#Stakeholder

Describes the layers of the standardization frameworks. In some cases, the layers are connected to dimensions of the frameworks.
has super-classes
person c
has members
Decision maker ni, Product Manager ni, System Engineer ni

License Documentc back to ToC or Class ToC

IRI: http://purl.org/dc/terms/LicenseDocument

A legal document giving official permission to do something with a Resource.
Is defined by
http://purl.org/dc/terms/

NGSI Context Information Management APIc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#NGSI_Context_Information_Management_API

has super-classes
Standard Classification c
has members
NGSI-LD API Operation ni, NGSI-LD Architecture ni, NGSI-LD Data Representation ni, NGSI-LD Information Model ni

OCF Framework Blockc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#OcfBlock

has super-classes
Standard Classification c
has members
OCF Core Framework ni, OCF Data Models ni, OCF L2 Connectivity ni, OCF Networking ni, OCF Security ni

Product Development Life Cyclec back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#ProductDevelopmentLifeCycle

PLM is the process of managing the entire lifecycle of a product from inception, through engineering design and manufacture, to service and disposal of manufactured products. Related areas are PLMManagement, Modeling Practice, Product Model Data exchange, Manufacturing Model Data, Product Catalog Data.
Is defined by
https://w3id.org/i40/sto
has super-classes
Standard Classification c

Production System Life Cyclec back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#ProductionSystemLifeCycle

Collections of machines, equipment, and auxiliary systems organized to create goods and services from various resources.
Is defined by
http://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8107.pdf
has super-classes
Standard Classification c

RAMI Hierarchy Levelc back to ToC or Class ToC

IRI: https://w3id.org/i40/rami#RAMIHierarchyLevel

is equivalent to
{ connected world , control device , enterprise , field device , product , station , work center }
has super-classes
Standard Classification c
has members
r a m i connected world ni, r a m i field device ni, r a m i product ni

RAMI IT Layerc back to ToC or Class ToC

IRI: https://w3id.org/i40/rami#RAMIITLayer

is equivalent to
{ asset , business , communication , functional , information , integration }
has super-classes
Standard Classification c
has members
RAMI Asset Layer ni, RAMI Business Layer ni, RAMI Communication Layer ni, RAMI Functional Layer ni, RAMI Information Layer ni, RAMI Integration Layer ni

RAMI Life Cycle Layerc back to ToC or Class ToC

RAMI Life Cycle Layerc back to ToC or Class ToC

IRI: https://w3id.org/i40/rami#RAMILifeCycleLayer

It describes the different Life Cycle and Value Stream layers for the RAMI model according to the IEC 62890 Standard.
has super-classes
Standard Classification c

Standard Classificationc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#StandardClassification

Describes categorization areas that the different Standardizations Initiatives use to category Standards.
has sub-classes
Admin Shell Sub Model c, Alliance of Industrial Internet Architecture Classification c, BDVA Concern c, Business Cycle SCM c, Connectivity Layer c, Connectivity Layer c, Edgecross Layer c, Fiware Chapter c, IDS RAM Layer c, IDS RAM Layer c, IDS RAM Perspective c, IDS RAM Perspective c, IIRA Crosscutting Function c, IIRA Crosscutting Function c, IIRA Functional Domain c, IIRA Functional Domain c, IIRA System Characteristic c, IIRA System Characteristic c, ISA 95 Level c, IVI Layer c, IoT-A Perspective c, NGSI Context Information Management API c, OCF Framework Block c, Product Development Life Cycle c, Production System Life Cycle c, RAMI Hierarchy Level c, RAMI IT Layer c, RAMI Life Cycle Layer RAMI Life Cycle Layer c, Viewpoint c, x-road Section c
is in domain of
alignes With op, alignes With op, frames op, is Described in op
is in range of
alignes With op, alignes With op, has Classification op
has members
Administration Shell ni, Administration Shell Header ni, BDVA Cloud and High Performance Computing ni, BDVA Communication and Connectivity ni, BDVA Cybersecurity and Trust ni, BDVA Data Analytics ni, BDVA Data Management ni, BDVA Data Processing Architectures ni, BDVA Data Protection ni, BDVA Data Sharing Platforms ni, BDVA Engineering and DevOps ni, BDVA IoT CPS and Edge Computing ni, BDVA Standards ni, DTP Deployment ni, DTP Ecosystem ni, DTP Security & Privacy ni, DTP System ni, Data Sovereignty ni, Data Visualisation and User Interaction ni, Edgecross Edgecomputing Layer ni, Edgecross FA ni, Edgecross IT Systems Layer ni, Energy Efficiency ni, FIWARE Advanced Web-based User Interface ni, FIWARE Applications Services and Data Delivery ni, FIWARE Cloud Hosting ni, FIWARE Data/Context Management ni, FIWARE Interface to Networks and Devices ni, FIWARE IoT Services Enablement ni, FIWARE Security ni, IDS Data Market ni, IDS Interoperability ni, IDS RAM Business Layer ni, IDS RAM Certification Perspective ni, IDS RAM Functional Layer ni, IDS RAM Governance Perspective ni, IDS RAM Information Layer ni, IDS RAM Process Layer ni, IDS RAM Security Perspective ni, IDS RAM System Layer ni, IIC Security Framework ni, IIC Vocabulary ni, IICF Framework Layer ni, IICF Link Layer ni, IICF Network Layer ni, IICF Physical Layer ni, IICF Transport Layer ni, IIRA Application Domain ni, IIRA Business Domain ni, IIRA Business Viewpoint ni, IIRA Connectivity ni, IIRA Control Domain ni, IIRA Distributed Data Management ni, IIRA Functional Viewpoint ni, IIRA Implementation Viewpoint ni, IIRA Information Domain ni, IIRA Intelligent and Resilient Control ni, IIRA Operation Domain ni, IIRA Physical Systems ni, IIRA Privacy ni, IIRA Reliability ni, IIRA Resilience ni, IIRA Safety ni, IIRA Scalability ni, IIRA Security ni, IIRA Usage Viewpoint ni, IVI Activity Layer ni, IVI Activity View ni, IVI Asset View ni, IVI Business Layer ni, IVI Management View ni, IVI Specification Layer ni, Identification ni, IoT-A Availability and Resilience ni, IoT-A Deployment and Operation ni, IoT-A Evolution and Interoperability ni, IoT-A Functional Viewpoint ni, IoT-A Information Viewpoint ni, IoT-A Performance and Scalability ni, IoT-A Trust Security and Privacy ni, NGSI-LD API Operation ni, NGSI-LD Architecture ni, NGSI-LD Data Representation ni, NGSI-LD Information Model ni, Ocean Protocol Business Viewpoint ni, Ocean Protocol Marketplace Viewpoint ni, Ocean Protocol System Viewpoint ni, OpenFog Agility Pillar ni, OpenFog AutonomyPillar ni, OpenFog Data Analytics and Control Perspective ni, OpenFog Hierarchy Pillar ni, OpenFog IT Business and Cross-fog Applications Perspective ni, OpenFog Manageability Perspective ni, OpenFog Opennes Pillar ni, OpenFog Programmability Pillar ni, OpenFog RAS Pillar ni, OpenFog Scalability Pillar ni, OpenFog Security Perspective ni, OpenFog Security Pillar ni, Performance and Scale Perspective ni, RAMI Asset Layer ni, RAMI Business Layer ni, RAMI Communication Layer ni, RAMI Functional Layer ni, RAMI Information Layer ni, RAMI Integration Layer ni, communication ni, i i r a industrial analytics ni, r a m i field device ni, r a m i product ni, x-road Deplyoment View ni, x-road Protocols and Interfaces ni, x-road System Components ni, x-road Technology Matrix ni

StandardOrganizationc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#StandardOrganization

Define the standards organizations that develop and publish industry standards
has super-classes
organization c
is in domain of
Org Name dp, belongs To op, has Formation Date dp, has Headquater In op
is in range of
has Developer op, has Publisher op
has members
DMA ni, Edgecross Consortium ni, IIC ni, Ocean Protocol Foundation ni, Open Connectivity Foundation ni

StandardPartc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#StandardPart

Typically Standards are divided into parts. E.g., ISA 95 has part Part 1: Models and Terminology, Part 2: Object Model Attributes, etc.
has super-classes
Publication
is in domain of
std Part Name dp

Technical Reportc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#TechnicalReport

has super-classes
Publication
has members
Introduction of X-tee ni, i e c 61804 p6 ni

Technical Specificationc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#TechnicalSpecification

has super-classes
Publication
has members
6LoWPAN ni, AMQP ni, Aeron ni, Alljoyn ni, Blockchain ni, Bluetooth ni, CoAP ni, IPSO App Framework ni, IPv6 ni, IoTivity ni, JMS ni, LDAP ni, Lightweight M2M v1.0 ni, NGSI ni, ORION Context Broker ni, Ocean Protocol ni, OpenAPI ni, Physical Web ni, RAML ni, REST ni, ROLL ni, RPMA ni, Reactive Streams ni, SCIM ni, i d4me ni, key rock ni, low power wi fi ni, r d f ni, x a c m l ni

Technologyc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#Technology

A Technology is an implementation of one or many standards in order to achieve a goal.
has members
IDS Trusted Connector ni, Trusted Connector ni

x-road Sectionc back to ToC or Class ToC

IRI: https://w3id.org/i40/sto#xRoadSection

has super-classes
Standard Classification c
has members
x-road Deplyoment View ni, x-road Protocols and Interfaces ni, x-road System Components ni, x-road Technology Matrix ni

Object Properties

alignes Withop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto#alignesWith

indicates that some Standard Classification entity has a similar scope as another. This property most probably is symmetric but not transitive.

has characteristics: symmetric

has super-properties
associated with op
has domain
Standard Classification c
has range
Standard Classification c

alignes Withop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto/iot#alignsWith

indicates that some Standard Classification entity has a similar scope as another. This property most probably is symmetric but not transitive.

has characteristics: symmetric

has super-properties
associated with op
has domain
Standard Classification c
has range
Standard Classification c
is inverse of
alignes With op, alignes With op

belongs Toop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto#belongsTo

A Standard Organization that belongs to the country
has domain
StandardOrganization c
has range
country c

framesop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto#frames

A relation specifying that a vewpoint regards a Concern.
has super-properties
associated with op
has domain
Viewpoint c
has range
Concern c

framesop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto/iot#frames

A relation specifying that a vewpoint regards a Concern.
has super-properties
associated with op
has domain
Standard Classification c
has range
Concern c

has Available Languageop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto#hasAvailableLanguage

Languages in which the document of the Standard is available, e.g., English, French, Spanish
has super-properties
language op
has domain
document c
has range
linguistic system c

has Classificationop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto#hasClassification

An Standard is isCategorizedBy a given Categorization Area which is connected to a specific Standarization Initiative
has domain
Standard c
has range
Standard Classification c

has Developerop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto#hasDeveloper

The organization that developed this Standard
has super-properties
maker op
has domain
Publication
has range
StandardOrganization c

has domainop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto#hasDomain

has domain
Publication
has range
Domain c

has File Sizeop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto#hasFileSize

The size of document file in some unit, e.g., 104 Kilobyte.
has domain
document c
has range
measure c

has Headquater Inop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto#hasHeadquaterIn

Denotes the countries in which the Headquarter of the organization who publishes the Standart
has domain
StandardOrganization c
has range
place c

has ICSop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto#hasICS

Serves as a catalogue of International Classification For Standards
has domain
Publication
has range
international classification for standards

has motivationop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto#hasMotivation

has domain
Publication
has range
motivation c

has Previous Versionop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto#hasPreviousVersion

Indicates the list of Standards that are previous versions of a Standard. For example,IEC 60038:2009 has IEC 60038:1983+AMD1:1994+AMD2:1997,IEC 60038:1983/AMD2:1997,IEC 60038:1983/AMD1:1994,IEC 60038:1983,IEC 60038:1975/AMD1:1977,IEC 60038:1975,IEC 60038:1967,IEC 60038:1954,IEC 60038:1938,IEC 60038:1927 as previous versions.
has super-properties
related To op

has Publisherop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto#hasPublisher

The organization that published this Standard
has super-properties
maker op
has domain
Publication
has range
StandardOrganization c

has Target Concernop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto#hasTargetConcern

The relation declaring that a standard is relevant or targets a certain concern.
has super-properties
associated with op
has domain
Standard c
has range
Concern c

has Target Concernop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto/iot#hasTargetConcern

has super-properties
associated with op
has domain
Standard c or Standarization Framework c
is also defined as
annotation property

has Technical Committeeop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto#hasTechnicalCommittee

Specifies the Technical Committee or a Sub-Committee that is responsible for creation and maintenance of a standard
has domain
Publication
has range
technical committee

has unitop back to ToC or Object Property ToC

IRI: http://www.ontology-of-units-of-measure.org/resource/om-2/hasUnit

has domain
error1 c
has range
unit

is Component Ofop back to ToC or Object Property ToC

IRI: http://www.ontologydesignpatterns.org/ont/dul/DUL.owl#isComponentOf

Represents Standards that are component of other Standards. This relation is not transitive
Is defined by
http://www.ontologydesignpatterns.org/ont/dul/DUL.owl
has super-properties
related To op
has domain
Standard c
has range
Standard c or StandardPart c

is Described inop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto#isDescribedin

Links the Standarization Frameworks with the Classification of Standards

is Implementation Ofop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto#isImplementationOf

Represent the relation that connects two standards when standard A is the implementation of standard B, e.g., B2MML isImplementationOf ISA-95.
has super-properties
related To op

is member ofop back to ToC or Object Property ToC

IRI: http://www.ontologydesignpatterns.org/ont/dul/DUL.owl#isMemberOf

A relation between collections and entities, e.g. 'the Night Watch by Rembrandt is in the Rijksmuseum collection'; 'Davide is member of the Pen Club', 'Igor is one the subjects chosen for the experiment'.
Is defined by
http://www.ontologydesignpatterns.org/ont/dul/DUL.owl
has super-properties
associated with op
has domain
entity
has range
collection

related Toop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto#relatedTo

Represent any type of relation that connects two standards.

has characteristics: symmetric, transitive

has sub-properties
has Previous Version op, is Component Of op, is Implementation Of op, use Structure Of op, uses op, was Generated By op
has domain
Standard c
has range
Standard c

supportsop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto/iot#supports

A relation between two different concerns where dealing with the subject Concern supports in achieving the object concern
has domain
Concern c
has range
Concern c

use Structure Ofop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto#useStructureOf

Standard A uses the structure of Standard B. For example, OPC UA uses Structure Of IEC_61804 (EDDL)
has super-properties
related To op

usesop back to ToC or Object Property ToC

IRI: https://w3id.org/i40/sto#uses

Defines that Standard A uses Standard B. For example, IEC_62714(AML) uses MathML.
has super-properties
related To op

was Generated Byop back to ToC or Object Property ToC

IRI: http://www.w3.org/ns/prov#wasGeneratedBy

Standard A has influences in Standard B. For example, IEC_61499 hasInfluenceIn IEC_61804-2(EDDL)
Is defined by
https://w3id.org/i40/sto
has super-properties
related To op

Data Properties

has Abbreviated Namedp back to ToC or Data Property ToC

IRI: https://w3id.org/i40/sto#abbreviation

Abbreviated name of the thing.
has domain
thing c
has range
plain literal

has Domain Namedp back to ToC or Data Property ToC

IRI: https://w3id.org/i40/sto#domainName

Points the Standard with the name of the Industrial Domain
has domain
Domain c
has range
plain literal

has Editiondp back to ToC or Data Property ToC

IRI: https://w3id.org/i40/sto#hasEdition

Indicates the current Edition/Version number of the document.
has domain
document c
has range
float

has Formation Datedp back to ToC or Data Property ToC

IRI: https://w3id.org/i40/sto#formationDate

Formation date of the Organization

has characteristics: functional

has domain
StandardOrganization c
has range
date

has Implementation Formatdp back to ToC or Data Property ToC

IRI: https://w3id.org/i40/sto#hasImplementationFormat

Describes the name of the implementation or serialization format of the Publication, e.g., XML, Document, binary, batch
has domain
Publication
has range
literal

has numerical valuedp back to ToC or Data Property ToC

IRI: http://www.ontology-of-units-of-measure.org/resource/om-2/hasNumericalValue

has domain
_:genid-nodeid-genid-ac8058d3efd24203949d2f943abb9621-6780A905CC831CAB4C4E310C38E6329A c

has Objectivedp back to ToC or Data Property ToC

IRI: https://w3id.org/i40/sto#hasObjective

Specifies the objectives for the different ISA 95 levels.
has domain
ISA 95 Level c
has range
string

has official resourcedp back to ToC or Data Property ToC

IRI: https://w3id.org/i40/sto#hasOfficialResource

has domain
Publication
has range
any u r i

has Ontologydp back to ToC or Data Property ToC

IRI: https://w3id.org/i40/sto#hasOntology

Point to the URL of a recognized Ontology representation of the Standard
has domain
Publication
has range
any u r i

has Pagesdp back to ToC or Data Property ToC

IRI: https://w3id.org/i40/sto#hasPages

Indicates the number of pages in the document.
has domain
document c
has range
integer

has Publication Datedp back to ToC or Data Property ToC

IRI: https://w3id.org/i40/sto#hasPublicationDate

Publication date of the Publication
has domain
Publication
has range
date

has Stability Datedp back to ToC or Data Property ToC

IRI: https://w3id.org/i40/sto#hasStabilityDate

Stability date of a publication. Publications are valid for a certain period, i.e., the Stability Period. This property defines the end of the stability period.
has domain
Publication
has range
g year

has Statusdp back to ToC or Data Property ToC

IRI: https://w3id.org/i40/sto#hasStatus

Publication status of the Standard, e.g., Valid, Revised, Published, under preparation, Released
has domain
Publication
has range
literal

has tagdp back to ToC or Data Property ToC

IRI: https://w3id.org/i40/sto#hasTag

has range
tag
literal

has Taskdp back to ToC or Data Property ToC

IRI: https://w3id.org/i40/sto#hasTask

Specifies the tasks for the different ISA 95 levels.
has domain
ISA 95 Level c
has range
string

Org Namedp back to ToC or Data Property ToC

IRI: https://w3id.org/i40/sto#orgName

Name of the Organization
has domain
StandardOrganization c
has range
plain literal

std Part Namedp back to ToC or Data Property ToC

IRI: https://w3id.org/i40/sto#stoPartName

Name of the standard part.
has domain
StandardPart c
has range
string

Named Individuals

6LoWPANni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#LoWPAN

6LoWPAN is an acronym of IPv6 over Low power Wireless Personal Area Networks. It is an adaption layer for IPv6 over IEEE802.15.4 links. This protocol operates only in the 2.4 GHz frequency range with 250 kbps transfer rate. (source: https://www.postscapes.com/internet-of-things-protocols/)
belongs to
document c
Publication
Technical Specification c
has facts
maker op i e t f
has Classification op IIRA Connectivity
has Classification op RAMI Communication Layer
has Developer op i e t f
has Publisher op i e t f
has d bpedia resource dp 6 lo w p a n
has wikipedia article dp 6 lo w p a n
has Target Concern op communication

Access Policyni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#AccessPolicy

Access to the service shall be regulated by access policies. Users entitled in access policies to envoke a given service must be able to actually envoke it.
belongs to
Concern c
has facts
supports op Data Access Control

Access Rights for IoT-Cloudni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Access_Rights_for_IoT-Cloud

belongs to
Concern c
has facts
supports op cloud connectivity
has wikipedia article dp access rights

Accountabilityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Accountability

A system built using the ARM shall support the reversing of the pseudonymization processes in order to guarantee mutual accountability
belongs to
Concern c

Actuationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Actuation

Sending data or a signal to a kind of actuating device, which leads to a change in a defined environment.
belongs to
Concern c
has facts
supports op IoT
has d bpedia resource dp actuator

Adaptabilityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Adaptability

Because of clients' need and time's requirements, there ought to be constant change in the system of associated devices for Internet of Things. Adaptability is continuously a need for survival and development of Internet of Things.
belongs to
Concern c
has facts
supports op IoT
has wikipedia article dp adaptability

Aeronni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Aeron

Aeron - Efficient reliable UDP unicast, UDP multicast, and IPC message transport. (source: https://www.postscapes.com/internet-of-things-protocols/)
belongs to
document c
Publication
Technical Specification c
has facts
has official resource dp aeron

agilityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Agility

Agility as a key pillar that enables quick and astute business operational decisions for an OpenFog System. The predicted scale of the data generated by IoT means that it is highly unlikely that humans alone will be able to comprehend the data, derive knowledge and make wise decisions about how to best leverage their IoT assets for the benefit of their businesses. In the OpenFog architecture the agility pillar is about making sure that the valuable data generated in the IoT can be rapidly transformed into actionable insights that drive rapid decisions and further levels of automation to support business interest. Spurce: OpenFog Consortum Architecture Whitepaper
belongs to
Concern c
has facts
supports op Business Context

aii data annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#AiiDataAnno

belongs to
oa annotation c

AII Industrial Internet Architectureni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IndustrialInternetArchitecture

belongs to
Architecture Description c
has facts
has Publisher op Alliance of Industrial Internet
has official resource dp industrial.pdf

aii network annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#AiiNetworkAnno

belongs to
oa annotation c

aii security annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#AiiSecurityAnno

belongs to
oa annotation c

Alliance Industrie du Futurni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#AllianceIndustrieDuFutur

belongs to
i io t consortium c
has facts
has Headquater In op france
has official resource dp http://www.industrie-dufutur.org/

Alliance of Industrial Internetni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#AllianceOfIndustrialInternet

belongs to
i io t consortium c
has facts
has Headquater In op china

Alljoynni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Alljoyn

Alljoyn - An open source software framework that makes it easy for devices and apps to discover and communicate with each other. (source: https://www.postscapes.com/internet-of-things-protocols/)
belongs to
document c
Publication
Technical Specification c
has facts
has official resource dp framework

AllSeen Allianceni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#AllSeenAlliance

The AllSeen Alliance is a nonprofit consortium dedicated to enabling and driving the widespread adoption of products, systems and services that support the Internet of Everything with an open, universal development framework supported by a vibrant ecosystem and thriving technical community' (source: https://www.postscapes.com/internet-of-things-protocols/)
belongs to
organization c
i io t consortium c
has facts
has official resource dp allseenalliance-org:

AMQPni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#AMQP

AMQP (Advanced Message Queuing Protocol): An open standard application layer protocol for message-oriented middleware. The defining features of AMQP are message orientation, queuing, routing (including point-to-point and publish-and-subscribe), reliability and security. (source: https://www.postscapes.com/internet-of-things-protocols/)
belongs to
document c
Publication
Technical Specification c
has facts
has official resource dp http://www.amqp.org/

anno actuationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#AnnoActuation

belongs to
oa annotation c

anno aii classificationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#AnnoAiiClassification

belongs to
oa annotation c

Anonymityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Anonymity

Anonymity is the guarantee for a user to interact with a system without being tracked or connected to its real-world identity.
belongs to
Concern c
has facts
supports op Privacy
has d bpedia resource dp anonymity
has d bpedia resource dp anonymous web browsing

Arrowhead Frameworkni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ArrowheadFramework

belongs to
i io t consortium c
Standarization Framework c
has facts
has Publisher op Arrowhead Project

Arrowhead Projectni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ArrowheadProject

belongs to
organization c

Artificial Intelligenceni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#AI

Artificial intelligence (AI) is intelligence exhibited by machines. In computer science, an ideal "intelligent" machine is a flexible rational agent that perceives its environment and takes actions that maximize its chance of success at some goal. Colloquially, the term "artificial intelligence" is applied when a machine mimics "cognitive" functions that humans associate with other human minds, such as "learning" and "problem solving". (source: wikipedia)
belongs to
Concern c
has facts
supports op Data Analytics
has d bpedia resource dp ""@en
has d bpedia resource dp artificial intelligence

Asset Managementni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#AssetManagement

The concern of being able to manage the system onboarding, configuration, policy, software/firmware updates and other lifecycle management operations.
belongs to
Concern c
has facts
supports op IoT
has wikipedia article dp physical and infrastructure asset management

Authenticationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Authentication

Authentication before opening a valid connection; this can be done by just verifying the server identity or doing mutual authentication.
belongs to
Concern c
has facts
supports op Identity Management

authorizationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Authorization

belongs to
Concern c
has facts
supports op Privacy

Auto Scalingni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Auto_Scaling

Autoscaling, also spelled auto scaling or auto-scaling, and sometimes also called automatic scaling, is a method used in cloud computing, whereby the amount of computational resources in a server farm, typically measured in terms of the number of active servers, scales automatically based on the load on the farm. It is closely related to, and builds upon, the idea of load balancing.
belongs to
Concern c
has facts
supports op Scalability
has wikipedia article dp autoscaling

Autonomous Communicationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#AutonomousCommunication

Authonomous Communication frames all requirements in order to autonomously establish communication channels between participants of a network. In most cases, this will be a machine-to-machine communication channel. Main challenges are related to interoperability.
belongs to
Concern c
has facts
supports op communication
supports op Service Choreography

Autonomous Configurationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#AutonomousConfiguration

A system built using the Reference Architecture shall be able to remotely control and configure devices.
belongs to
Concern c
has facts
supports op Service Choreography

Availabilityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Availability

In reliability theory and reliability engineering, the term availability has the following meanings: * The degree to which a system, subsystem or equipment is in a specified operable and committable state at the start of a mission, when the mission is called for at an unknown, i.e. a random, time. Simply put, availability is the proportion of time a system is in a functioning condition. This is often described as a mission capable rate. Mathematically, this is expressed as 100% minus unavailability. * The ratio of (a) the total time a functional unit is capable of being used during a given interval to (b) the length of the interval. For example, a unit that is capable of being used 100 hours per week (168 hours) would have an availability of 100/168. However, typical availability values are specified in decimal (such as 0.9998). In high availability applications, a metric known as nines, corresponding to the number of nines following the decimal point, is used. With this convention, "five nines" equals 0.99999 (or 99.999%) availability. (source: wikipedia)
belongs to
Concern c
has facts
supports op Reliability
has d bpedia resource dp availability

Awarenessni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Awareness

Awareness is the ability to directly know and perceive, to feel, or to be cognizant of events. More broadly, it is the state of being conscious of something. Another definition describes it as a state wherein a subject is aware of some information when that information is directly available to bring to bear in the direction of a wide range of behavioral processes. The concept is often synonymous to consciousness and is also understood as being consciousness itself.
belongs to
Concern c
has facts
supports op Edge computing
has wikipedia article dp awareness

Bandwidthni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Bandwidth

In computing, bandwidth is the maximum rate of data transfer across a given path. Bandwidth may be characterized as network bandwidth, data bandwidth, or digital bandwidth.
belongs to
Concern c
has facts
supports op communication
has wikipedia article dp bandwidth (computing)

BDV SRIA European Big Data Value Strategic Research and Innovation Agenda version 4.0 October 2017ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#European_BDV_SRIA_version_4_0

belongs to
oa specific resource c

BDVA Cloud and High Performance Computingni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaCloudAndHighPerformanceComputing

The Cloud and High Performance Computing (HPC): Effective Big Data processing and data management might imply the effective usage of Cloud and High Performance Computing infrastructures. This area is separately elaborated further in collaboration with the Cloud and High Performance Computing (ETP4HPC) communities.
belongs to
BDVA Concern c
Standard Classification c
has facts
associated with op IIRA Application Domain
is Described in op BDVA SIRA
alignes With op IIRA Application Domain
frames op Artificial Intelligence
frames op Big Data Applications
frames op Cloud Computing Capability
frames op Data Analytics
frames op Data Processing
frames op Data Publishing
frames op Machine Learning

bdva cloud and high performance computing annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaCloudAndHighPerformanceComputingAnno

belongs to
oa annotation c

BDVA Communication and Connectivityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaCommunicationConnectivity

Effective communication and connectivity mechanisms are necessary in providing support for Big Data. This area is separately further elaborated, along with various communication communities, such as the 5G community.
belongs to
BDVA Concern c
Standard Classification c
has facts
is Described in op BDVA SIRA
frames op communication
frames op Data Access
frames op Data Analytics
frames op Interoperability
frames op Quality of Service
frames op Semantic Interoperability
frames op Service Description

bdva communication connectivity annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaCommunicationConnectivityAnno

belongs to
oa annotation c

BDVA Concernni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaConcern

belongs to
class
is also defined as
class

bdva concern annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaConcernAnno

belongs to
oa annotation c

bdva cyber security trust annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaCyberSecurityTrustAnno

belongs to
oa annotation c

BDVA Cybersecurity and Trustni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaCyberSecurityTrust

Big Data often need support to maintain security and trust beyond privacy and anonymisation. The aspect of trust frequently has links to trust mechanisms such as blockchain technologies, smart contracts and various forms of encryption.
belongs to
BDVA Concern c
Standard Classification c
has facts
associated with op security
associated with op IDS RAM Security Perspective
associated with op IIC Security Framework
is Described in op BDVA SIRA
alignes With op security
alignes With op IDS RAM Security Perspective
alignes With op IIC Security Framework
frames op communication
frames op Data Sovereignty
frames op Integrity Protection and Verification
frames op Privacy
frames op Secure Communication
frames op Security
frames op Trustworthiness

BDVA Data Analyticsni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaDataAnalytics

Data analytics to improve data understanding, deep learning and the meaningfulness of data.
belongs to
BDVA Concern c
Standard Classification c
has facts
associated with op IDS RAM Process Layer
associated with op information domain
associated with op RAMI Functional Layer
associated with op RAMI Information Layer
is Described in op BDVA SIRA
alignes With op IDS RAM Process Layer
alignes With op information domain
alignes With op RAMI Functional Layer
alignes With op RAMI Information Layer
frames op Artificial Intelligence
frames op Data Analytics
frames op Data Processing
frames op Machine Learning
frames op Stream processing
frames op Trustworthiness

bdva data analytics annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaDataAnalyticsAnno

belongs to
oa annotation c

bdva data management annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaDataManagementAnno

belongs to
oa annotation c

BDVA Data Processing Architecturesni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaDataProcessingArchitectures

Optimised and scalable architectures for analytics of both data-at-rest and data-in-motion, with low latency delivering real-time analytics.
belongs to
BDVA Concern c
Standard Classification c
has facts
associated with op IDS RAM Process Layer
associated with op IIRA Connectivity
associated with op information domain
is Described in op BDVA SIRA
alignes With op IDS RAM Process Layer
alignes With op IIRA Connectivity
alignes With op information domain
frames op Big Data Applications
frames op communication
frames op Data at rest
frames op data in motion
frames op Data Processing
frames op Scalability
frames op Stream processing

bdva data processing architectures annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaDataProcessingArchitecturesAnno

belongs to
oa annotation c

BDVA Data Protectionni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaDataProtection

Privacy and anonymisation mechanisms to facilitate data protection. This is shown related to data management and processing as there is a strong link here, but it can also be associated with the area of cybersecurity.
belongs to
BDVA Concern c
Standard Classification c
has facts
associated with op IDS RAM Security Perspective
associated with op IIC Security Framework
is Described in op BDVA SIRA
alignes With op IDS RAM Security Perspective
alignes With op IIC Security Framework
frames op Data Protection
frames op Data Sovereignty
frames op Privacy
frames op Trustworthiness

bdva data protection annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaDataProtectionAnno

belongs to
oa annotation c

BDVA Data Sharing Platformsni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaDataSharingPlatforms

Data sharing and trading are seen as important ecosystem enablers in the data economy, although closed and personal data present particular challenges for the free flow of data. The following two conceptual solutions – Industrial Data Platforms (IDPs) and Personal Data Platforms (PDPs) – introduce new approaches to addressing this particular need to regulate closed proprietary and personal data.
belongs to
BDVA Concern c
Standard Classification c
has facts
associated with op IDS RAM
associated with op Industrial Internet Reference Architecture
is Described in op BDVA SIRA
frames op Business Context
frames op Data Economy
frames op Data Publishing

bdva data sharing platforms annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaDataSharingPlatformsAnno

belongs to
oa annotation c

bdva data visualization and user interaction annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaDataVisualizationAndUserInteractionAnno

belongs to
oa annotation c

bdva development engineering annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaDevelopmentEngineeringAnno

belongs to
oa annotation c

BDVA Engineering and DevOpsni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaDevelopmentEngineering

Engineering and DevOps for building Big Data Value systems: This topic will be elaborated in greater detail along with the NESSI Software and Service community.
belongs to
BDVA Concern c
Standard Classification c
has facts
is Described in op BDVA SIRA

BDVA IoT CPS and Edge Computingni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaThingsAssetsSensorsActuators

IoT, CPS, Edge and Fog Computing: A main source of Big Data is sensor data from an IoT context and actuator interaction in Cyber Physical Systems. In order to meet real-time needs it will often be necessary to handle Big Data aspects at the edge of the system. This area is separately elaborated further in collaboration with the IoT (Alliance for Internet of Things Innovation (AIOTI)) and CPS communities
belongs to
BDVA Concern c
Standard Classification c
has facts
is Described in op BDVA SIRA
frames op IoT

BDVA SIRAni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaSira

This Strategic Research and Innovation Agenda (SRIA) defines the overall goals, main technical and non-technical priorities, and a research and innovation roadmap for the European Public Private Partnership (PPP) on Big Data Value. The SRIA has been developed by the Big Data Value Association (BDVA), an industry-led organisation representing large businesses, small and medium-sized enterprises (SMEs), and research organisations in Europe.
belongs to
Standarization Framework c
has facts
has Publisher op Big Data Value Association

bdva sira annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaSiraAnno

belongs to
oa annotation c

BDVA Standardsni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaStandards

Standardisation of Big Data technology areas to facilitate data integration, sharing and interoperability
belongs to
BDVA Concern c
Standard Classification c
has facts
is Described in op BDVA SIRA
frames op Business Context
frames op communication
frames op Data Economy
frames op Interoperability

bdva standards annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaStandardsAnno

belongs to
oa annotation c

bdva things assets sensors actuators annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaThingsAssetsSensorsActuatorsAnno

belongs to
oa annotation c

Big Data Applicationsni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BigDataApplications

Big data is a term for data sets that are so large or complex that traditional data processing applications are inadequate to deal with them. Challenges include analysis, capture, data curation, search, sharing, storage, transfer, visualization, querying, updating and information privacy. The term "big data" often refers simply to the use of predictive analytics, user behavior analytics, or certain other advanced data analytics methods that extract value from data, and seldom to a particular size of data set. (source: wikipedia)
belongs to
Concern c
has facts
supports op Data Analytics
has d bpedia resource dp big data

Big Data Value Associationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BDVA

belongs to
organization c

Blockchainni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Blockchain

The term Blockchain refers to a set of technologies for distributed databases.
belongs to
document c
Publication
Technical Specification c
has facts
has d bpedia resource dp blockchain.info

Bluetoothni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Bluetooth

Bluetooth works in the 2.4 GHz ISM band and uses frequency hopping. With a data rate up to 3 Mbps and maximum range of 100m. Each application type which can use Bluetooth has its own profile. (source: https://www.postscapes.com/internet-of-things-protocols/)
belongs to
document c
Publication
Technical Specification c
has facts
has Classification op r a m i communication layer
has official resource dp bluetooth home.aspx

BPMni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BusinessProcessManagement

Business process management (BPM) is a field in operations management that focuses on improving corporate performance by managing and optimizing a company's business processes. It can therefore be described as a "process optimization process." It is argued that BPM enables organizations to be more efficient, more effective and more capable of change than a functionally focused, traditional hierarchical management approach. These processes can impact the cost and revenue generation of an organization. As a policy-making approach, BPM sees processes as important assets of an organization that must be understood, managed, and developed to announce value-added products and services to clients or customers. This approach closely resembles other total quality management or continual improvement process methodologies and BPM proponents also claim that this approach can be supported, or enabled, through technology. As such, many BPM articles and scholars frequently discuss BPM from one of two viewpoints: people and/or technology. (source: wikipedia)
belongs to
Concern c
has facts
supports op Business Context
has d bpedia resource dp business process management

Business Contextni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BusinessContext

Electronic business, or e-business, is the application of information and communication technologies in support of all the activities of business. Commerce constitutes the exchange of products and services between businesses, groups and individuals and can be seen as one of the essential activities of any business. (source: wikipedia)
belongs to
Concern c
has facts
has d bpedia resource dp electronic business

Business Transactionsni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BusinessTransactions

A financial transaction is an agreement, communication, or movement carried out between a buyer and a seller to exchange an asset for payment. It involves a change in the status of the finances of two or more businesses or individuals. The buyer and seller are separate entities or objects, often involving the exchange of items of value, such as information, goods, services, and money. It is still a transaction if the goods are exchanged at one time, and the money at another. This is known as a two-part transaction: part one is giving the money, part two is receiving the goods. (source: wikipedia)
belongs to
Concern c
has facts
supports op Business Context
has d bpedia resource dp financial transaction

Business Valueni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BusinessValue

belongs to
Concern c
has facts
supports op Business Context

cardinality of data sourcesni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#CardinalityOfDataSources

belongs to
Concern c
has facts
supports op Interoperability

Cardinality of Participantsni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#CardinalityOfParticipants

Data Artefacts from different Data Providers are delivered in order to provide additional insights (e.g. Collaborative Predictive Maintenance).
belongs to
Concern c
has facts
supports op interoperability
has d bpedia resource dp cardinality (computer engineering)

CEPni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ComplexEventProcessing

Event processing is a method of tracking and analyzing (processing) streams of information (data) about things that happen (events), and deriving a conclusion from them. Complex event processing, or CEP, is event processing that combines data from multiple sources to infer events or patterns that suggest more complicated circumstances. The goal of complex event processing is to identify meaningful events (such as opportunities or threats) and respond to them as quickly as possible. (source: wikipedia)
belongs to
Concern c
has facts
supports op Data Analytics
has d bpedia resource dp complex event processing

Certificationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Certification

Certification refers to the confirmation of certain characteristics of an object, person, or organization. This confirmation is often, but not always, provided by some form of external review, education, assessment, or audit. Accreditation is a specific organization's process of certification. (source: wikipedia)
belongs to
Concern c
has facts
supports op Security
supports op Trustworthiness
has d bpedia resource dp certification

Cloud Computing Capabilityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#CloudComputing

Cloud computing is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources (e.g., computer networks, servers, storage, applications and services), which can be rapidly provisioned and released with minimal management effort. Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers that may be located far from the user–ranging in distance from across a city to across the world. Cloud computing relies on sharing of resources to achieve coherence and economy of scale, similar to a utility (like the electricity grid) over an electricity network. (source: wikipedia)
belongs to
Concern c
has facts
has d bpedia resource dp cloud computing

cloud connectivityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Cloud_Connectivity

has facts
supports op Cloud Computing Capability

CoAPni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RFC_8323

CoAP (Constrained Application Protocol) is an application layer protocol that is intended for use in resource-constrained internet devices, such as WSN nodes. CoAP is designed to easily translate to HTTP for simplified integration with the web, while also meeting specialized requirements such as multicast support, very low overhead, and simplicity. The CoRE group has proposed the following features for CoAP: RESTful protocol design minimizing the complexity of mapping with HTTP, Low header overhead and parsing complexity, URI and content-type support, Support for the discovery of resources provided by known CoAP services. Simple subscription for a resource, and resulting push notifications, Simple caching based on max-age. (source: https://www.postscapes.com/internet-of-things-protocols/)
belongs to
document c
Publication
Technical Specification c
has facts
maker op i e t f
has Classification op IIRA Connectivity
has Classification op RAMI Communication Layer
has Developer op i e t f
has Publisher op i e t f
has d bpedia resource dp constrained application protocol
has official resource dp rfc8323
has wikipedia article dp constrained application protocol

communicationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Communication

belongs to
Admin Shell Sub Model c
Concern c
Standard Classification c
has facts
is Described in op Administration Shell
supports op Interoperability

Complianceni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Compliance

In general, compliance means conforming to a rule, such as a specification, policy, standard or law. Regulatory compliance describes the goal that organisations aspire to achieve in their efforts to ensure that they are aware of and take steps to comply with relevant laws and regulations. Due to the increasing number of regulations and need for operational transparency, organizations are increasingly adopting the use of consolidated and harmonized sets of compliance controls. This approach is used to ensure that all necessary governance requirements can be met without the unnecessary duplication of effort and activity from resources. (source: wikipedia)
belongs to
Concern c
has facts
supports op Reliability
has d bpedia resource dp regulatory compliance

Confidentialityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Confidentiality

Confidentiality involves a set of rules or a promise usually executed through confidentiality agreements that limits access or places restrictions on certain types of information.
belongs to
Concern c
has facts
supports op Privacy
has wikipedia article dp confidentiality

Connectivityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Connectivity

Internet of Things associates various smart devices through the Internet, and it gives a facility to concentrated checking and control of associated equipment.
belongs to
Concern c
has facts
supports op Syntactic Interoperability
has d bpedia resource dp connectivity
has wikipedia article dp connectivity

Constrained Devicesni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ConstrainedDevices

Data-memory-constrained devices must be able to participate in communication. This means that a system built using the ARM shall support communication stacks with small data footprint.
belongs to
Concern c
has facts
supports op IoT

Context Awarenessni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ContextAwareness

The look-up service of the system shall withold or grant information depending on context. Context includes application involved, requesting entity, and security permissions.
belongs to
Concern c
has facts
supports op Autonomous Communication
has d bpedia resource dp context awareness

Cost Efficiencyni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#CostEfficiency

belongs to
Concern c
has facts
supports op Business Context

Cross-domain Identity Managementni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#CrossDomainIdentityManagement

A system built using the ARM shall support identity-locator split, i.e. making the device's identity independent from its locator.
belongs to
Concern c
has facts
supports op Identity Management
has d bpedia resource dp system for cross domain identity management

customerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Customer

belongs to
Stakeholder Group c

Customizationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Customization

The resources sharing by contrasting users keeps cloud service provider from having the capacity to customize their services to meet the diverse necessities of customers
belongs to
Concern c
has facts
supports op Business Context
supports op Scalability
has wikipedia article dp customization

Customizationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataEncryption

belongs to
Concern c
has facts
supports op Business Context
supports op Secure Communication
has wikipedia article dp customization
has wikipedia article dp encryption

d i n e n 50128ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DIN_EN_50128

belongs to
Standard c
has facts
frames op Safety

d i n e n 50159ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DIN_EN_50159

belongs to
Standard c
has facts
has Classification op IDS RAM Certification Perspective
has Target Concern op Safety

d i n e n i s o 13849ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DIN_EN_ISO_13849

belongs to
Standard c
has facts
has Classification op IDS RAM Certification Perspective
has Target Concern op Safety

d i n e n i s o i e c 17025ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DIN_EN_ISO_IEC_17025

belongs to
Standard c
has facts
has Classification op IDS RAM Certification Perspective

d i n i s o 14638ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DIN_ISO_14638

belongs to
Standard c
has facts
frames op Thing description

d i n s p e c 16593 p1ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DIN_SPEC_16593_P1

belongs to
Standard c
has facts
frames op Service Description

d i n s p e c 92222ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DIN_SPEC_92222

belongs to
Standard c
has facts
frames op Cloud Computing Capability
frames op communication
frames op interoperability

Data Accessni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataAccess

Data access typically refers to software and activities related to storing, retrieving, or acting on data housed in a database or other repository. [...] Data access crucially involves authorization to access different data repositories. (source: wikipedia)
belongs to
Concern c
has facts
has d bpedia resource dp data access

Data Access Controlni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataAccessControl

Automated access control based on formalized descriptions.
belongs to
Concern c
has facts
supports op authorization
has d bpedia resource dp access control

Data Aggregationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataAggregation

Data Aggregation is the compiling the data before Data Processing
belongs to
Concern c
has facts
has wikipedia article dp data aggregation

Data Analyticsni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataAnalytics

Analysis of data is a process of inspecting, cleaning, transforming, and modeling data with the goal of discovering useful information, suggesting conclusions, and supporting decision-making. Data analysis has multiple facets and approaches, encompassing diverse techniques under a variety of names, in different business, science, and social science domains. Data mining is a particular data analysis technique that focuses on modeling and knowledge discovery for predictive rather than purely descriptive purposes. Business intelligence covers data analysis that relies heavily on aggregation, focusing on business information. (source: wikipedia)
belongs to
Concern c
has facts
has d bpedia resource dp data analysis

Data at restni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataAtRest

Data at rest in information technology means inactive data that is stored physically in any digital form (e.g. databases, data warehouses, spreadsheets, archives, tapes, off-site backups, mobile devices etc.). Data at rest is used as a complement to the terms data in use and data in transit which together define the three states of digital Data. (source: wikipedia)
belongs to
Concern c
has facts
supports op communication
has d bpedia resource dp data at rest

Data Collectionni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Data_Collection

The data in IoT are always mass, distributed, and time-related and position related. At the same time, the data sources of the IoT are heterogeneous. There is a vast amount of real-time data collected by the IoT devices.
belongs to
Concern c
has facts
supports op Data Analytics
has d bpedia resource dp data collection
has wikipedia article dp data collection

Data Confidentialityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Data_Confidentiality

In edge computing, user private data is outsourced to the edge server and its ownership and control are separated, which causes users to lose their physical control over the outsourced data.
belongs to
Concern c
has facts
supports op Privacy

data consumerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataConsumer

belongs to
Stakeholder Group c

Data Descriptionni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataDescription

Methods to unambiguously describe data resources.
belongs to
Concern c
has facts
supports op Semantic Interoperability

Data Discoveryni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataDiscovery

How to find desired resources, Data Assets, Data Artifacts in a defined environment.
belongs to
Concern c
has facts
supports op Interoperability

Data Economyni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataEconomy

Business aspects of data exchange
belongs to
Concern c
has facts
supports op Business Context
has d bpedia resource dp digital economy

Data Integrityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataIntegrity

Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle, and is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data.
belongs to
Concern c
has facts
supports op Privacy
has wikipedia article dp data integrity

Data Isolationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataIsolation

Isolation is one of the ACID (Atomicity, Consistency, Isolation, Durability) properties adopted by the database systems
belongs to
Concern c
has facts
supports op Data Integrity
has wikipedia article dp isolation (database systems)

Data lifecycle managementni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataLifecycleManagment

Data lifecycle management includes every phase of a "record" from its beginning to its end. And while it is generally applied to information that rises to the classic definition of a record (and thus related to records management), it applies to all informational assets. During its existence, information can become a record by being identified as documenting a business transaction or as satisfying a business need. (source: wikipedia)
belongs to
Concern c
has facts
supports op Data Analytics
has d bpedia resource dp information lifecycle management

Data Locationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataLocation

One of the features of cloud computing is geodistribution of data among several servers. But this can be an issue for the enterprise, as the location of the data is unknown to the user.
belongs to
Concern c
has facts
supports op Data Usage Control

Data Marketsni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataMarkets

Data as an economic good; it's offered, demanded, and priced.
belongs to
Concern c
has facts
supports op Data Economy

data ownerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataOwner

belongs to
Stakeholder Group c

Data Ownershipni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataOwnership

Data Ownership declare the possesion on an information resource that is independent of its location, e.g. personal data belongs to the related person no matter where it is stored.
belongs to
Concern c
has facts
supports op Privacy
has d bpedia resource dp data ownership

Data Processingni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataProcessing

Data processing and analytic components from the App Store create flexible data processing pipelines.
belongs to
Concern c
has facts
has d bpedia resource dp data processing

Data Protectionni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataProtection

Data protection is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. Privacy concerns exist wherever personally identifiable information or other sensitive information is collected, stored, used, and finally destroyed or deleted – in digital form or otherwise. Improper or non-existent disclosure control can be the root cause for privacy issues. (source: wikipedia)
belongs to
Concern c
is same as
data security
has facts
supports op Privacy
has d bpedia resource dp information privacy

data providerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataProvider

belongs to
Stakeholder Group c

Data Publishingni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataPublishing

Data Publishing is the concern regarding all aspects of getting data (publicly) available.
belongs to
Concern c
has facts
supports op Data Access Control

Data Qualityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataQuality

Data quality refers to the level of quality of data. There are many definitions of data quality but data are generally considered high quality if "they are fit for their intended uses in operations, decision making and planning." (Tom Redman<Redman, T.C. (2008). Data driven: Profiting from your most important business asset (p. 56). Boston, Mass.: Harvard Business Press.>). Alternatively, data is deemed of high quality if it correctly represents the real-world construct to which it refers. Furthermore, apart from these definitions, as data volume increases, the question of internal consistency within data becomes significant, regardless of fitness for use for any particular external purpose. People's views on data quality can often be in disagreement, even when discussing the same set of data used for the same purpose. (source: wikipedia)
belongs to
Concern c
has facts
supports op Quality of Service
has d bpedia resource dp data quality

data securityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataSecurity

belongs to
Concern c
is same as
Data Protection
has facts
has wikipedia article dp data security

Data Sovereigntyni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataSovereignty

belongs to
Concern c
Standard Classification c
has facts
has d bpedia resource dp cyber sovereignty
has wikipedia article dp data sovereignty

Data Storageni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataStorage

The IoT data are collected from various data sources in different structures and formats. IoT enables the collected data to be stored both in physical devices and cloud storage.
belongs to
Concern c
has facts
supports op Data Processing
has wikipedia article dp data storage

Data Transfer Projectni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataTransferProject

The Data Transfer Project (DTP) extends data portability beyond a user’s ability to download a copy of their data from their service provider (“provider”), to providing the user the ability 1 to initiate a direct transfer of their data into and out of any participating provider. The Data Transfer Project is an open source initiative to encourage participation of as many providers as possible. The DTP will enhance the data portability ecosystem by reducing the infrastructure burden on both providers and users, which should in turn increase the number of services offering portability. The protocols and methodology of the DTP enable direct, service-to-service data transfer with streamlined engineering work.
belongs to
organization c
Data Sharing Initiative c
has facts
associated with op Data Transfer Project Architecture
has official resource dp data transfer project

data transfer project annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataTransferProjectAnno

belongs to
oa annotation c

Data Transfer Project Architectureni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DtpArchitecture

The architecture description of the Data Transfer Project has not yet been published in a sufficient manner.
belongs to
Architecture Description c
Standarization Framework c
has facts
has Publisher op Data Transfer Project

Data Transfer Project Overview and Fundamentalsni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Data_Transfer_Project_Overview_and_Fundamentals

belongs to
oa specific resource c

Data Transfer Project Whitepaperni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataTransferProjectWhitepaper

The Data Transfer Project Whitepaper provides a brief overview on the intends of the Data Transfer Project and the targeted approach.
belongs to
document c
Publication
has facts
maker op Data Transfer Project
has Classification op DTP Deployment
has Classification op DTP Ecosystem
has Classification op DTP Security & Privacy
has Classification op DTP System
has Developer op Data Transfer Project
has Publisher op Data Transfer Project
has d bpedia resource dp data transfer project
has wikipedia article dp data transfer project
has Target Concern op Data Sovereignty
has Target Concern op Identity Management
has Target Concern op Privacy
has Target Concern op Secure Communication
has Target Concern op User Preferences

Data Usage Controlni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataUsageControl

Data usage control can be seen as an extension of data access control. It is about the specification and enforcement of restrictions regulating what is allowed to happen with data, and what is not. Data usage control thus is concerned with requirements that pertain to data processing (obligations) rather than data access (provisions). It is primarily relevant in the context of intellectual property protection, privacy protection, compliance with regulations, and digital rights management.
belongs to
Concern c
has facts
supports op authorization

Data Visualisation and User Interactionni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#BdvaDataVisualizationAndUserInteraction

Engineering and DevOps for building Big Data Value systems: This topic will be elaborated in greater detail along with the NESSI Software and Service community.
belongs to
BDVA Concern c
Standard Classification c
has facts
associated with op IIRA Usage Viewpoint
associated with op RAMI Functional Layer
is Described in op BDVA SIRA
alignes With op IIRA Usage Viewpoint
alignes With op RAMI Functional Layer
frames op Big Data Applications

Decision makerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DecisionMaker

These are business Decision makers
belongs to
Layer c

developerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Developer

belongs to
Stakeholder Group c

Device Authenticationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Device_Authentication

belongs to
Concern c
has facts
supports op Authentication
has wikipedia article dp authentication

Device Securityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DeviceSecurity

belongs to
Concern c
has facts
supports op Objects Safety and Security

DIN 77005-1:2018-09ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DIN_77005_P1

belongs to
Standard c
has facts
frames op Data lifecycle management

DIN EN 50129ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DIN_EN_50129

belongs to
Standard c
has facts
has Classification op IDS RAM Certification Perspective
has Target Concern op Safety

DIN EN 50155ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DIN_EN_50155

belongs to
Standard c
has facts
has Classification op IDS RAM Certification Perspective
has Target Concern op Safety

DIN EN 61511ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DIN_EN_61511

belongs to
Standard c
has facts
has Classification op IDS RAM Certification Perspective
has Target Concern op Safety

DMAni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DataMarketAustria

belongs to
organization c
Data Sharing Initiative c
StandardOrganization c
has facts
has official resource dp http://www.datamarket.at/

DMA Architectureni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DmaArchitecture

belongs to
Architecture Description c
Standarization Framework c
has facts
has Publisher op DMA

DMA Service Technology Specification and Development Roadmapni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DmaServiceTechnologySpecificationAndDevelopmentRoadmap

This document presents the DMA Data Technology Specification and Development Roadmap regarding the ongoing work in WP6 of the DMA project. The document relates to deliverable D2.2 “D2.2 Community-driven Data-Services Ecosystem Requirements (1st version)” which formulates the requirements of the DMA community. It will be explained in what way the requirements formulated in D2.2 are going to be addressed. The document gives an overview about the components which are going to be developed in WP6 and how these components are planned to be employed to provide DMA core services. The expected outputs of these services are described and a procedure of describing a 3rd party service for DMA platform is addressed.
belongs to
document c
Publication
Standarization Framework c
has facts
associated with op Blockchain
associated with op REST
associated with op RFC 6750
maker op DMA
has Publisher op DMA
has official resource dp d m a deliverable d6.1 f i n a l v01.pdf
has Target Concern op Authentication
has Target Concern op authorization
has Target Concern op Big Data Applications
has Target Concern op billing
has Target Concern op Cloud Computing Capability
has Target Concern op Data Access
has Target Concern op Data Quality
has Target Concern op Privacy
has Target Concern op Secure Communication
has Target Concern op Security
has Target Concern op Semantic Interoperability
has Target Concern op Stream processing
has Target Concern op Syntactic Interoperability
has Target Concern op Trustworthiness

DTP Ecosystemni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DtpEcosystemView

belongs to
Standard Classification c
Viewpoint c
has facts
associated with op IDS RAM Governance Perspective
associated with op IIRA Usage Viewpoint
is Described in op Data Transfer Project Architecture
alignes With op IDS RAM Governance Perspective
alignes With op IIRA Usage Viewpoint

DTP Security & Privacyni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DtpSecurityPrivacy

belongs to
Standard Classification c
Viewpoint c
has facts
associated with op security
associated with op IDS RAM Governance Perspective
associated with op IIRA Privacy
associated with op IIRA Security
is Described in op Data Transfer Project Architecture
alignes With op security
alignes With op IDS RAM Governance Perspective
alignes With op IIRA Privacy
alignes With op Security

Dynamic Adjustabilityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DynamicAdjustability

A systems ability to adjust its behaviour on dynamic changes in its environment.
belongs to
Concern c
has facts
supports op Service Choreography
supports op Service Composition
supports op Service Orchestration

Dynamic Discoveryni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#DynamicDiscovery

A systems ability to retrive according information on required assets and components on-the-fly.
belongs to
Concern c
has facts
supports op Data Discovery
supports op Service Discovery

Edge Analyticsni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#EdgeAnalytics

The concern of being able to understanding the states, conditions and behaviors of the systems under control and other systems by interpreting and correlating data gathered from sensors and other systems.
belongs to
Concern c
has facts
has wikipedia article dp edge computing

Edge computingni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#EdgeComputing

Edge Computing is pushing the frontier of computing applications, data, and services away from centralized nodes to the logical extremes of a network. It enables analytics and knowledge generation to occur at the source of the data. This approach requires leveraging resources that may not be continuously connected to a network such as laptops, smartphones, tablets and sensors. Edge Computing covers a wide range of technologies including wireless sensor networks, mobile data acquisition, mobile signature analysis, cooperative distributed peer-to-peer ad hoc networking and processing also classifiable as Local Cloud/Fog computing and Grid/Mesh Computing, dew computing, mobile edge computing, cloudlet, distributed data storage and retrieval, autonomic self-healing networks, remote cloud services, augmented reality, and more. (source: wikipedia)
belongs to
Concern c
has facts
supports op Cloud Computing Capability
supports op Data Processing
has d bpedia resource dp edge computing

Edgecross Architectureni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#EdgecrossArchitecture

belongs to
Architecture Description c
Standarization Framework c
has facts
has Publisher op Edgecross Consortium

Edgecross Consortiumni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#EdgecrossConsortium

belongs to
organization c
i io t consortium c
StandardOrganization c
has facts
has official resource dp https://www.edgecross.org/en/

Edgecross Consortium to Address Edge Integration in IIoT-enabled Architecturesni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Edgecross_Consortium_to_Address_Edge_Integration_in_IIoT_enabled_Architectures

belongs to
oa specific resource c

edgecross edge computing layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#EdgecrossEdgeComputingLayerAnno

belongs to
oa annotation c

Edgecross Edgecomputing Layerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#EdgecrossEdgeComputingLayer

belongs to
Edgecross Layer c
Standard Classification c
has facts
associated with op IDS RAM System Layer
associated with op IIRA Control Domain
associated with op IIRA Operation Domain
associated with op information domain
associated with op RAMI Information Layer
associated with op RAMI Integration Layer
is Described in op Edgecross Architecture
alignes With op IDS RAM System Layer
alignes With op IIRA Control Domain
alignes With op IIRA Operation Domain
alignes With op information domain
alignes With op RAMI Information Layer
alignes With op RAMI Integration Layer
frames op Cloud Computing Capability
frames op Data Processing
frames op Edge computing
frames op Interoperability
frames op Semantic Interoperability

Edgecross FAni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#EdgecrossFacilityLayer

belongs to
Edgecross Layer c
Standard Classification c
has facts
associated with op IIRA Physical Systems
associated with op RAMI Asset Layer
is Described in op Edgecross Architecture
alignes With op IIRA Physical Systems
alignes With op RAMI Asset Layer

edgecross facility layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#EdgecrossFacilityLayerAnno

belongs to
oa annotation c

Edgecross IT Systems Layerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#EdgecrossItSystemsLayer

belongs to
Edgecross Layer c
Standard Classification c
has facts
associated with op IDS RAM System Layer
associated with op IIRA Application Domain
associated with op RAMI Integration Layer
is Described in op Edgecross Architecture
alignes With op IDS RAM System Layer
alignes With op IIRA Application Domain
alignes With op RAMI Integration Layer
frames op communication
frames op Data Analytics
frames op data in motion

edgecross it systems layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#EdgecrossItSystemsLayerAnno

belongs to
oa annotation c

edgecross layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#EdgecrossLayerAnno

belongs to
oa annotation c

Edgecross Whitepaperni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#EdgecrossWhitepaper

belongs to
document c
Publication
has facts
maker op Edgecross Consortium
has Classification op Edgecross Edgecomputing Layer
has Classification op Edgecross FA
has Classification op Edgecross IT Systems Layer
has Publisher op Edgecross Consortium
has official resource dp edgecross consortium w p( e).pdf
has Target Concern op Edge computing
has Target Concern op Interoperability

end userni back to ToC or Named Individual ToC

IRI: http://purl.oclc.org/NET/mvco.owl#EndUser

belongs to
Stakeholder Group c

Endpoint Descriptionni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#EndpointDescription

Methods to unambiguously describe client and server endpoints.
belongs to
Concern c
has facts
supports op Semantic Interoperability

Endpoint Invocationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#EndpointInvocation

Mechanisms to interact with a service and to access it through the network.
belongs to
Concern c
has facts
supports op Syntactic Interoperability

Energy Controlni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#EnergyControl

belongs to
Concern c
has facts
supports op Energy Efficiency
has wikipedia article dp energy management

Energy Efficiencyni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#EnergyEfficiency

Efficient energy use, sometimes simply called energy efficiency, is the goal to reduce the amount of energy required to provide products and services.
belongs to
Admin Shell Sub Model c
Concern c
Standard Classification c
has facts
is Described in op Administration Shell
supports op IoT
has wikipedia article dp efficient energy use

Event-Driven Messagingni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#EventDrivenMessaging

belongs to
Concern c
has facts
supports op data in motion
has d bpedia resource dp event driven messaging

Evolvabilityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Evolvability

A system shall accomodate fast developmental changes in applications and network.
belongs to
Concern c
has facts
supports op Dynamic Adjustability
has d bpedia resource dp evolving intelligent system
has d bpedia resource dp software evolution

Execution Variabilityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ExecutionVariability

The system's ability to flexibly connect/adjust data flows in order to reach a defined target.
belongs to
Concern c

Extensibilityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Extensibility

"Extensibility could be a huge challenge at the edge of the network, unlike a mobile system, the things in the IoT could be very dynamic. When the owner purchases a new thing, can it be easily added to the current service without any problem? Or when one thing is replaced due to wearing out, can the previous service adopt a new node easily? These problems should be solved with a flexible and extensible design of service management layer in the edgeOS."
belongs to
Concern c
has facts
supports op Evolvability
has wikipedia article dp extensibility

f i w a r e annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#FIWAREAnno

belongs to
oa annotation c

Fairnessni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Fairness

How can a fair and non-discriminating access to (compute and storage) resources be established?
belongs to
Concern c
has facts
supports op Business Context
has wikipedia article dp fairness

Fault Toleranceni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#FaultTolerance

Fault tolerance is the property that enables a system to continue operating properly in the event of the failure of some (one or more faults within) of its components. If its operating quality decreases at all, the decrease is proportional to the severity of the failure, as compared to a naively designed system in which even a small failure can cause total breakdown.
belongs to
Concern c
has facts
supports op Availability
has d bpedia resource dp category: fault tolerant computer systems
has wikipedia article dp fault tolerance

FIWAREni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Fiware

belongs to
organization c

fiware advanced ui annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#FiwareAdvancedUiAnno

belongs to
oa annotation c

FIWARE Advanced Web-based User Interfaceni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#FiwareAdvancedUi

The Generic Enablers (GEs) from the Advanced Web-based User Interface (WebUI) chapter cover a set of GEs that provide an advanced user experience using HTML-5 and a Web-based UI approach. The objective of the Advanced Web-based UI GE is to significantly improve the user experience for the Future Internet by adding new user input and interaction capabilities, such as interactive 3D graphics, immersive interaction with the real and virtual world via Augmented Reality, virtualizing the display and driving them over the network, and many more.
belongs to
Fiware Chapter c
Standard Classification c
has facts
associated with op end user
associated with op IIRA Application Domain
associated with op IIRA Usage Viewpoint
is Described in op FIWARE Architecture
alignes With op IIRA Application Domain
alignes With op IIRA Usage Viewpoint
frames op User Interaction

FIWARE Applications Services and Data Deliveryni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#FiwareApplicationsServicesAndDataDelivery

The Generic Enablers (GE) for the Apps Chapter together build an ecosystem of applications, services and data that is sustainable and fosters innovation as well as cross-fertilization. In particular the Apps Generic Enablers supports managing applications, services and data in a business framework across the whole service life cycle from creation through composition of applications and data to monetization and revenue sharing. A couple of basic GEs are important to realize the vision of such an applications, services and data business framework, which enables new business models in an agile and flexible way. Among them: a store, a marketplace, a revenue sharing engine, an application composer through mashup and a data visualization and analysis component. The Business Framework is heavily relying on USDL as common uniform description format for services which does not only focus on technical aspects of service, but also on business aspects as well as functional and non-functional service attributes. The Application Mashup GE aims at allowing end users without programming skills to quickly compose beautiful web applications and dashboards/cockpits mashing up widgets, operators and data sources from a shared catalogue. The Data Visualisation GE aims at creating agile, beautiful visualizations and meaningful reports useful to present the large variety of datasets. Data stakeholders will bring in the play as well as providing customisable data analytics.
belongs to
Fiware Chapter c
Standard Classification c
has facts
associated with op IDS RAM Process Layer
associated with op IIRA Connectivity
associated with op NGSI-LD Architecture
is Described in op FIWARE Architecture
alignes With op IDS RAM Process Layer
alignes With op IIRA Connectivity
alignes With op NGSI-LD Architecture
frames op Data Analytics
frames op data selection
frames op Service Composition
frames op Service Selection

fiware applications services and data delivery annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#FiwareApplicationsServicesAndDataDeliveryAnno

belongs to
oa annotation c

FIWARE Architectureni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#FIWARE

The FIWARE platform contains market-ready open source software, combining components that enable the connection to IoT with Context Information Management and Big Data services in the Cloud.
belongs to
Architecture Description c
Standarization Framework c
has facts
associated with op IDS RAM System Layer
associated with op IIRA Implementation Viewpoint
has Publisher op FIWARE
alignes With op IDS RAM System Layer
alignes With op IIRA Implementation Viewpoint
has official resource dp https://www.fiware.org/

fiware chapter annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#FiwareChapterAnno

belongs to
oa annotation c

FIWARE Cloud Hostingni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#FiwareCloudHosting

The Cloud Chapter offers Generic Enablers (GEs) that comprise the foundation for designing a modern cloud hosting infrastructure that can be used to develop, deploy and manage Future Internet applications and services. Provided hosting capabilities are of several kinds and at several levels of resource abstraction -- aiming at the needs of different applications hosted on the cloud. The IaaS Data Center Resource Management (DCRM) GE is offering provisioning and life cycle management of virtualized resources (compute, storage, network) associated with virtual machines. The Object Storage GE offers provisioning and life cycle management of object-based storage containers and elements. The Job Scheduler GE offers the application to submit and manage computational jobs in a unified and scalable manner. The Edgelet Management GE offers the capability to host lightweight application components, called edgelets. Moreover, the IaaS Service Management (SM) GE provides the means to host complex applications. Lastly, the PaaS Management GE uses the above capabilities to offer provisioning and management of complete PaaS environments, leveraging also the Software Deployment and Configuration (SDC) GE which offers a flexible framework for installation and customization of software products (via Chef recipes) within individual virtual machines.
belongs to
Fiware Chapter c
Standard Classification c
has facts
associated with op IDS RAM System Layer
associated with op IIRA Application Domain
associated with op IIRA Distributed Data Management
associated with op IIRA Scalability
associated with op NGSI-LD Architecture
is Described in op FIWARE Architecture
alignes With op IDS RAM System Layer
alignes With op IIRA Application Domain
alignes With op IIRA Distributed Data Management
alignes With op IIRA Scalability
alignes With op NGSI-LD Architecture
frames op Availability
frames op Cloud Computing Capability
frames op Data Processing
frames op Data Sovereignty
frames op Integrity Protection and Verification
frames op Privacy
frames op Reliability
frames op Safety
frames op Security
frames op Service Composition
frames op Service Deployment
frames op Service life-cycle management
frames op Service Orchestration
frames op Trustworthiness

fiware cloud hosting annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#FiwareCloudHostingAnno

belongs to
oa annotation c

fiware data context management annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#FiwareDataContextManagementAnno

belongs to
oa annotation c

FIWARE Data/Context Managementni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#FiwareDataContextManagement

The Data/Context Management FIWARE chapter aims at providing outperforming and platform-like GEs that will ease development and provision of innovative Applications that require gathering, publication, processing and exploitation of information and data streams in real-time and at massive scale. Combined with GEs coming from the Apps Chapters, Application Providers will be able to build innovative business models based on exploitation of massive data provided by end users. FIWARE Data/Context Management GEs allow to gather information from context and other sources (Context Broker), mediate metadata among GEs and applications (Metadata pre-processor) query stored information through an homogeneous layer (Query Broker), , annotate existing information (Semantic Annotation), store and manage semantic information (Semantic Application Support), generate new knowledge from big data stores using a Map & Reduce paradigm (Big Data analysis) and react to different types of scenarios (Complex Event Processing). It also provides GEs for media management, as easy creation of advanced video applications (Stream Oriented GE) and specifically, video analysis in the compressed domain (CDVA).
belongs to
Fiware Chapter c
Standard Classification c
has facts
associated with op NGSI-LD API Operation
associated with op NGSI-LD Data Representation
associated with op NGSI-LD Information Model
is Described in op FIWARE Architecture
alignes With op NGSI-LD API Operation
alignes With op NGSI-LD Data Representation
alignes With op NGSI-LD Information Model
frames op Big Data Applications
frames op Data Discovery
frames op Data Processing
frames op Interoperability
frames op Stream processing

FIWARE Interface to Networks and Devicesni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#InterfaceNetworksDevices

The GEs in the I2ND chapter provide three sets of functionalities. The first is an advanced integration middleware to be used by all FIWARE GEs with high performance communication needs Open networking elements enable cloud network application developers to build value-added services in private, enterprise and public settings. The third set of functionalities enables the management of robots by means of platform components and interfaces towards other FIWARE GEs, allowing users to develop smarter and faster robotic applications.
belongs to
Fiware Chapter c
Standard Classification c
has facts
associated with op IDS RAM Process Layer
associated with op IDS RAM System Layer
associated with op NGSI-LD Architecture
associated with op open daylight
is Described in op FIWARE Architecture
alignes With op IDS RAM Process Layer
alignes With op IDS RAM System Layer
alignes With op NGSI-LD Architecture
frames op Cloud Computing Capability
frames op Data Description
frames op Data Processing
frames op Data Sovereignty
frames op Endpoint Description
frames op Endpoint Invocation
frames op Interoperability
frames op IoT
frames op Privacy
frames op Quality of Service
frames op Scalability
frames op Security
frames op Semantic Interoperability
frames op Service Composition
frames op Service Description
frames op Service Orchestration
frames op Syntactic Interoperability
frames op Trustworthiness

FIWARE IoT Services Enablementni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#FiwareIotServicesEnablement

The deployment of the architecture of the IoT Service Enablement chapter is typically distributed across a large number of Devices, several Gateways and the Backend. A device is a hardware entity, component or system that either measures properties of a thing/group of things or influences the properties of a thing/group of things or both measures/influences. Sensors and actuators are devices. IoT Resources are computational elements (software) that provide the technical means to perform sensing and/or actuation on the device. The resource is usually hosted on the device. IoT GEs have been spread in two different domains: Gateway and Backend. While IoT Gateway GEs provide inter-networking and protocol conversion functionalities between devices and the IoT Backend GEs, the IoT Backend GEs provide management functionalities for the devices and IoT domain-specific support for the applications.
belongs to
Fiware Chapter c
Standard Classification c
has facts
associated with op IDS RAM System Layer
associated with op IIRA Control Domain
associated with op RAMI Communication Layer
associated with op RAMI Integration Layer
is Described in op FIWARE Architecture
alignes With op IDS RAM System Layer
alignes With op IIRA Control Domain
alignes With op RAMI Communication Layer
alignes With op RAMI Integration Layer
frames op Cloud Computing Capability
frames op Data Discovery
frames op Data Processing
frames op Edge computing
frames op Endpoint Invocation
frames op Interoperability
frames op IoT
frames op Syntactic Interoperability

fiware iot services enablement annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#FiwareIotServicesEnablementAnno

belongs to
oa annotation c

FIWARE Securityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#FiwareSecurity

The Future Internet services will always be exposed to different types of threats that can lead to severe misuse and damage. Creating secured and trusted services without sacrificing much of the desired functionality, usability, performance and cost efficiency is a great challenge, especially in a dynamic environment where new threats and attack methods emerge on a daily basis. The overall ambition of the Security Architecture of FIWARE is to demonstrate that the Vision of an Internet that is "secure by design" is becoming reality. Based on achievements to date and/or to come in the short-term (both from a technological but also a standardization perspective) we will show that "secure by design" is possible. Security, Privacy and Trust in FIWARE is mainly focusing on delivering tools and techniques to have the above-mentioned security needs properly met. Furthermore a decision making support and the automation of countermeasures allow alleviating the workload of users and administrators while raising their security awareness. The high-level Reference Architecture is formed by four main blocks of GEs: Cybersecurity, Identity and Access Management (and Enforcement), Privacy, Trust and Trustworthiness.
belongs to
Fiware Chapter c
Standard Classification c
has facts
associated with op security
associated with op IDS RAM Security Perspective
associated with op IIRA Security
associated with op x a c m l
is Described in op FIWARE Architecture
alignes With op security
alignes With op IDS RAM Security Perspective
alignes With op IIRA Security
frames op Authentication
frames op authorization
frames op Data Access Control
frames op Data Sovereignty
frames op Identity Management
frames op Privacy
frames op Security
frames op Trustworthiness

fiware security annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#FiwareSecurityAnno

belongs to
oa annotation c

Geo trackingni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#GeoTracking

A system built using the ARM shall support physical entity location tracking (geo spatial and/or logical location)
belongs to
Concern c
has facts
supports op Context Awareness
has d bpedia resource dp track and trace

Geospatial data and informationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#GeospatialData

Discovery and lookup services of the system shall allow locating physical entities based on geographical parameters.
belongs to
Concern c
has facts
supports op Data Analytics
has d bpedia resource dp geographic data and information

governanceni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Governance

belongs to
Concern c
has facts
supports op Business Context

Greening of IoTni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Greening_of_IoT

The system energy consumption is expanding at a high rate because of increment in information rates, an increment in quantity of Internet-empowered services and fast development of Internet associated edgedevices. The future IoT will cause a critical increase in the network energy consumption.
belongs to
Concern c
has facts
supports op Energy Control
has wikipedia article dp green computing

HTTP/1.1ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RFC_2616

The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. It is a generic, stateless, protocol which can be used for many tasks beyond its use for hypertext, such as name servers and distributed object management systems, through extension of its request methods, error codes and headers. A feature of HTTP is the typing and negotiation of data representation, allowing systems to be built independently of the data being transferred.
belongs to
document c
Publication
Standard c
has facts
maker op i e t f
has Classification op IDS RAM System Layer
has Classification op IIRA Functional Viewpoint
has Classification op RAMI Communication Layer
has Classification op tansport layer
has Publisher op i e t f
has official resource dp rfc2817
has official resource dp rfc2616

HTTP/2ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RFC_7540

This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection. It also introduces unsolicited push of representations from servers to clients. This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax. HTTP's existing semantics remain unchanged.
belongs to
document c
Publication
Standard c
has facts
maker op i e t f
has Classification op IDS Interoperability
has Classification op IDS RAM System Layer
has Classification op IIRA Functional Viewpoint
has Classification op RAMI Communication Layer
has Classification op tansport layer
has Publisher op i e t f

HTTPSni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RFC_2818

This memo describes how to use TLS to secure HTTP connections over the Internet. Current practice is to layer HTTP over SSL (the predecessor to TLS), distinguishing secured traffic from insecure traffic by the use of a different server port. This document documents that practice using TLS. A companion document describes a method for using HTTP/TLS over the same port as normal HTTP [RFC2817].
belongs to
document c
Publication
Standard c
has facts
maker op i e t f
has Classification op IDS RAM Security Perspective
has Classification op IDS RAM System Layer
has Publisher op i e t f

i d s r a m business layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IDSRAMBusinessLayerAnno

belongs to
oa annotation c

i d s r a m certification annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IDSRAMCertificationAnno

belongs to
oa annotation c

i d s r a m functional layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IDSRAMFunctionalLayerAnno

belongs to
oa annotation c

i d s r a m governance annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IDSRAMGovernanceAnno

belongs to
oa annotation c

i d s r a m information layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IDSRAMInformationLayerAnno

belongs to
oa annotation c

i d s r a m layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IDSRAMLayerAnno

belongs to
oa annotation c

i d s r a m process layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IDSRAMProcessLayerAnno

belongs to
oa annotation c

i d s r a m security annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IDSRAMSecurityAnno

belongs to
oa annotation c

i d s r a m system layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IDSRAMSystemLayerAnno

belongs to
oa annotation c

i d4meni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ID4me

belongs to
Technical Specification c
has facts
has Target Concern op Identification
has Target Concern op Identity Management

i e c 29115ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IEC_29115

belongs to
Standard c
has facts
has Classification op IIRA Security
has Target Concern op Authentication
has Target Concern op Identification

i e c 61508ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IEC_61508

belongs to
Standard c
has facts
has Classification op IDS RAM Certification Perspective
has Classification op Safety
has Target Concern op Safety

i e c 61511ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IEC_61511

belongs to
Standard c
has facts
has Classification op IDS RAM Certification Perspective
has Target Concern op Safety

i e c 61804 p3ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IEC_61804_P3

belongs to
Standard c
has facts
frames op Thing description

i e c 61804 p4ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IEC_61804_P4

belongs to
Standard c
has facts
frames op Thing description

i e c 61804 p5ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IEC_61804_P5

belongs to
Standard c
has facts
frames op Thing description

i e c 61804 p6ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IEC_61804_P6

belongs to
Technical Report c
has facts
frames op Thing description

i e c 62264 p6ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IEC_62264_P6

belongs to
Standard c
has facts
frames op communication

i i c f framework layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IICFFrameworkLayerAnno

belongs to
oa annotation c

i i c f link layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IICFLinkLayerAnno

belongs to
oa annotation c

i i c f network layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IICFNetworkLayerAnno

belongs to
oa annotation c

i i c f physical layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IICFPhysicalLayerAnno

belongs to
oa annotation c

i i c f tansport layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IICFTansportLayerAnno

belongs to
oa annotation c

i i r a application domain annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRAApplicationDomainAnno

belongs to
oa annotation c

i i r a business domain annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRABusinessDomainAnno

belongs to
oa annotation c

i i r a business viewpoint annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRABusinessViewpointAnno

belongs to
oa annotation c

i i r a connectivity annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRAConnectivityAnno

belongs to
oa annotation c

i i r a control domain annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRAControlDomainAnno

belongs to
oa annotation c

i i r a crosscutting function annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRACrosscuttingFunctionAnno

belongs to
oa annotation c

i i r a functional viewpoint annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRAFunctionalViewpointAnno

belongs to
oa annotation c

i i r a implementation viewpoint annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRAImplementationViewpointAnno

belongs to
oa annotation c

i i r a industrial analyticsni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRAIndustrialAnalytics

belongs to
IIRA Crosscutting Function c
Standard Classification c
has facts
is Described in op Industrial Internet Reference Architecture

i i r a information domain annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRAInformationDomainAnno

belongs to
oa annotation c

i i r a operations domain annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRAOperationsDomainAnno

belongs to
oa annotation c

i i r a reliability annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRAReliabilityAnno

belongs to
oa annotation c

i i r a resilience annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRAResilienceAnno

belongs to
oa annotation c

i i r a safety annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRASafetyAnno

belongs to
oa annotation c

i i r a security annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRASecurityAnno

belongs to
oa annotation c

i i r a security framework annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRASecurityFrameworkAnno

belongs to
oa annotation c

i i r a usage viewpoint annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRAUsageViewpointAnno

belongs to
oa annotation c

i s o 13485ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ISO_13485

belongs to
Standard c
has facts
has Target Concern op Quality of Service

i s o 13849ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ISO_13849

belongs to
Standard c
has facts
has Classification op IDS RAM Certification Perspective
has Classification op IIRA Security
has Target Concern op Safety

i s o 19941ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ISO_19941

belongs to
Standard c
has facts
has Target Concern op Cloud Computing Capability

i s o 20140 p1ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ISO_20140_P1

belongs to
Standard c
has facts
frames op Energy Efficiency

Identificationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Identification

The concern how to identify a participant (client, endpoint etc.) in the internet.
belongs to
Concern c
Standard Classification c
has facts
associated with op identification
associated with op i e c 24760
associated with op i e c 62443
associated with op i s o 24760
alignes With op identification
alignes With op i e c 24760
alignes With op i e c 62443
alignes With op i s o 24760
supports op Identity Management
has d bpedia resource dp identification (information)

Identity Managementni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IdentityManagement

In computer security, identity and access management (IAM) is the security and business discipline that "enables the right individuals to access the right resources at the right times and for the right reasons".It addresses the need to ensure appropriate access to resources across increasingly heterogeneous technology environments and to meet increasingly rigorous compliance requirements. (source: wikipedia)
belongs to
Concern c
has facts
supports op Non-repudiation
has d bpedia resource dp identity management

IDS Data Marketni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IDSRAMDataMarket

belongs to
Standard Classification c
has facts
is Described in op IDS RAM

IDS Interoperabilityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IDSRAMInteroperability

belongs to
Standard Classification c
has facts
is Described in op IDS RAM

IDS RAMni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IDSRAMReferenceArchitectureModel

belongs to
Architecture Description c
Standarization Framework c
has facts
associated with op IIRA Functional Viewpoint
has Publisher op IDSA
alignes With op IIRA Functional Viewpoint

IDS RAM Certification Perspectiveni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IDSRAMCertification

belongs to
IDS RAM Perspective c
Standard Classification c
has facts
is Described in op IDS RAM
frames op Certification
frames op Safety
frames op Security

IDS RAM Functional Layerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IDSRAMFunctionalLayer

belongs to
IDS RAM Layer c
Standard Classification c
has facts
associated with op Data Sovereignty
associated with op Interoperability
is Described in op IDS RAM

IDS RAM Governance Perspectiveni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IDSRAMGovernance

belongs to
IDS RAM Perspective c
Standard Classification c
has facts
associated with op DTP Ecosystem
associated with op DTP Security & Privacy
associated with op IICF Framework Layer
associated with op RAMI Business Layer
is Described in op IDS RAM
alignes With op DTP Ecosystem
alignes With op DTP Security & Privacy
alignes With op IICF Framework Layer
alignes With op RAMI Business Layer
frames op Compliance
frames op Trustworthiness

IDS RAM Information Layerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IDSRAMInformationLayer

belongs to
IDS RAM Layer c
Standard Classification c
has facts
associated with op BDVA Data Management
associated with op information domain
associated with op IoT-A Information Viewpoint
associated with op NGSI-LD Data Representation
associated with op NGSI-LD Information Model
associated with op RAMI Information Layer
associated with op vocabulary
is Described in op IDS RAM
alignes With op BDVA Data Management
alignes With op information domain
alignes With op IoT-A Information Viewpoint
alignes With op NGSI-LD Data Representation
alignes With op NGSI-LD Information Model
alignes With op RAMI Information Layer
alignes With op vocabulary

IDS RAM Process Layerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IDSRAMProcessLayer

belongs to
IDS RAM Layer c
Standard Classification c
has facts
associated with op BDVA Data Analytics
associated with op BDVA Data Management
associated with op BDVA Data Processing Architectures
associated with op DTP Deployment
associated with op FIWARE Applications Services and Data Delivery
associated with op IIRA Application Domain
associated with op IIRA Operation Domain
associated with op information domain
associated with op FIWARE Interface to Networks and Devices
associated with op IoT-A Functional Viewpoint
associated with op IoT-A Information Viewpoint
associated with op NGSI-LD API Operation
associated with op Ocean Protocol System Viewpoint
associated with op RAMI Functional Layer
associated with op x-road Protocols and Interfaces
associated with op x-road System Components
is Described in op IDS RAM
alignes With op BDVA Data Analytics
alignes With op BDVA Data Management
alignes With op BDVA Data Processing Architectures
alignes With op DTP Deployment
alignes With op FIWARE Applications Services and Data Delivery
alignes With op IIRA Application Domain
alignes With op IIRA Operation Domain
alignes With op information domain
alignes With op FIWARE Interface to Networks and Devices
alignes With op IoT-A Functional Viewpoint
alignes With op IoT-A Information Viewpoint
alignes With op NGSI-LD API Operation
alignes With op Ocean Protocol System Viewpoint
alignes With op RAMI Functional Layer
alignes With op x-road Protocols and Interfaces
alignes With op x-road System Components
frames op Service Choreography
frames op Service Composition
frames op Service Orchestration

IDS RAM Security Perspectiveni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IDSRAMSecurity

The IDS Security Architecture provides means to identify participants, protect communication and data exchange transactions between them, and control the use of data after it has been sent.
belongs to
IDS RAM Perspective c
Standard Classification c
has facts
associated with op BDVA Cybersecurity and Trust
associated with op BDVA Data Protection
associated with op FIWARE Security
associated with op IIRA Security
associated with op IIC Security Framework
associated with op IoT-A Functional Viewpoint
associated with op IoT-A Trust Security and Privacy
associated with op r a m i
is Described in op IDS RAM
alignes With op BDVA Cybersecurity and Trust
alignes With op BDVA Data Protection
alignes With op FIWARE Security
alignes With op IIRA Security
alignes With op IIC Security Framework
alignes With op IoT-A Functional Viewpoint
alignes With op IoT-A Trust Security and Privacy
alignes With op OCF Security
frames op Authentication
frames op authorization
frames op communication
frames op Data Access Control
frames op Data Sovereignty
frames op Data Usage Control
frames op Identification
frames op Identity Management
frames op Privacy
frames op Secure Communication
frames op Security
frames op Service Isolation
frames op Trustworthiness

IDS RAM System Layerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IDSRAMSystemLayer

belongs to
IDS RAM Layer c
Standard Classification c
has facts
associated with op DTP System
associated with op Edgecross Edgecomputing Layer
associated with op Edgecross IT Systems Layer
associated with op FIWARE Architecture
associated with op FIWARE Cloud Hosting
associated with op FIWARE IoT Services Enablement
associated with op IICF Framework Layer
associated with op IIRA Control Domain
associated with op IIRA Implementation Viewpoint
associated with op IIRA Physical Systems
associated with op FIWARE Interface to Networks and Devices
associated with op IoT-A Deployment and Operation
associated with op NGSI-LD API Operation
associated with op NGSI-LD Architecture
associated with op RAMI Communication Layer
associated with op RAMI Integration Layer
associated with op x-road Deplyoment View
is Described in op IDS RAM
alignes With op DTP System
alignes With op Edgecross Edgecomputing Layer
alignes With op Edgecross IT Systems Layer
alignes With op FIWARE Architecture
alignes With op FIWARE Cloud Hosting
alignes With op FIWARE IoT Services Enablement
alignes With op IICF Framework Layer
alignes With op IIRA Control Domain
alignes With op IIRA Physical Systems
alignes With op FIWARE Interface to Networks and Devices
alignes With op IoT-A Deployment and Operation
alignes With op NGSI-LD API Operation
alignes With op NGSI-LD Architecture
alignes With op RAMI Communication Layer
alignes With op RAMI Integration Layer
alignes With op x-road Deplyoment View

IDS REFERENCE ARCHITECTURE MODEL INDUSTRIAL DATA SPACE VERSION 2.0ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IDS_REFERENCE_ARCHITECTURE_MODEL_INDUSTRIAL_DATA_SPACE_VERSION_2_0

belongs to
oa specific resource c

IDS Trusted Connectorni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#TrustedConnector

The advent of the Industrial Internet of Things (IIoT) also raises challenges with respect to security and privacy of sensitive and personal data that is created by sensors and processed by services hosted in different administrative domains. The Industrial Data Space initiative addresses these challenges and proposes a secure edge gateway platform named "Trusted Connector". In this report, we introduce the main security building blocks of the Trusted Connector and point out how they help protecting business-critical data and preserving the user's privacy.
belongs to
Technology c
has facts
associated with op d i n s p e c 27070
associated with op IDS RAM
alignes With op d i n s p e c 27070
has official resource dp 1804.09442

IDSAni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IDSA

IDSA ensures that the special economic interests of business are specifically integrated into the research work of Industrial Date Space.
belongs to
organization c
i io t consortium c
has facts
has official resource dp https://www.internationaldataspaces.org/en/
has wikipedia article dp industrial data space association

IICni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIC

Founded in 2014 to further development, adoption and wide-spread use of interconnected machines, intelligent analytics and people at work. (source: https://www.postscapes.com/internet-of-things-protocols/)
belongs to
organization c
i io t consortium c
StandardOrganization c
has facts
associated with op Industrial Internet Reference Architecture
has official resource dp www-iiconsortium-org:

IIC Security Frameworkni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRASecurityFramework

belongs to
Standard Classification c
has facts
associated with op BDVA Cybersecurity and Trust
associated with op BDVA Data Protection
associated with op IDS RAM Security Perspective
associated with op x-road System Components
alignes With op BDVA Cybersecurity and Trust
alignes With op BDVA Data Protection
alignes With op IDS RAM Security Perspective
alignes With op x-road System Components
has official resource dp i i s f.htm

IIC Vocabularyni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IICVocabulary

belongs to
document c
Publication
Standard Classification c
has facts
associated with op IDS RAM Information Layer
maker op IIC
has Publisher op IIC
is Described in op Industrial Internet Reference Architecture
alignes With op IDS RAM Information Layer

IICFni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IICF

Is defined by
https://www.iiconsortium.org/IICF.htm
belongs to
document c
Publication
has facts
has Classification op IIRA Connectivity

IICFni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRC

Industrial Internet Connectivity Framework
Is defined by
https://www.iiconsortium.org/IICF.htm
belongs to
Standarization Framework c

iicf connectivity layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IicfConnectivityLayerAnno

belongs to
oa annotation c

IICF Link Layerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IICFLinkLayer

belongs to
Connectivity Layer c
Standard Classification c
has facts
associated with op i e e e 802
associated with op i e e e 802 16 2012
associated with op wi fi
frames op communication

IICF Network Layerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IICFNetworkLayer

belongs to
Connectivity Layer c
Standard Classification c
has facts
associated with op IPv6
frames op communication
frames op IPv4 Support
frames op IPv6 Support
frames op Interoperability
frames op Syntactic Interoperability

IICF Physical Layerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IICFPhysicalLayer

belongs to
Connectivity Layer c
Standard Classification c
has facts
associated with op i e e e 802
associated with op i e e e 802 16 2012
frames op communication

IICF Transport Layerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IICFTansportLayer

belongs to
Connectivity Layer c
Standard Classification c
has facts
associated with op h t t p
associated with op h t t p2
associated with op i e c 61158
associated with op i s o 20922
associated with op HTTP/1.1
associated with op RFC 793
associated with op CoAP
associated with op u d p
frames op cardinality of data sources
frames op Cardinality of Participants
frames op communication
frames op Endpoint Invocation
frames op Interoperability
frames op Multilateralism
frames op Secure Communication
frames op Security
frames op Service Composition
frames op Syntactic Interoperability
frames op Time Synchronization
frames op Trustworthiness
frames op Unicast

IIRA Business Domainni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRABusinessDomain

belongs to
IIRA Functional Domain c
Standard Classification c
has facts
associated with op IDS RAM Business Layer
associated with op Ocean Protocol System Viewpoint
associated with op RAMI Business Layer
is Described in op Industrial Internet Reference Architecture
alignes With op IDS RAM Business Layer
alignes With op Ocean Protocol System Viewpoint
alignes With op RAMI Business Layer
frames op process planning

IIRA Business Viewpointni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRABusinessViewpoint

The business viewpoint frames economic aspects and business relations regarded by the IIC Reference Architecture.
belongs to
Standard Classification c
Viewpoint c
has facts
associated with op IVI Business Layer
associated with op Ocean Protocol Business Viewpoint
associated with op Ocean Protocol Marketplace Viewpoint
is Described in op Industrial Internet Reference Architecture
alignes With op IVI Business Layer
alignes With op Ocean Protocol Business Viewpoint
alignes With op Ocean Protocol Marketplace Viewpoint
frames op Business Context
frames op Business Value
frames op Maintenance Cost
frames op Product Liability
frames op Resilience
frames op Return On Investment
frames op Safety
frames op Security
frames op Trustworthiness

IIRA Connectivityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRAConnectivity

belongs to
IIRA Crosscutting Function c
Standard Classification c
has facts
associated with op BDVA Data Processing Architectures
associated with op Decision maker
associated with op DTP System
associated with op FIWARE Applications Services and Data Delivery
associated with op i e c 62541
associated with op IICF
associated with op IoT-A Evolution and Interoperability
associated with op link layer
associated with op NGSI-LD API Operation
associated with op RAMI Communication Layer
associated with op REST
associated with op one m2 m
associated with op q1548249
is Described in op Industrial Internet Reference Architecture
alignes With op BDVA Data Processing Architectures
alignes With op DTP System
alignes With op FIWARE Applications Services and Data Delivery
alignes With op IoT-A Evolution and Interoperability
alignes With op NGSI-LD API Operation
alignes With op RAMI Communication Layer
frames op Authentication
frames op cardinality of data sources
frames op Cardinality of Participants
frames op communication
frames op Data Access
frames op Data Discovery
frames op Dynamic Adjustability
frames op Endpoint Invocation
frames op Evolvability
frames op governance
frames op IPv4 Support
frames op IPv6 Support
frames op Identification
frames op Identity Management
frames op Integrity Protection and Verification
frames op Interoperability
frames op Multilateralism
frames op Network performance
frames op Quality of Service
frames op Reliability
frames op Resilience
frames op Safety
frames op Scalability
frames op Secure Communication
frames op Security
frames op Semantic Interoperability
frames op Service Choreography
frames op Service Composition
frames op Service Deployment
frames op Service Description
frames op Service Discovery
frames op Service life-cycle management
frames op Service Orchestration
frames op Syntactic Interoperability
frames op Time Synchronization
frames op Trustworthiness
frames op Unicast

IIRA Distributed Data Managementni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRADistributedDataManagement

belongs to
IIRA Crosscutting Function c
Standard Classification c
has facts
associated with op FIWARE Cloud Hosting
associated with op RAMI Communication Layer
is Described in op Industrial Internet Reference Architecture
alignes With op FIWARE Cloud Hosting
alignes With op RAMI Communication Layer
frames op Interoperability
frames op Semantic Interoperability

IIRA Functional Viewpointni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRAFunctionalViewpoint

The IIRA Functional Viewpoint contains the IIRA Domains in order to describe technical relations and communications between the several dimensions of IoT devices.
belongs to
Standard Classification c
Viewpoint c
has facts
associated with op IDS RAM
associated with op IoT-A Functional Viewpoint
associated with op Ocean Protocol System Viewpoint
is Described in op Industrial Internet Reference Architecture
alignes With op IDS RAM
alignes With op IoT-A Functional Viewpoint
alignes With op Ocean Protocol System Viewpoint
frames op process planning
frames op Access Policy
frames op Actuation
frames op Authentication
frames op authorization
frames op Availability
frames op bdva data viualisation and user interaction
frames op cardinality of data sources
frames op Cardinality of Participants
frames op Cloud Computing Capability
frames op communication
frames op Data Access
frames op Data Access Control
frames op Data Analytics
frames op Data at rest
frames op Data Discovery
frames op data in motion
frames op Data Processing
frames op Data Protection
frames op Data Sovereignty
frames op Dynamic Adjustability
frames op Endpoint Invocation
frames op Evolvability
frames op governance
frames op IPv4 Support
frames op IPv6 Support
frames op Identification
frames op Identity Management
frames op Integrity Protection and Verification
frames op Interoperability
frames op IoT
frames op Multilateralism
frames op Network performance
frames op Privacy
frames op Quality of Service
frames op Real Time Analytics
frames op Reliability
frames op Resilience
frames op Safety
frames op Scalability
frames op Secure Communication
frames op Security
frames op Security Configuration
frames op Semantic Interoperability
frames op Sensing
frames op Service Access Control
frames op Service Choreography
frames op Service Composition
frames op Service Deployment
frames op Service Description
frames op Service Discovery
frames op Service Isolation
frames op Service level agreement
frames op Service life-cycle management
frames op Service Orchestration
frames op Stream processing
frames op Syntactic Interoperability
frames op Time Synchronization
frames op Trustworthiness
frames op Unicast

IIRA Implementation Viewpointni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRAImplementationViewpoint

belongs to
Standard Classification c
Viewpoint c
has facts
associated with op control domain
associated with op DTP Deployment
associated with op FIWARE Architecture
associated with op IDS RAM System Layer
associated with op IIRA Application Domain
associated with op IIRA Business Domain
associated with op IIRA Operation Domain
associated with op information domain
associated with op IoT-A Deployment and Operation
associated with op NGSI-LD Architecture
associated with op x-road Deplyoment View
is Described in op Industrial Internet Reference Architecture
alignes With op DTP Deployment
alignes With op FIWARE Architecture
alignes With op IoT-A Deployment and Operation
alignes With op NGSI-LD Architecture
alignes With op x-road Deplyoment View
frames op Cloud Computing Capability
frames op communication
frames op Data Processing
frames op Edge computing
frames op Endpoint Description
frames op Interoperability
frames op Semantic Interoperability

IIRA Intelligent and Resilient Controlni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRAIntelligentAndResilientControl

There is a renewed movement to distribute computational capability toward the network peripheries, away from concentrated computation centers, to benefit from a reduction in movement of data and communication latency, and enhancement in local intelligent control and, more importantly, resilience. source: Industrial Internet Reference Archietcture
belongs to
IIRA Crosscutting Function c
Standard Classification c
has facts
is Described in op Industrial Internet Reference Architecture

IIRA Physical Systemsni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRAPhysicalSystems

Computational capabilities ranging from very limited (e.g. in a smart sensor) to reasonably rich (e.g. a cluster of servers) are placed in, attached to or collocated with physical systems (e.g. in smart sensors, devices or machines). These capabilities are connected through a variety of connectivity technologies including wireless.
belongs to
Standard Classification c
has facts
associated with op Edgecross FA
associated with op IDS RAM System Layer
associated with op IVI Asset View
associated with op RAMI Asset Layer
is Described in op Industrial Internet Reference Architecture
alignes With op Edgecross FA
alignes With op IDS RAM System Layer
alignes With op IVI Asset View
alignes With op RAMI Asset Layer
has official resource dp i i r a.htm

IIRA Reliabilityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRAReliability

belongs to
IIRA System Characteristic c
Standard Classification c
has facts
is Described in op Industrial Internet Reference Architecture
frames op Reliability
frames op Trustworthiness

IIRA Resilienceni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRAResilience

belongs to
IIRA System Characteristic c
Standard Classification c
has facts
is Described in op Industrial Internet Reference Architecture

IIRA Safetyni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRASafety

belongs to
IIRA System Characteristic c
Standard Classification c
has facts
is Described in op Industrial Internet Reference Architecture

IIRA Scalabilityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRAScalability

belongs to
IIRA System Characteristic c
Standard Classification c
has facts
associated with op FIWARE Cloud Hosting
is Described in op Industrial Internet Reference Architecture
alignes With op FIWARE Cloud Hosting
frames op Scalability

IIRA Usage Viewpointni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRAUsageViewpoint

belongs to
Standard Classification c
Viewpoint c
has facts
associated with op bdva data viualisation and user interaction
associated with op DTP Ecosystem
associated with op FIWARE Advanced Web-based User Interface
associated with op IVI Management View
is Described in op Industrial Internet Reference Architecture
alignes With op bdva data viualisation and user interaction
alignes With op DTP Ecosystem
alignes With op FIWARE Advanced Web-based User Interface
alignes With op IVI Management View
frames op process planning
frames op Dynamic Adjustability
frames op Evolvability
frames op Role Categorization
frames op Service Choreography
frames op Service Composition
frames op Service Deployment
frames op Service life-cycle management
frames op Service Orchestration

industrial data spaceni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IndustrialDataSpace

belongs to
Standarization Framework c

Industrial Internet Architecture Version 1ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Industrial_Internet_Architecture_Version_1

belongs to
oa specific resource c

Industrial Internet Architecture Version 1ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#The_Industrial_Internet_of_Things_Volume_G1_Reference_Architecture

belongs to
oa specific resource c

Industrial Internet of Things Volume G4: Security Frameworkni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Industrial_Internet_of_Things_Volume_G4_Security_Framework

belongs to
oa specific resource c

Industrial Internet Reference Architectureni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIRA

The IIRA addresses the need for a common architecture framework to develop interoperable IIoT systems for diverse applications across a broad spectrum of industrial verticals in the public and private sectors to achieve the true promise of IIoT.
belongs to
Architecture Description c
Standarization Framework c
has facts
has Publisher op IIC
has official resource dp i i r a.htm
has Target Concern op end user
has Target Concern op Business Value
has Target Concern op Decision maker
has Target Concern op developer
has Target Concern op Maintenance Cost
has Target Concern op Product Liability
has Target Concern op Product Manager
has Target Concern op Return On Investment
has Target Concern op System Engineer
has Target Concern op system operator
has Target Concern op q1548249

Industrial Value Chain Reference Architectureni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IVRA

The Reference Architecture (IVRA) of the Industrial Value Chain Initive (IVI) proposes a system architecture for the manufactoring domain targeting interoperability and communicational aspects.
belongs to
Architecture Description c
Standarization Framework c
has facts
associated with op IVI
has official resource dp doc 161208 industrial value chain reference architecture.pdf

Industrial Value Chain Reference Architecture (IVRA)ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Industrial_Value_Chain_Reference_Architecture_IVRA

Industrial Value Chain Reference Architecture (IVRA) Industrial Value Chain Initiative
belongs to
oa specific resource c

Industrial Value Chain Reference Architecture (IVRA)- Nextni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Industrial_Value_Chain_Reference_Architecture_IVRA_Next

belongs to
oa specific resource c

Information Privacyni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Information_Privacy

The IoT utilizes different sort of object distinguishing proof advancements, e.g., RFID, 2D-standardized tags and so forth. Since each kind of day by day use articles will convey these recognizable proof labels and insert the particular object data, it is important to take legal protection measures and prevent unauthorized access.
belongs to
Concern c
has facts
supports op Privacy
has wikipedia article dp information privacy

Information Securityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#InformationSecurity

belongs to
Concern c
has facts
supports op Security

Integrity Protection and Verificationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IntegrityProtection

In telecommunications, the term system integrity has the following meanings: 1. * That condition of a system wherein its mandated operational and technical parameters are within the prescribed limits. 2. * The quality of an AIS when it performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system. 3. * The state that exists when there is complete assurance that under all conditions an IT system is based on the logical correctness and reliability of the operating system, the logical completeness of the hardware and software that implement the protection mechanisms, and data integrity. (source: wikipedia)
belongs to
Concern c
has facts
supports op Device Security
has d bpedia resource dp system integrity

interface networks devices annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#InterfaceNetworksDevicesAnno

belongs to
oa annotation c

Interoperabilityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Interoperability

A systems ability to connect with other systems.
belongs to
Concern c
has facts
has d bpedia resource dp interoperability

Introduction of X-teeni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#introductionXtee

It is a guide intended for those who want to acquaint themselves more thoroughly with the X-tee (e.g. theose who are working for an organisation which will soon join the X-tee). It introduces the X-tee’s complex terminological system slowly and in a comprehensible way, so that the reader can painlessly achieve the preliminary familiarity with the X-tee necessary to engage with more explicitly technical and complex manuals. (source: https://www.ria.ee/en/state-information-system/x-tee/introduction-x-tee.html)
belongs to
document c
Publication
Technical Report c
has facts
maker op estonian information system authority
has Classification op x-road Deplyoment View
has Classification op x-road Protocols and Interfaces
has Classification op x-road System Components
has Classification op x-road Technology Matrix
has Publisher op estonian information system authority
has official resource dp introduction x tee.html

IoTni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IoT

The internet of things (IoT) is the internetworking of physical devices, vehicles (also referred to as "connected devices" and "smart devices"), buildings and other items—embedded with electronics, software, sensors, actuators, and network connectivity that enable these objects to collect and exchange data. (source: wikipedia)
belongs to
Concern c
has facts
has d bpedia resource dp internet of things

IoT-Ani back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IoTA

After much discussion about the core concepts of the IoT for several years, in 2009 a group of researchers from more than 20 large industrial companies and research institutions joined forces to lay the foundation for the much needed common ground or a common “architecture” for the Internet of Things: the IoTArchitecture project (IoT-A) was born. IoT-A has become the European Commission’s flagship project in the European Union’s Seventh Framework Program for Research and Development with respect to establishing an architecture for the Internet of Things.
belongs to
organization c
i io t consortium c
has facts
associated with op IoT-A Reference Architecture

IoT-A Availability and Resilienceni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IotaAvailabilityResilience

belongs to
IoT-A Perspective c
Standard Classification c
has facts
associated with op Security
is Described in op IoT-A Reference Architecture
alignes With op Security
frames op Availability
frames op Resilience
frames op Security
frames op Trustworthiness

IoT-A Information Viewpointni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IotaInformationViewpoint

One of the main purposes of connected and smart objects in the IoT is the exchange of information between each other and also with external systems. Therefore the way how to define, structure, store, process, manage and exchange information is very important. The information view helps to generate an overview about static information structure and dynamic information flow. (source: Bassi et al.: Enabling Things to Talk)
belongs to
Standard Classification c
Viewpoint c
has facts
associated with op IDS RAM Information Layer
associated with op IDS RAM Process Layer
associated with op IIRA Control Domain
associated with op IIRA Operation Domain
associated with op information domain
associated with op RAMI Communication Layer
is Described in op IoT-A Reference Architecture
alignes With op IDS RAM Information Layer
alignes With op IDS RAM Process Layer
alignes With op IIRA Control Domain
alignes With op IIRA Operation Domain
alignes With op information domain
alignes With op RAMI Communication Layer
frames op communication
frames op Data Analytics
frames op Data at rest
frames op data in motion
frames op Data lifecycle management
frames op Endpoint Invocation
frames op Interoperability
frames op Semantic Interoperability
frames op Service Description
frames op Syntactic Interoperability
frames op Thing representation
frames op Virtual Entity
has official resource dp 978 3 642 40403 0

IoT-A Reference Architectureni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IotaReferenceArchitecture

belongs to
Architecture Description c
Standarization Framework c
has facts
has Publisher op IoT-A

IoT-A Trust Security and Privacyni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IotaTrustSecurityPrivacy

belongs to
IoT-A Perspective c
Standard Classification c
has facts
associated with op IDS RAM Security Perspective
associated with op IIRA Security
is Described in op IoT-A Reference Architecture
alignes With op IDS RAM Security Perspective
alignes With op Security
frames op Data Sovereignty
frames op Privacy
frames op Security
frames op Trustworthiness

iota availability resilience annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IotaAvailabilityResilienceAnno

belongs to
oa annotation c

iota deployment operation viewpoint annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IotaDeploymentOperationViewpointAnno

belongs to
oa annotation c

iota evolution interoperability annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IotaEvolutionInteroperabilityAnno

belongs to
oa annotation c

iota functional viewpoint annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IotaFunctionalViewpointAnno

belongs to
oa annotation c

iota information viewpoint annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IotaInformationViewpointAnno

belongs to
oa annotation c

iota performance scalability annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IotaPerformanceScalabilityAnno

belongs to
oa annotation c

iota perspective annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IotaPerspectiveAnno

belongs to
oa annotation c

iota reference architecture annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IotaReferenceArchitectureAnno

belongs to
oa annotation c

iota trust security privacy annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IotaTrustSecurityPrivacyAnno

belongs to
oa annotation c

IoTivityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IoTivity

IoTivity is an open source project hosted by the Linux Foundation, and sponsored by the OIC. (source: https://www.postscapes.com/internet-of-things-protocols/)
belongs to
document c
Publication
Technical Specification c
has facts
has official resource dp https://www.iotivity.org/

IPSOni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IPSO

The Alliance is a global non-profit organization serving the various communities seeking to establish the Internet Protocol as the network for the connection of Smart Objects by providing coordinated marketing efforts available to the general public. (source: https://www.postscapes.com/internet-of-things-protocols/)
belongs to
organization c
i io t consortium c
has facts
has official resource dp http://www.ipso-alliance.org/

IPSO App Frameworkni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IpsoAppFramework

IPSO Application Framework (PDF): This design defines sets of REST interfaces that may be used by a smart object to represent its available resources, interact with other smart objects and backend services. This framework is designed to be complementary to existing Web profiles including SEP2 and oBIX. (source: https://www.postscapes.com/internet-of-things-protocols/)
belongs to
document c
Publication
Technical Specification c
has facts
has official resource dp draft ipso app framework 04.pdf

IPv4 Supportni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IPv4Support

Communication with non-IPv6 networks must be possible (IPv4, others).
belongs to
Concern c
has facts
supports op Syntactic Interoperability
has d bpedia resource dp internet protocol

IPv6ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IPv6

IPv6, is an Internet Layer protocol for packet-switched internetworking and provides end-to-end datagram transmission across multiple IP networks. (source: https://www.postscapes.com/internet-of-things-protocols/)
belongs to
document c
Publication
Technical Specification c
has facts
has wikipedia article dp i pv6
has Target Concern op Syntactic Interoperability

IPv6 Supportni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IPv6Support

A system built using the ARM shall use/support common-addressing-schemes such as IPv6.
belongs to
Concern c
has facts
supports op Syntactic Interoperability
has d bpedia resource dp internet protocol

iShareni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#iShare

iSHARE is a uniform set of agreements or a scheme for identification, authentication and authorization. All companies that join the iSHARE Scheme comply with the set of agreements. They all use the same methods to both provide and gain access to data. (source: iShare: 'It is not a platform…')
belongs to
organization c
has facts
associated with op h t t p
associated with op ISO/IEC 9594
associated with op REST
associated with op RFC 5246
associated with op JSON Web Token
associated with op x a c m l
has official resource dp https://www.ishareworks.org/
has Target Concern op Identification
has Target Concern op Interoperability

ISO 50001ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ISO_50001

belongs to
Standard c
has facts
has Target Concern op energy management

ISO 9000ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ISO_9000

belongs to
Standard c
has facts
has Classification op cross level
has Classification op IDS RAM Certification Perspective
has Target Concern op Quality of Service

ISO/IEC 29115ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ISO_29115

belongs to
Standard c
has facts
has Target Concern op Authentication
has Target Concern op Identification

ISO/IEC 9594-8ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ISO_9594-8

belongs to
Standard c
has facts
has Classification op Data Sovereignty
has Classification op IDS RAM Certification Perspective
has Classification op IDS RAM Security Perspective

Isolationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ProcessIsolation

"Isolation would be another issue at the edge of the network. In mobile OS, if an application fails or crashes, the whole system will usually crash and reboot. Or in a distributed system the shared resource could be managed with different synchronization mechanisms such as a lock or token ring. "
belongs to
Concern c
has facts
supports op Integrity Protection and Verification
has wikipedia article dp process isolation

IVIni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Ivi

The Industrial Value Chain Initiative (IVI) is a forum to design a new society by combining manufacturing and information technologies, and for all enterprises to take an initiative collaboratively.
belongs to
organization c
i io t consortium c
has facts
has official resource dp https://iv-i.org/

IVI Activity Layerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IviActivityLayer

The activity layer has a view point of activities actually conducted at various places in manufacturers. People and machines acting voluntarily, human activity, machine processes, and information as an object og such activities and processes are brought up for discussion. In every production site of every manufacturer, concrete manufacturing activities are conducted in a different way. (source: IVRA-Next)
belongs to
IVI Layer c
Standard Classification c
has facts
associated with op engineering
associated with op manufacturing
is Described in op Industrial Value Chain Reference Architecture
alignes With op engineering
alignes With op manufacturing
frames op process planning

ivi activity layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IviActivityLayerAnno

belongs to
oa annotation c

IVI Activity Viewni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IviActivityView

belongs to
Standard Classification c
Viewpoint c
has facts
associated with op engineering
associated with op IIRA Operation Domain
is Described in op Industrial Value Chain Reference Architecture
alignes With op engineering
alignes With op IIRA Operation Domain
frames op manufacturing

ivi activity view annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IviActivityViewAnno

belongs to
oa annotation c

IVI Asset Viewni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IviAssetView

belongs to
Standard Classification c
Viewpoint c
has facts
associated with op IIRA Physical Systems
associated with op RAMI Asset Layer
is Described in op Industrial Value Chain Reference Architecture
alignes With op IIRA Physical Systems
alignes With op RAMI Asset Layer
frames op Thing representation

ivi asset view annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IviAssetViewAnno

belongs to
oa annotation c

IVI Business Layerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IviBusinessLayer

In the business layer, from a perspective of enterprise management, the focus of discussions is placed on the fundamentel structure of manufacturing, organization forms for manufacturing, presence of essential perspectives and axes as well as a philosophy and concept of values underpinning the big picture. (source: IVRA-Next)
belongs to
IVI Layer c
Standard Classification c
has facts
associated with op IIRA Business Viewpoint
associated with op RAMI Business Layer
is Described in op Industrial Value Chain Reference Architecture
alignes With op IIRA Business Viewpoint
alignes With op RAMI Business Layer
frames op Business Context
frames op Business Transactions

ivi business layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IviBusinessLayerAnno

belongs to
oa annotation c

ivi management view annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IviManagementViewAnno

belongs to
oa annotation c

IVI Specification Layerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IviSpecificationLayer

In the specification layer, the following will be considered: Specific operations based on human activities and machine processes and the things and information items that are their subjects, as well as the data and their attributes that are the subject of the processes executed by logic in software. (source: IVRA-Next)
belongs to
IVI Layer c
Standard Classification c
has facts
associated with op engineering
associated with op type development
is Described in op Industrial Value Chain Reference Architecture
alignes With op engineering
alignes With op type development
frames op Data Processing

ivi specification layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IviSpecificationLayerAnno

belongs to
oa annotation c

JMSni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#JMS

JMS (Java Message Service) - A Java Message Oriented Middleware (MOM) API for sending messages between two or more clients. (source: https://www.postscapes.com/internet-of-things-protocols/)
belongs to
document c
Publication
Technical Specification c

JSON Web Tokenni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RFC_7519

JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.
belongs to
document c
Publication
Standard c
has facts
maker op i e t f
has Classification op Data Sovereignty
has Classification op IDS RAM Security Perspective
has Publisher op i e t f
has official resource dp rfc7519

Jurisdictional Issuesni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Jurisdictional_Issues

It is often challenging to alter resources, for example, the server or data centres to a particular geographic area. Load balancing service provider of the cloud, the availability of the network, or the performance of the data centre are few factors that determine where the data is stored. Accordingly, an organization data might be stored in a different location with various legal jurisdictions and diverse laws concerning the security issues, such as the protection and interruptions of the data
belongs to
Concern c
has facts
supports op Cloud Computing Capability
has wikipedia article dp jurisdiction

key rockni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#KeyRock

belongs to
document c
Publication
Technical Specification c
has facts
associated with op FIWARE Data/Context Management
associated with op FIWARE Security
has Target Concern op Identity Management

LatencyReductionni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#LatencyReduction

Latency is a time interval between the stimulation and response, or, from a more general point of view, a time delay between the cause and the effect of some physical change in the system being observed.
belongs to
Concern c
has facts
supports op communication
has wikipedia article dp latency (engineering)

LDAPni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RFC_4511

belongs to
document c
Publication
Technical Specification c
has facts
maker op i e t f
has Developer op i e t f
has Publisher op i e t f
has official resource dp rfc4511
has wikipedia article dp lightweight directory access protocol
has Target Concern op Cross-domain Identity Management

Lightweight M2M v1.0ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OMALightweightM2M

The motivation of LightweightM2M is to develop a fast deployable client-server specification to provide machine to machine service.<br> LightweightM2M is principly a device management protocol, but it should be designed to be able to extend to meet the requirements of applications. LightweightM2M is not restricted to device management, it should be able transfer service / application data. (source: https://www.postscapes.com/internet-of-things-protocols/)
belongs to
document c
Publication
Technical Specification c
has facts
has official resource dp lightweight m2 m v1 0.aspx

Local Data Confidentialityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#LocalDataConfidentiality

Describes the means by which local data is protected.
belongs to
Concern c

Loggingni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Logging

The process of recording incidents and events regarding a specific service, data resource or device in order to make status changes transparent.
belongs to
Concern c
has facts
supports op Data Usage Control
supports op Service Access Control
has d bpedia resource dp data logger

Long Term Business Sustainabilityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Long_Term_Business_Sustainability

The provider should not go broke, be financially in a close-fitting corner or close down the business. Organizations should be sure and know how to move your data to another cloud provider. And should know how to have a backup at another public cloud of data for redundancy
belongs to
Concern c
has facts
supports op Business Context
has wikipedia article dp sustainability

low power wi fini back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#LowPowerWiFi

belongs to
document c
Publication
Technical Specification c

Machine Learningni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#MachineLearning

Machine learning is the subfield of computer science that "gives computers the ability to learn without being explicitly programmed" (Arthur Samuel, 1959). Evolved from the study of pattern recognition and computational learning theory in artificial intelligence, machine learning explores the study and construction of algorithms that can learn from and make predictions on data – such algorithms overcome following strictly static program instructions by making data-driven predictions or decisions, through building a model from sample inputs. (source: wikipedia)
belongs to
Concern c
has facts
supports op Artificial Intelligence
has d bpedia resource dp machine learning

Maintenance Costni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#MaintenanceCost

The ability of a system to be maintained.
belongs to
Concern c
has facts
supports op Business Context

Message precedenceni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#MessagePriority

Message precedence is an indicator attached to a message indicating its level of urgency. (source: wikipedia)
belongs to
Concern c
has facts
supports op communication
has d bpedia resource dp message precedence

Mobil Devicesni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#MobilDevices

How to handle the massive mobility of vehicles? In the case of an application scenario that involves connected vehicles, mobility is a major issue and includes data consumer as well as data producer. In this particular case, one of the influencing factors is the potential speed of a vehicle. High-speed mobility may lead to situations in which a request for data or a service may not be answered before the vehicle disconnects and re-connects to another network entry point. This leads to unfulfilled requests and potential duplication of efforts.
belongs to
Concern c
has facts
supports op IoT

Muhammad Usmanni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#MuhammadUsman

belongs to
person c

Multilateralismni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Multilaterism

Data Artefacts are received by 1 to m Data Consumer.
belongs to
Concern c
has facts
supports op cardinality of data sources

Multiple Identitiesni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#MultipleIdentities

Devices must be able to switch between different networks without losing connections (Network handover/handoff support).
belongs to
Concern c
has facts
supports op Identity Management

Network performanceni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#NetworkPerformance

Network performance refers to measures of service quality of a network as seen by the customer. There are many different ways to measure the performance of a network, as each network is different in nature and design. (source: wikidata)
belongs to
Concern c
has facts
supports op communication
supports op Quality of Service
has d bpedia resource dp network performance

network securityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#NetworkSecurity

Data flow is an integral part of any cloud service over the network of computers or clusters of systems using internet. Any intruder can analyze the data packet to detect any weakness in the system and can gain access to applications and data using some kind of remote access mechanism and injection like SQL and some bad command, Denial of Service (DoS), Distributed DoS (DDoS), man in the middle attacks, social networking attacks and some unauthorized attacks are the major entrance level attacks in cloud computing environment.
belongs to
Concern c
has facts
supports op Security
has wikipedia article dp audit
has wikipedia article dp network security

Network Virtualizationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#NetworkVirtualization

The system shall support network virtualisation, i.e. the usage of virtual overlay networks.
belongs to
Concern c
has facts
supports op communication
has wikipedia article dp network virtualization

NGSIni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#NGSI

The FIWARE NGSI (Next Generation Service Interface) API defines - a data model for context information, based on a simple information model using the notion of context entities - a context data interface for exchanging information by means of query, subscription, and update operations - a context availability interface for exchanging information on how to obtain context information (whether to separate the two interfaces is currently under discussion).
belongs to
document c
Publication
Technical Specification c
has facts
maker op FIWARE Architecture
has Publisher op FIWARE Architecture
has official resource dp http://fiware.github.io/specifications/ngsiv2/stable/

NGSI-LD Information Modelni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#NgsiLdInformationModel

The FIWARE data models have been harmonized to enable data portability for different applications including, but not limited, to Smart Cities. They are intended to be used together with FIWARE NGSI version 2. If you want to contribute and create additional data models, please have a look at our repository of data models and the data model development guidelines. (source: https://www.fiware.org/developers/data-models/)
belongs to
NGSI Context Information Management API c
Standard Classification c
has facts
associated with op FIWARE Data/Context Management
associated with op IDS RAM Information Layer
associated with op information domain
associated with op RAMI Information Layer
is Described in op FIWARE Architecture
alignes With op FIWARE Data/Context Management
alignes With op IDS RAM Information Layer
alignes With op information domain
alignes With op RAMI Information Layer
frames op Data Analytics
frames op Data Description
frames op Geospatial data and information
frames op Interoperability
frames op Semantic Interoperability

Non-repudiationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#NonRepudiation

In digital security, non-repudiation means: (a) A service that provides proof of the integrity and origin of data. (b) An authentication that can be said to be genuine with high confidence. The most common method of verifying the digital origin of data is through digital certificates, a form of public key infrastructure that includes digital signatures.
belongs to
Concern c
has facts
supports op Integrity Protection and Verification
has d bpedia resource dp non repudiation
has wikipedia article dp non repudiation

o f r a agility pillar annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRAAgilityPillarAnno

belongs to
oa annotation c

o f r a autonomy pillar annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRAAutonomyPillarAnno

belongs to
oa annotation c

o f r a data analytics and control perspective annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRADataAnalyticsAndControlPerspectiveAnno

belongs to
oa annotation c

o f r a deployment viewpoint annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRADeploymentViewpointAnno

belongs to
oa annotation c

o f r a functional viewpoint annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRAFunctionalViewpointAnno

belongs to
oa annotation c

o f r a hierarchy pillar annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRAHierarchyPillarAnno

belongs to
oa annotation c

o f r a it business and cross fog applications perspective annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRAItBusinessAndCrossFogApplicationsPerspectiveAnno

belongs to
oa annotation c

o f r a manageability perspective annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRAManageabilityPerspectiveAnno

belongs to
oa annotation c

o f r a node view annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRANodeViewAnno

belongs to
oa annotation c

o f r a openness pillar annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRAOpennessPillarAnno

belongs to
oa annotation c

o f r a performance perspective annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRAPerformancePerspectiveAnno

belongs to
oa annotation c

o f r a programmability pillar annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRAProgrammabilityPillarAnno

belongs to
oa annotation c

o f r a r a s pillar annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRA_RASPillarAnno

belongs to
oa annotation c

o f r a scalability pillar annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRAScalabilityPillarAnno

belongs to
oa annotation c

o f r a security perspective annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRASecurityPerspectiveAnno

belongs to
oa annotation c

o f r a security pillar annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRASecurityPillarAnno

belongs to
oa annotation c

o f r a software viewni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRASoftwareView

OpenFog Software Architecture View
belongs to
Viewpoint c
has facts
alignes With op IIRA Application Domain
frames op Service Discovery

o f r a software view annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRASoftwareViewAnno

belongs to
oa annotation c

o f r a system view annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRASystemViewAnno

belongs to
oa annotation c

Objects Safety and Securityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Objects_Safety_and_security

The IoT comprises of a huge number of perception objects that spread over a few geographic zone; it is important to keep the intruder's access to the items that may make physical harm them or may change their operation
belongs to
Concern c
has facts
supports op Safety
supports op Security

ocean business viewpoint annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OceanBusinessViewpointAnno

belongs to
oa annotation c

ocean marketplace viewpoint annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OceanMarketplaceViewpointAnno

belongs to
oa annotation c

Ocean Protocolni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OceanProtocol

Ocean is a decentralized protocol and network of artificial intelligence (AI) data/services. It incentivizes for a vast supply of relevant AI data/services. This network helps to power AI data/service marketplaces, as well as public commons data. The heart of Ocean’s network is a new construction: a Curated Proofs Market. CPMs bridge predicted relevance with actual relevance of each AI service, by having curation markets for cryptographic proofs (e.g. proof of data availability). (source: https://oceanprotocol.com/tech-whitepaper.pdf)
belongs to
document c
Publication
Standarization Framework c
Technical Specification c
has facts
maker op Ocean Protocol Foundation
has Developer op Ocean Protocol Foundation
has Publisher op Ocean Protocol Foundation
has official resource dp oceanprotocol-com:

Ocean Protocol Business Viewpointni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OceanBusinessViewpoint

belongs to
Standard Classification c
Viewpoint c
has facts
associated with op IIRA Business Viewpoint
is Described in op Ocean Protocol
alignes With op IIRA Business Viewpoint
frames op Business Context
frames op Business Transactions
frames op Role Categorization
frames op Trustworthiness

Ocean Protocol Foundationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OceanProtocolFoundation

Ocean Protocol is supported by a Singapore based non-profit foundation, whose mandate is to ensure open access to the protocol and platform, provide data governance, encourage the network ecosystem growth and take measures to ensure that the platform becomes ever more decentralized with time.
belongs to
organization c
StandardOrganization c
has facts
has official resource dp oceanprotocol-com:

Ocean Protocol Marketplace Viewpointni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OceanMarketplaceViewpoint

belongs to
Standard Classification c
Viewpoint c
has facts
associated with op IIRA Business Viewpoint
is Described in op Ocean Protocol
alignes With op IIRA Business Viewpoint
frames op Business Context

Ocean Protocol: A Decentralized Data Exchange Protocol to Unlock Data for Artificial Intelligence. Reference Marketplace Framework. Feb 2019ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Ocean_Protocol_Reference_Marketplace_Framework_Feb_2019

belongs to
oa specific resource c

Ocean Protocol: A Decentralized Data Exchange Protocol,powered by blockchain technology and a cryptotoken. Business Strategy. Oct 2017ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Ocean_Protocol_Business_Strategy_Oct_2017

belongs to
oa specific resource c

Ocean Protocol: A Decentralized Substrate for AI Data & Services . Technical Whitepaper. Apr 2019ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Ocean_Protocol_Technical_Whitepaper_Apr_2019

belongs to
oa specific resource c

ocean system viewpoint annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OceanSystemViewpointAnno

belongs to
oa annotation c

OCF Core Frameworkni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OcfCoreFramework

belongs to
OCF Framework Block c
has facts
is Described in op OCF Framework
frames op communication
frames op Endpoint Invocation
frames op Identification
frames op Service Discovery
frames op Syntactic Interoperability

ocf core framework annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OcfCoreFrameworkAnno

belongs to
oa annotation c

OCF Data Modelsni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OcfDataModels

belongs to
OCF Framework Block c
has facts
is Described in op OCF Framework
frames op Semantic Interoperability

ocf data models annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OcfDataModelsAnno

belongs to
oa annotation c

OCF Frameworkni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OcfFramework

belongs to
Standarization Framework c
has facts
has Publisher op Open Connectivity Foundation

ocf framework annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OcfFrameworkAnno

belongs to
oa annotation c

OCF L2 Connectivityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OcfL2Connectivity

belongs to
OCF Framework Block c
has facts
is Described in op OCF Framework
frames op Connectivity
frames op Syntactic Interoperability

ocf l2 connectivity annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OcfL2ConnectivityAnno

belongs to
oa annotation c

OCF Networkingni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OcfNetworking

belongs to
OCF Framework Block c
has facts
associated with op IPv6
is Described in op OCF Framework
frames op Connectivity
frames op IPv6 Support

ocf networking annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OcfNetworkingAnno

belongs to
oa annotation c

ocf security annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OcfSecurityAnno

belongs to
oa annotation c

ODRLni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ODRL

The Open Digital Rights Language (ODRL) is a policy expression language that provides a flexible and interoperable information model, vocabulary, and encoding mechanisms for representing statements about the usage of content and services. The ODRL Information Model describes the underlying concepts, entities, and relationships that form the foundational basis for the semantics of the ODRL policies. Policies are used to represent permitted and prohibited actions over a certain asset, as well as the obligations required to be meet by stakeholders. In addition, policies may be limited by constraints (e.g., temporal or spatial constraints) and duties (e.g. payments) may be imposed on permissions.
belongs to
document c
Publication
Standard c
has facts
maker op w3 c
has Classification op IDS RAM Information Layer
has Classification op IDS RAM Security Perspective
has Publisher op w3 c
has official resource dp https://www.w3.org/TR/odrl-model/

OMG DDSni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OMG_DDS

The Data Distribution Service for real-time systems (DDS) is an Object Management Group (OMG) machine-to-machine (sometimes called middleware) standard that aims to enable scalable, real-time, dependable, high-performance and interoperable data exchanges using a publish–subscribe pattern. DDS addresses the needs of applications like financial trading, air-traffic control, smart grid management, and other big data applications. The standard is used in applications such as smartphone operating systems, transportation systems and vehicles, software-defined radio, and by healthcare providers. DDS was promoted for use in the Internet of things.
belongs to
document c
Publication
Standard c
has facts
maker op o m g
has Classification op IICF Framework Layer
has Classification op IIRA Connectivity
has Publisher op o m g
related To op i e c 29182 1
related To op i e c 61158
related To op i e c 61784
related To op OMG DDS
has tag dp "Data Distribution Service for real-time systems"@en
has d bpedia resource dp data distribution service
has official resource dp http://portals.omg.org/dds/
has wikipedia article dp data distribution service

Open Connectivity Foundationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OpenConnectivityFoundation

The Open Connectivity Foundation (OCF) is an industry group whose stated mission is to develop specification standards, promote a set of interoperability guidelines, and provide a certification program for devices involved in the Internet of Things (IoT). It has become one of the biggest industrial connectivity standards organizations for IoT, including in its membership Samsung Electronics, Intel, Microsoft, Qualcomm and Electrolux. Currently, there are more than 300 member companies. source: wikipedia
belongs to
StandardOrganization c
has facts
has d bpedia resource dp open connectivity foundation

Open Mobile Allianceni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OMA

OMA (Open Mobile Alliance) is the Leading Industry Forum for Developing Market Driven, Interoperable Mobile Service Enablers (source: https://www.postscapes.com/internet-of-things-protocols/)
belongs to
organization c
i io t consortium c
has facts
has official resource dp http://openmobilealliance.org/about-oma/work-program/m2m-enablers/

OpenAPIni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OpenApi

The OpenAPI Specification (originally known as the Swagger Specification) is a specification for machine-readable interface files for describing, producing, consuming, and visualizing RESTful web services. A variety of tools can generate code, documentation and test cases given an interface file. Development of the OpenAPI Specification (OAS) is overseen by the Open API Initiative, an open source collaborative project of the Linux Foundation. (source: wikipedia)
belongs to
document c
Publication
Technical Specification c
has facts
has d bpedia resource dp open a p i specification

OpenFog Agility Pillarni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRAAgilityPillar

The agility pillar addresses business operational decisions for an OpenFog RA deployment. It is not possible for humans alone to analyze the data generated at the scale predicted by IoT as the basis for rapid, sound business and operational decisions. The agility pillar focuses on transforming this volume of data into actionable insights. Agility also deals with the highly dynamic nature of fog deployments and the need to respond quickly to change. source: OpenFog Reference Architecture
belongs to
Standard Classification c
has facts
is Described in op OpenFog Reference Architecture
frames op agility

OpenFog Architecture Whitepaperni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OpenFogArchitecture

The OpenFog Architecture is a system-level architecture that extends elements of compute, networking and storage across the cloud through to the edge of the network. This approach is particularly suited to IoT systems and accelerates the decision-making velocity. This architecture serves a specific subset of business problems that can’t be successfully implemented using “cloud only” based architectures or relying solely on intelligent edge devices. OpenFog should be thought of as complementary to, and an extension of the traditional cloud based model where implementations of the architecture can reside in multiple layers of a network’s topology. The goal of the OpenFog architecture is to facilitate deployments which highlight interoperability, performance, security, scalability, programmability, reliability, availability, serviceability, and agility. Proprietary or single vendor solutions can result in limited supplier diversity, which can have a negative impact on market adoption, system cost, quality and innovation.
belongs to
Publication
has facts
has Publisher op OpenFog Consortium
has d bpedia resource dp open fog consortium
has official resource dp https://www.openfogconsortium.org/white-paper-reference-architecture/white-paper-download-open-fog-reference-architecture/

OpenFog AutonomyPillarni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRAAutonomyPillar

The autonomy pillar enables fog nodes to continue to deliver the designed functionality in the face of the external service failures. In this architecture, autonomy is supported throughout the hierarchy. Decision making will be made at all levels of a deployment’s hierarchy including near the device or higher order layers. Centralized decision-making in the cloud is no longer the only option. Autonomy at the network edge means intelligence from local devices and peer data can be used to fulfill the business’ mission at the point where it makes the most business sense.
belongs to
Standard Classification c
has facts
is Described in op OpenFog Reference Architecture
frames op Autonomous Communication
frames op Autonomous Configuration

OpenFog Consortiumni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OpenFogConsortium

The OpenFog Consortium work is done by committees and workgroups focused on specific tasks aligned to our mission. This work includes technical work; influencing standards development through liaisons with other organizations; testbed; promoting innovation and industry interest in fog computing; and industry education.
belongs to
i io t consortium c
has facts
has official resource dp https://www.openfogconsortium.org/

OpenFog Data Analytics and Control Perspectiveni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRADataAnalyticsAndControlPerspective

belongs to
Standard Classification c
has facts
is Described in op OpenFog Reference Architecture
alignes With op IIRA Control Domain
alignes With op information domain
frames op Data Analytics

OpenFog Deployment Viewpointni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRADeploymentViewpoint

How fog software and fog systems are deployed to address a given scenario is also very important. There are many deployment types ranging from embedded to large clustered systems that are fully interconnected. The deployment type(s) chosen are scenario specific, but key aspects of the architecture remain visible regardless of deployment type. However, some may grow or shrink in importance. source: OpenFog Reference Architecture
belongs to
Viewpoint c
has facts
is Described in op OpenFog Reference Architecture
alignes With op IIRA Implementation Viewpoint
frames op Service Deployment

OpenFog Functional Viewpointni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRAFunctionalViewpoint

The functional viewpoint of the architecture shows how we apply the OpenFog architectural elements and views to address the various concerns of the stakeholders to satisfy a given scenario. Each scenario chosen will focus on a different aspects and market opportunities for fog computing. We fully expect that the architectural description, views, and perspective may change over time. This change and refinement should be driven from testbeds and application of the OpenFog RA to multiple different markets we see as important to fog computing. source: OpenFog Reference Architecture
belongs to
Viewpoint c
has facts
is Described in op OpenFog Reference Architecture

OpenFog Hierarchy Pillarni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRAHierarchyPillar

OpenFog RA computing resources can be seen as a logical hierarchy based on the functional requirements of an end-to-end IoT system. Depending on the scale and nature of the scenario being addressed, the hierarchy may be a network of smart and connected partitioned systems arranged in physical or logical layers, or it may collapse into a single physical system (scalability pillar). source: OpenFog Reference Architecture
belongs to
Standard Classification c
has facts
is Described in op OpenFog Reference Architecture
frames op Business Value
frames op Data Analytics
frames op Sensing

OpenFog IT Business and Cross-fog Applications Perspectiveni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRAItBusinessAndCrossFogApplicationsPerspective

Fog applications and services should have the flexibility to span and interoperate with various levels in a fog hierarchy. This is a foundational aspect of fog computing that enables a multi-vendor ecosystem. In addition, the data that is collected or generated by one fog node should be shareable with other nodes in the hierarchy. The figure below shows a cross-fog application spanning east to west nodes (it would also be able to span north to south). source: OpenFog Reference Architecture
belongs to
Standard Classification c
has facts
is Described in op OpenFog Reference Architecture
frames op Business Context

OpenFog Manageability Perspectiveni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRAManageabilityPerspective

Many fog computing deployments involve machine vision, and associated human-like functions. As such, they have the ability to see, respond, remember, move, and make autonomous decisions in order to participate in other fog services. This range of actions requires a higher level of manageability than a traditional static model. In addition, fog nodes may be deployed in a wide range of locations: remote, fixed and non-fixed, and environmentally harsh conditions. source: OpenFog Reference Architecture
belongs to
Standard Classification c
has facts
is Described in op OpenFog Reference Architecture
frames op Autonomous Configuration
frames op Service life-cycle management

OpenFog Node Viewni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRANodeView

The node view is the lowest level view we currently utilize in the architectural description. The stakeholders involved in formulating the viewpoint (and subsequently this view) are the system on a chip designers, silicon manufacturers, firmware architects, and system architects. source: OpenFog Reference Architecture
belongs to
Viewpoint c
has facts
associated with op wi fi
is Described in op OpenFog Reference Architecture
alignes With op IDS RAM System Layer
alignes With op IIRA Physical Systems
alignes With op RAMI Asset Layer
frames op Data Storage
frames op Network performance
frames op Physical Connectivity
frames op Security

OpenFog Opennes Pillarni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRAOpennessPillar

Openness is essential for the success of a ubiquitous fog computing ecosystem for IoT platforms and applications. Proprietary or single vendor solutions can result in limited supplier diversity, which can have a negative impact on system cost, quality and innovation. The openness pillar importance is highlighted in our desire for fully interoperable systems, supported by a vibrant supplier ecosystem. source: OpenFog Reference Architecture
belongs to
Standard Classification c
has facts
is Described in op OpenFog Reference Architecture
frames op Interoperability
frames op Service Composition

OpenFog Programmability Pillarni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRAProgrammabilityPillar

The programmability pillar enables highly adaptive deployments including support for programming at the software and hardware layers. This means that re-tasking a fog node or cluster of fog nodes for accommodating operational dynamics, can be completely automated. The re-tasking can be done with the help of the fog nodes inherent programmability interfaces which we describe using general purpose compute or accelerator interfaces. source: OpenFog Reference Architecture
belongs to
Standard Classification c
has facts
is Described in op OpenFog Reference Architecture
frames op Programmability

OpenFog RAS Pillarni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRA_RASPillar

Reliability, availability, and serviceability (RAS) is resident throughout successful system architectures and, as such, takes on great importance in the OpenFog RA. Hardware, software, and operations are the three main areas of the RAS pillar. source: OpenFog Reference Architecture
belongs to
Standard Classification c
has facts
is Described in op OpenFog Reference Architecture
frames op Availability
frames op Maintenance Cost
frames op Reliability

OpenFog Reference Architectureni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OpenFogReferenceArchitecture

The OpenFog Reference Architecture (OpenFog RA) is intended to help business leaders, software developers, silicon architects, and system designers create and maintain the hardware, software and system elements necessary for fog computing.
belongs to
Architecture Description c
Standarization Framework c
has facts
has Publisher op OpenFog Consortium
has official resource dp https://www.openfogconsortium.org/ra/

OpenFog Reference Architecture for Fog Computingni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OpenFog_Reference_Architecture_for_Fog_Computing

belongs to
oa specific resource c

OpenFog Scalability Pillarni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRAScalabilityPillar

The scalability pillar addresses the dynamic technical and business needs behind fog deployments. Elastic scalability cuts across all fog computing applications and verticals. The hierarchical properties of fog and its location at logical edges of networks add additional scaling opportunities. source: OpenFog Reference Architecture
belongs to
Standard Classification c
has facts
is Described in op OpenFog Reference Architecture
frames op Scalability

OpenFog Security Pillarni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRASecurityPillar

Security implementations have many different descriptions and attributes such as privacy, anonymity, integrity, trust, attestation, verification, and measurement. These are key attributes for the OpenFog RA. Achieving the foundational elements for security requires an approach to discover, attest, and verify all smart and connected “things” before trust can be established source: OpenFog Reference Architecture
belongs to
Standard Classification c
has facts
is Described in op OpenFog Reference Architecture
alignes With op security
alignes With op BDVA Cybersecurity and Trust
alignes With op FIWARE Security
alignes With op IDS RAM Security Perspective
alignes With op IIRA Security
alignes With op IIC Security Framework
alignes With op IoT-A Trust Security and Privacy
alignes With op OCF Security
alignes With op open fog security perspective
frames op Security

OpenFog System Architecture Viewni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRASystemView

The system view of the OpenFog RA is composed of one or more node views coupled with other components to create a platform. The stakeholders which typically create these systems to facilitate a fog deployment comprise the concerns of this viewpoint. Subsequently this view is intended to address the concerns of the system architects, hardware OEMs, and platform manufacturers. They also need to understand the Node view such that the systems they create can be deployed to address a given scenario. source: OpenFog Reference Architecture
belongs to
Viewpoint c
has facts
is Described in op OpenFog Reference Architecture
frames op Physical Connectivity

ORION Context Brokerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OrionContextBroker

belongs to
document c
Publication
Technical Specification c
has facts
associated with op FIWARE Architecture

Performanceni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Performance

Performance is completion of a task with application of knowledge, skills and abilities
belongs to
Concern c
has facts
supports op Business Context
has wikipedia article dp performance

Performance and Scale Perspectiveni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#OFRAPerformancePerspective

belongs to
Standard Classification c
has facts
is Described in op OpenFog Reference Architecture

Periodic Communicationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#PeriodicCommunication

belongs to
Concern c
has facts
supports op Event-Driven Messaging

Physical Connectivityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#PhysicalConnectivity

Physical Connectivity is the concern including all aspects of low-level connectivity and transporting a physical (electrical) signal from A to B. This might be achieved through wired connections (e.g. ethernet) but also wireless (e.g. WIFI).
belongs to
Concern c
has facts
supports op Interoperability

Physical Webni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#PhysicalWeb

Physical Web - The Physical Web enables you to see a list of URLs being broadcast by objects in the environment around you with a Bluetooth Low Energy (BLE) beacon. (source: https://www.postscapes.com/internet-of-things-protocols/)
belongs to
document c
Publication
Technical Specification c
has facts
has official resource dp faq

Platform Industry 4.0ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#PlatformIndustry40

belongs to
organization c
i io t consortium c
has facts
associated with op r a m i

Privacyni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Privacy

Information privacy, or data privacy (or data protection), is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. Privacy concerns exist wherever personally identifiable information or other sensitive information is collected, stored, used, and finally destroyed or deleted – in digital form or otherwise. Improper or non-existent disclosure control can be the root cause for privacy issues. Data privacy issues can arise in response to information from a wide range of sources, such as: * Healthcare records * Criminal justice investigations and proceedings * Financial institutions and transactions * Biological traits, such as genetic material * Residence and geographic records * Ethnicity * Privacy breach * Location-based service and geolocation * Web surfing behavior or user preferences using persistent cookies. (source: wikipedia)
belongs to
Concern c
has facts
supports op Data Sovereignty
supports op Trustworthiness
has d bpedia resource dp information privacy

Product Liabilityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ProductLiability

belongs to
Concern c
has facts
supports op Business Context

Product Managerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ProductManager

belongs to
Stakeholder Group c
Layer c

Programmabilityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Programmability

In the edge computing, computation is offloaded from the cloud, and the edge nodes are most likely heterogeneous platforms. In this case, the runtime of these nodes differ from each other, and the programmer faces huge difficulties to write an application that may be deployed in the edge computing paradigm.
belongs to
Concern c
has facts
is Component Of op Edge computing
supports op Edge computing

project managerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ProjectManager

belongs to
Stakeholder Group c

Provenance Trackingni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ProvenanceTracking

Data provenance includes the data's origins, what happens to it and where it moves/moved over time.
belongs to
Concern c
has facts
supports op Security
has d bpedia resource dp data lineage

Pseudonimityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Pseudonimity

While complete anonymity is not feasibe in an IoT scenario, pseudonimity should be supported.
belongs to
Concern c
has facts
supports op Anonymity
has d bpedia resource dp pseudonymity

Quality of Serviceni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#QualityOfService

Quality of service (QoS) is the overall performance of a telephony or computer network, particularly the performance seen by the users of the network. To quantitatively measure quality of service, several related aspects of the network service are often considered, such as error rates, bit rate, throughput, transmission delay, availability, jitter, etc. In the field of computer networking and other packet-switched telecommunication networks, quality of service refers to traffic prioritization and resource reservation control mechanisms rather than the achieved service quality. (source: wikipedia)
belongs to
Concern c
has facts
supports op Service Description
has d bpedia resource dp quality of service

r a m i assetlayer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RAMIAssetlayerAnno

belongs to
oa annotation c

r a m i body annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RAMIBodyAnno

belongs to
oa annotation c

r a m i business layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RAMIBusinessLayerAnno

belongs to
oa annotation c

r a m i communicationlayer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RAMICommunicationlayerAnno

belongs to
oa annotation c

r a m i connected worldni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RAMIConnectedWorld

belongs to
RAMI Hierarchy Level c
has facts
frames op Interoperability
frames op Semantic Interoperability
frames op Thing description

r a m i connected world annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RAMIConnectedWorldAnno

belongs to
oa annotation c

r a m i control device annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RAMIControlDeviceAnno

belongs to
oa annotation c

r a m i enterprise annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RAMIEnterpriseAnno

belongs to
oa annotation c

r a m i field deviceni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RAMIFieldDevice

belongs to
RAMI Hierarchy Level c
Standard Classification c
has facts
frames op manufacturing

r a m i field device annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RAMIFieldDeviceAnno

belongs to
oa annotation c

r a m i functional layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RAMIFunctionalLayerAnno

belongs to
oa annotation c

r a m i header annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RAMIHeaderAnno

belongs to
oa annotation c

r a m i information layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RAMIInformationLayerAnno

belongs to
oa annotation c

r a m i integration layer annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RAMIIntegrationLayerAnno

belongs to
oa annotation c

r a m i productni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RAMIProduct

belongs to
RAMI Hierarchy Level c
Standard Classification c
has facts
frames op manufacturing

r a m i product annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RAMIProductAnno

belongs to
oa annotation c

r a m i station annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RAMIStationAnno

belongs to
oa annotation c

r d fni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RDF

belongs to
document c
Publication
Technical Specification c

Radio activity controlni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RadioActivityControl

The user shall be able to control the radio activity of the system.
belongs to
Concern c
has facts
supports op Energy Control

RAMI Business Layerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RAMIBusinessLayer

belongs to
RAMI IT Layer c
Standard Classification c
has facts
associated with op IDS RAM Business Layer
associated with op IDS RAM Governance Perspective
associated with op IIRA Business Domain
associated with op IVI Business Layer
is Described in op r a m i
alignes With op IDS RAM Business Layer
alignes With op IDS RAM Governance Perspective
alignes With op IIRA Business Domain
alignes With op IVI Business Layer
frames op process planning
frames op Business Context
frames op Service Composition
frames op Service Orchestration

RAMLni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RAML

RAML (RESTful API Modeling Language) - Makes it easy to manage the whole API lifecycle from design to sharing. It's concise - you only write what you need to define - and reusable. (source: https://www.postscapes.com/internet-of-things-protocols/)
belongs to
document c
Publication
Technical Specification c
has facts
has official resource dp http://raml.org/

Reactive Streamsni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ReactiveStreams

A standard for asynchronous stream processing with non-blocking back pressure on the JVM. (source: https://www.postscapes.com/internet-of-things-protocols/)
belongs to
document c
Publication
Technical Specification c
has facts
has official resource dp http://www.reactive-streams.org/

Real Time Analyticsni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RealTimeAnalytics

In computer science, real-time computing (RTC), or reactive computing describes hardware and software systems subject to a "real-time constraint", for example from event to system response. Real-time programs must guarantee response within specified time constraints, often referred to as "deadlines". Systems of this type whose correctness depends on their temporal aspects as well as their functional aspects. Real-time responses are often understood to be in the order of milliseconds, and sometimes microseconds.
belongs to
Concern c
has facts
supports op Data Analytics
has d bpedia resource dp real time computing

Regulatory Complianceni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Regulatory_Compliance

Organizations are ultimately legally responsible for their process compliance and data security, Even though the data is in a public cloud.
belongs to
Concern c
has facts
has wikipedia article dp regulatory compliance

Reliabilityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Reliability

In computer networking, a reliable protocol provides reliability properties with respect to the delivery of data to the intended recipient(s), as opposed to an unreliable protocol, which does not provide notifications to the sender as to the delivery of transmitted data. (source: wikipedia)
belongs to
Concern c
has facts
supports op Trustworthiness
has d bpedia resource dp reliability (computer networking)

Resilienceni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Resilience

Resilience is the ability to provide and maintain an acceptable level of service in the face of faults and challenges to normal operation.” Threats and challenges for services can range from simple misconfiguration over large scale natural disasters to targeted attacks. As such, network resilience touches a very wide range of topics. In order to increase the resilience of a given communication network, the probable challenges and risks have to be identified and appropriate resilience metrics have to be defined for the service to be protected. (source: wikipedia)
belongs to
Concern c
has facts
supports op Trustworthiness
has d bpedia resource dp resilience (network)

RESTni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#REST

REST (Representational state transfer) - RESTful HTTP (source: https://www.postscapes.com/internet-of-things-protocols/)
belongs to
document c
Publication
Technical Specification c
has facts
associated with op DTP Deployment
has wikipedia article dp representational state transfer

Return On Investmentni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ReturnOnInvestment

belongs to
Concern c
has facts
supports op Business Context

RFC 1122ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RFC_1122

This is one RFC of a pair that defines and discusses the requirements for Internet host software. This RFC covers the communications protocol layers: link layer, IP layer, and transport layer; its companion RFC-1123 covers the application and support protocols.
belongs to
document c
Publication
Standard c
has facts
maker op i e t f
has Classification op IIRA Connectivity
has Classification op network layer
has Publisher op i e t f
has official resource dp rfc1122

RFC 5246ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RFC_5246

This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.
belongs to
document c
Publication
Standard c
has facts
maker op i e t f
has Classification op Data Sovereignty
has Classification op IDS RAM Security Perspective
has Publisher op i e t f
has official resource dp rfc5246

RFC 6750ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RFC_6750

This specification describes how to use bearer tokens in HTTP requests to access OAuth 2.0 protected resources. Any party in possession of a bearer token (a "bearer") can use it to get access to the associated resources (without demonstrating possession of a cryptographic key). To prevent misuse, bearer tokens need to be protected from disclosure in storage and in transport.
belongs to
document c
Publication
Standard c
has facts
associated with op Data Transfer Project Architecture
maker op i e t f
has Classification op IDS RAM Security Perspective
has Publisher op i e t f
has d bpedia resource dp o auth
has official resource dp rfc6750

RFC 7252ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RFC_7252

The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine-to-machine (M2M) applications such as smart energy and building automation.
belongs to
document c
Publication
Standard c
has facts
maker op i e t f
has Classification op IIRA Operation Domain
has Classification op tansport layer
has Publisher op i e t f
has Publication Date dp "2014-06-01"^^date
has official resource dp rfc7252

RFC 7642ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RFC_7642

This document provides definitions and an overview of the System for Cross-domain Identity Management (SCIM). It lays out the system's concepts, models and flows, and includes user scenarios, use cases, and requirements.
belongs to
document c
Publication
Standard c
has facts
maker op i e t f
has Classification op FIWARE Security
has Developer op i e t f
has Publisher op i e t f
has official resource dp draft ietf scim use cases 08
has Target Concern op Identity Management

RFC 7643ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RFC_7643

This document provides a platform neutral schema and extension model for representing users and groups and other resource types in JSON format. This schema is intended for exchange and use with cloud service providers.
belongs to
document c
Publication
Standard c
has facts
maker op i e t f
has Classification op FIWARE Security
has Developer op i e t f
has Publisher op i e t f
has official resource dp draft ietf scim core schema 22
has Target Concern op Identity Management

RFC 7644ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RFC_7644

The System for Cross-Domain Identity Management (SCIM) specification is an HTTP based protocol that makes managing identities in multi domain scenarios easier to support through a standardized service. Examples include but are not limited to enterprise to cloud service providers, and inter-cloud based scenarios. The specification suite seeks to build upon experience with existing schemas and deployments, placing specific emphasis on simplicity of development and integration, while applying existing authentication, authorization, and privacy models. SCIM's intent is to reduce the cost and complexity of user management operations by providing a common user schema, an extension model, and a service protocol defined by this document.
belongs to
Standard c
has facts
maker op i e t f
has Classification op FIWARE Security
has Developer op i e t f
has Publisher op i e t f
has official resource dp draft ietf scim api 19
has Target Concern op Identity Management

RFC 768ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RFC_768

In computer networking, the User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite. The protocol was designed by David P. Reed in 1980 and formally defined in RFC 768. With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol (IP) network. Prior communications are not required in order to set up communication channels or data paths.
belongs to
Standard c
has facts
maker op i e t f
has Classification op tansport layer
has Publisher op i e t f
has d bpedia resource dp user datagram protocol
has official resource dp rfc768
has wikipedia article dp user datagram protocol

RFC 793ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RFC_793

This document describes the DoD Standard Transmission Control Protocol (TCP). There have been nine earlier editions of the ARPA TCP specification on which this standard is based, and the present text draws heavily from them. There have been many contributors to this work both in terms of concepts and in terms of text. This edition clarifies several details and removes the end-of-letter buffer-size adjustments, and redescribes the letter mechanism as a push function.
belongs to
Standard c
has facts
maker op i e t f
has Classification op IDS RAM System Layer
has Classification op tansport layer
has Publisher op i e t f
has official resource dp rfc793

Risk Managementni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RiskManagement

Organizations will be generally exposed to a broad range of different risks, by adopting the cloud computing. Managing these risks is very important concern, as the successful implementation of cloud computing relies upon the appropriate managing, reducing, as well as mitigating these risks linked to cloud computing
belongs to
Concern c
has facts
supports op Business Context
has d bpedia resource dp risk management
has wikipedia article dp risk management

Role Categorizationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RoleCategorization

The necessity to categorize participants of a network (users or components) by roles according to the contributions they provide and the demands they have. Examples are identity provider, analytics service, data provider etc. Not to be confused with 'role-based access control', which distinguishes users according to their organizational group, e.g. adimistrators, managers, data analysts etc.
belongs to
Concern c
has facts
supports op Identity Management

ROLLni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ROLL

ROLL / RPL (IPv6 routing for low power/lossy networks) (source: https://www.postscapes.com/internet-of-things-protocols/)
belongs to
document c
Publication
Technical Specification c
has facts
has official resource dp https://datatracker.ietf.org/wg/roll/

RPMAni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#RPMA

RPMA (Random phase multiple access) A technology communication system employing direct-sequence spread spectrum (DSSS) with multiple access. (source: https://www.postscapes.com/internet-of-things-protocols/)
belongs to
document c
Publication
Technical Specification c
has facts
has wikipedia article dp random phase multiple access

Safetyni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Safety

Functional safety (as defined by the IDS) is the ability of a system to prevent physical damage.
belongs to
Concern c
has facts
supports op Trustworthiness
has d bpedia resource dp safety

Scalabilityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Scalability

Scalability is the capability of a system, network, or process to handle a growing amount of work, or its potential to be enlarged in order to accommodate that growth. For example, it can refer to the capability of a system to increase its total output under an increased load when resources (typically hardware) are added. An analogous meaning is implied when the word is used in an economic context, where scalability of a company implies that the underlying business model offers the potential for economic growth within the company. Scalability, as a property of systems, is generally difficult to define and in any particular case it is necessary to define the specific requirements for scalability on those dimensions that are deemed important. It is a highly significant issue in electronics systems, databases, routers, and networking. (source: wikipedia)
belongs to
Concern c
has facts
has d bpedia resource dp scalability

SCIMni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#SCIM

The System for Cross-domain Identity Management (SCIM) specification is designed to make managing user identities in cloud-based applications and services easier. The specification suite seeks to build upon experience with existing schemas and deployments, placing specific emphasis on simplicity of development and integration, while applying existing authentication, authorization, and privacy models. Its intent is to reduce the cost and complexity of user management operations by providing a common user schema and extension model, as well as binding documents to provide patterns for exchanging this schema using standard protocols. In essence: make it fast, cheap, and easy to move users in to, out of, and around the cloud.
belongs to
document c
Publication
Technical Specification c
has facts
associated with op FIWARE Security
associated with op RFC 7642
associated with op RFC 7643
associated with op RFC 7644
maker op i e t f
has Publisher op i e t f
has d bpedia resource dp system for cross domain identity management
has wikipedia article dp system for cross domain identity management
has Target Concern op Cross-domain Identity Management

Secure Communicationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#SecureCommunication

This concern frames everything necessary to establish and conduct a secure communication channel, which cannot be read, intercepted or altered by a third party. Especially relevant are encrypting techniques.
belongs to
Concern c
has facts
supports op communication
supports op Integrity Protection and Verification

Securityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Security

Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical). (source: wikipedia)
belongs to
Concern c
has facts
supports op Privacy
has d bpedia resource dp information security

Security Configurationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#SecurityConfiguration

Users should be able to monitor and control the security and privacy settings of all the devices that they own.
belongs to
Concern c
has facts
supports op Security
has d bpedia resource dp hardening (computing)

Selection of Service Providerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#SelectionOfServiceProvider

Due to the diversity of cloud computing service suppliers, it is a challenge for organizations to pick am appropriate service supplier. In selection of a cloud provider, organizations ought to look at different elements, like the reputation and size of the company of service supplier, in terms of number of employees, share of the market, as well as their other resources
belongs to
Concern c
has facts
supports op Business Context
supports op Cloud Computing Capability
has wikipedia article dp service provider

Semantic Interoperabilityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#SemanticInteroperability

Beyond the ability of two or more computer systems to exchange information, semantic interoperability is the ability to automatically interpret the information exchanged meaningfully and accurately in order to produce useful results as defined by the end users of both systems. To achieve semantic interoperability, both sides must refer to a common information exchange reference model. source: <https://en.wikipedia.org/wiki/Interoperability>
belongs to
Concern c
has facts
supports op Interoperability
has d bpedia resource dp semantic interoperability

Sensingni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Sensing

The concern of being able to measure values from a defined environment.
belongs to
Concern c
has facts
supports op IoT
has d bpedia resource dp sensor

Service Access Controlni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ServiceAccessControl

Service access control is the selective restriction of access to a specific (web) service or process. The act of accessing may mean consuming, entering, or using. Permission to access a service is called service authorization. Locks and login credentials are two analogous mechanisms of access control. (source: wikipedia)
belongs to
Concern c
has facts
associated with op Data Access Control
supports op authorization
has d bpedia resource dp network access control

Service Choreographyni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ServiceChoreography

2 to n Data Apps/Services/Data Provider are connected (without a central coordinator)
belongs to
Concern c
has facts
supports op Service Composition
has d bpedia resource dp service choreography

Service Compositionni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ServiceComposition

2 to n Data Apps/Devices/Services are connected
belongs to
Concern c
has facts
supports op interoperability
has d bpedia resource dp service composition

Service Deploymentni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ServiceDeployment

Software deployment is all of the activities that make a software system available for use. The general deployment process consists of several interrelated activities with possible transitions between them. These activities can occur at the producer side or at the consumer side or both. Because every software system is unique, the precise processes or procedures within each activity can hardly be defined. Therefore, "deployment" should be interpreted as a general process that has to be customized according to specific requirements or characteristics. (source: wikipedia)
belongs to
Concern c
has facts
supports op Service life-cycle management
has d bpedia resource dp software deployment

Service Descriptionni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ServiceDescription

A Service Description plays an important role in enabling access to a service. Most service description languages are designed for machine consumption, allowing for the automatic creation of code skeletons, easier search, and classification of services. However, people may also find descriptions useful to learn about the use of parameters or the precise semantics of some operation. (https://www.w3.org/standards/webofservices/description)
belongs to
Concern c
has facts
supports op Semantic Interoperability

Service Discoveryni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ServiceDiscovery

How to find desired (Web) services, Data Apps, functionalities.
belongs to
Concern c
has facts
has d bpedia resource dp service discovery

Service Isolationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ServiceIsolation

Service isolation via a process group (as done with Docker) or by least privilege with clear separation and support for additional security modules (as done by trustme).
belongs to
Concern c
has facts
has d bpedia resource dp process isolation

Service level agreementni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ServiceLevelAgreements

A service-level agreement (SLA) is defined as an official commitment that prevails between a service provider and the customer. Particular aspects of the service – quality, availability, responsibilities – are agreed between the service provider and the service user. The most common component of SLA is that the services should be provided to the customer as agreed upon in the contract. As an example, Internet service providers and telcos will commonly include service level agreements within the terms of their contracts with customers to define the level(s) of service being sold in plain language terms. In this case the SLA will typically have a technical definition in terms of mean time between failures (MTBF), mean time to repair or mean time to recovery (MTTR); identifying which party is responsible for reporting faults or paying fees; responsibility for various data rates; throughput; jitter; or similar measurable details. (source: wikipedia)
belongs to
Concern c
has facts
supports op Service life-cycle management
has d bpedia resource dp service level agreement

Service life-cycle managementni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ServiceLifecycleManagement

Information lifecycle management (ILM) refers to strategies for administering storage systems on computing devices. ILM is the practice of applying certain policies to effective information management. This practice had its basis in the management of information in paper or other physical forms (microfilm, negatives, photographs, audio or video recordings and other assets). ILM includes every phase of a "record" from its beginning to its end. And while it is generally applied to information that rises to the classic definition of a record (and thus related to records management), it applies to all informational assets. (source: wikipedia)
belongs to
Concern c
has facts
has d bpedia resource dp information lifecycle management

Service Orchestrationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ServiceOrchestration

A Service/Data App are connected with Data Provider, other Services/Data Apps in order to fulfill a certain task, orchestrates by a central entity.
belongs to
Concern c
has facts
supports op Service Composition
has d bpedia resource dp orchestration (computing)
has wikipedia article dp deployment
has wikipedia article dp orchestration (computing)

Service Recoveryni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Service_Recovery

Organizations should make sure that the cloud provider imitates the data and provides services in case the major site is down. Find out the time to restore services and the data loss if any, in case the chief site goes down.
belongs to
Concern c
has facts
supports op Cloud Computing Capability
supports op Reliability
has wikipedia article dp service recovery

Service Selectionni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ServiceSelection

The ability of a system to invoke or deploy the desired service/Data App.
belongs to
Concern c
has facts
supports op Service Composition

Software Updatesni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Software_Updates

Software update is the process that prevents compromise an IoT based system. Organizations are yet to be geared up with mechanisms to Remotely Patch Connected Devices.
belongs to
Concern c
has facts
supports op Evolvability
has wikipedia article dp wikipedia: software updates

Spatial modelingni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#SpatialModeling

A system shall have a semantic understanding of distance and location.
belongs to
Concern c
has facts
supports op Data Description
supports op Semantic Interoperability
has d bpedia resource dp spatial analysis

Stream processingni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#StreamProcessing

Stream processing is a computer programming paradigm, equivalent to dataflow programming, event stream processing, and reactive programming, that allows some applications to more easily exploit a limited form of parallel processing. (source: wikipedia)
belongs to
Concern c
has facts
supports op Data Processing
has d bpedia resource dp stream processing

Syntactic Interoperabilityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#SyntacticInteroperability

If two or more systems are capable of communicating with each other, they exhibit syntactic interoperability when using specified data formats and communication protocols. XML or SQL standards are among the tools of syntactic interoperability. This is also true for lower-level data formats, such as ensuring alphabetical characters are stored in a same variation of ASCII or a Unicode format (for English or international text) in all the communicating systems. source: <https://en.wikipedia.org/wiki/Interoperability>
belongs to
Concern c
has facts
supports op Interoperability
has wikipedia article dp syntactic interoperability

System Engineerni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#SystemEngineer

belongs to
Stakeholder Group c
Layer c

System evolutionni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#SystemEvolution

Software evolution is the term used in software engineering (specifically software maintenance) to refer to the process of developing software initially, then repeatedly updating it for various reasons. (source: wikipedia)
belongs to
Concern c
has facts
supports op Evolvability
has d bpedia resource dp software evolution

system operatorni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#SystemOperator

belongs to
Stakeholder Group c

System Recoveryni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#SystemRecovery

belongs to
Concern c
has facts
supports op Reliability

The Industrial Internet of Things Volume G1: Reference Architecture IIC:PUB:G1:V1.80:20170131ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#IIC_PUB_G1_V1_80_20170131

belongs to
oa specific resource c

The Industrial Internet of Things Volume G5: Connectivity Framework ni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#The_Industrial_Internet_of_Things_Volume_G5_Connectivity_Framework

belongs to
oa specific resource c

Thing descriptionni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ThingDescription

'Things' in terms of physical objects in the IoT need to be described in order to identify them and to provide further information.
belongs to
Concern c
has facts
supports op Semantic Interoperability

Thing mobilityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ThingMobility

A Thing in terms of Internet of Things (IoT) needs to be moveable.
belongs to
Concern c
has facts
supports op Data Access
supports op IoT
supports op Service Deployment

Thing representationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#ThingRepresentation

Physical objects need to be represented.
belongs to
Concern c
has facts
supports op IoT

Time Synchronizationni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#TimeSynchronization

belongs to
Concern c
has facts
supports op Service Composition
has d bpedia resource dp "Synchronization refers to one of two distinct but related concepts: synchronization of processes, and synchronization of data. Process synchronization refers to the idea that multiple processes are to join up or handshake at a certain point, in order to reach an agreement or commit to a certain sequence of action. Data synchronization refers to the idea of keeping multiple copies of a dataset in coherence with one another, or to maintain data integrity. Process synchronization primitives are commonly used to implement data synchronization. (sourc: wikipedia)"@en
has d bpedia resource dp synchronization (computer science)

Trusted Connectorni back to ToC or Named Individual ToC

IRI: https://w3id.org/ids/core/TrustedConnector

TODO: model IDS concepts correctly
belongs to
Technology c
has facts
associated with op Administration Shell
associated with op IDS RAM
maker op IDS RAM
alignes With op Administration Shell

Trustworthinessni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Trustworthiness

Trustworthiness is the degree of confidence one has that the system performs as expected in respect to all the key system characteristics in the face of environmental disruptions, human errors, system faults and attacks. source: IISF
belongs to
Concern c
has facts
has d bpedia resource dp software trustworthiness

Unicastni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#Unicast

one-to-one connectivity
belongs to
Concern c
has facts
supports op cardinality of data sources

Unreliable Networkni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#UnreliableNetwork

Productive systems must inherently cover issues caused by unreliable networks.
belongs to
Concern c
has facts
supports op Reliability

User Interactionni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#UserInteraction

Interaction design, often abbreviated as IxD, is defined as "the practice of designing interactive digital products, environments, systems, and services." While the digital side of this statement is true, Interaction design is also valid when creating physical (non-digital) products, covering the ideology of how a user may interact with it. (source: wikipedia)
belongs to
Concern c
has facts
supports op user experience
has d bpedia resource dp interaction design

User Preferencesni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#UserPreferences

Users can have the possibility to prefer one service over another for any reason.
belongs to
Concern c
has facts
supports op Service level agreement

Vendor Lockinni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#VendorLockin

There is a lot of competition among vendors to dominate the cloud market. According to Columbus’ report, a study conducted by IDG Cloud Computing Study realized that Cloud investment rose by 19% in larger scale enterprises consisting of more than a thousand employees who spend a mean of $3.3 million annually.
belongs to
Concern c
has facts
supports op Business Context
supports op Cloud Computing Capability
has wikipedia article dp vendor lock in

Virtual Entityni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#VirtualEntity

Entities are provided through a virtual form.
belongs to
Concern c
has facts
supports op Thing representation
has d bpedia resource dp digital twin

x a c m lni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#XACML

belongs to
document c
Publication
Technical Specification c
has facts
associated with op FIWARE Security
has Target Concern op authorization
has Target Concern op Data Access Control

x road deployment view annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#xRoadDeploymentViewAnno

belongs to
oa annotation c

x road protocols interfaces annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#xRoadProtocolsInterfacesAnno

belongs to
oa annotation c

x road system components annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#xRoadSystemComponentsAnno

belongs to
oa annotation c

x road technology matrix annoni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#xRoadTechnologyMatrixAnno

belongs to
oa annotation c

x-roadni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#x-road

belongs to
Data Sharing Initiative c

X-Road Architecture Technical Specification Version: 1.0 18.09.2015 15 pages Doc. ID: ARC-Gni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#X_Road_Architecture_Technical_Specification

belongs to
oa specific resource c

x-road Protocols and Interfacesni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#xRoadProtocolsInterfaces

belongs to
Standard Classification c
x-road Section c
has facts
associated with op IDS RAM Process Layer
associated with op IIRA Control Domain
associated with op RAMI Integration Layer
is Described in op x-Tee
alignes With op IDS RAM Process Layer
alignes With op IIRA Control Domain
alignes With op RAMI Integration Layer
frames op communication
frames op Interoperability
frames op Syntactic Interoperability

x-road Technology Matrixni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#xRoadTechnologyMatrix

belongs to
Standard Classification c
x-road Section c
has facts
is Described in op x-Tee

x-Teeni back to ToC or Named Individual ToC

IRI: https://w3id.org/i40/sto#xTee

belongs to
Architecture Description c
Standarization Framework c
has facts
has Publisher op x-road

Legend back to ToC

c: Classes
op: Object Properties
dp: Data Properties
ni: Named Individuals

References back to ToC

  • Grangel-Gonzalez Irlan, Paul Baptista, Lavdim Halilaj, Steffen Lohmann, Maria-Esther Vidal, Cristian Mader, Soeren Auer, The industry 4.0 standards landscape from a semantic integration perspective, in: 22nd IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, Limassol, Cyprus, September 12-15, 2017, pp. 1–8.
  • Lu, K. C. Morris, S. Frechette, Standards landscape and directions for smart manufacturing systems, in: IEEE International Conference on Automation Science and Engineering, CASE, Gothenburg, Sweden, August 24-28, 2015, pp. 998–1005.
  • S.-W. Lin, B. Murphy, E. Clauer, U. Loewen, R. Neubert, G. Bachmann,M. Pai, M. Hankel, Reference Architectural Model Industrie 4.0 (RAMI4.0), Tech. rep., Industrial Internet Consortium and Plattform Industrie4.0 (2017).

Acknowledgements back to ToC

This ontology is developed as a part of the Boost 4.0 Project.