9: EDC MVD: Difference between revisions
Created page with "• '''Purpose/Short Description''': • '''Applicable Data Spaces Building Block (see DSCC Buildign Blocks)''':Data Sovereignty & Trust • '''Reference, URL''': • '''..." |
No edit summary |
||
| Line 1: | Line 1: | ||
• '''Purpose/Short Description''': | • '''Purpose/Short Description''': | ||
• '''Applicable Data Spaces Building Block (see DSCC Buildign Blocks)''':Data Sovereignty & Trust | • '''Applicable Data Spaces Building Block (see DSCC Buildign Blocks)''': Data Sovereignty & Trust | ||
• '''Reference, URL''': | • '''Reference, URL''': https://eclipse-edc.github.io/docs/#/README & https://github.com/eclipse-edc/MinimumViableDataspace | ||
• ''' | • '''Challenge addressed''': Ensures the integrity and security of data exchanges in data spaces, starting with the crucial step of credential verification. | ||
• ''' | • '''Applicable Business area ''': Data Exchange Platforms, IoT, Smart Cities, and any sector requiring secure data interactions. | ||
• ''' | • '''Affected Stakeholders''': Data providers, data consumers, technology providers, and regulatory bodies involved in data governance. | ||
• ''' | • '''Key components''': A) Credential Exchange Protocol: Manages the secure exchange of credentials. B) Authentication Service: Verifies credentials and authorizes data exchange. C) Data Catalogs: Allows participants to request access post-credential exchange. | ||
• ''' | • '''Benefits''': Enhanced Security: Reduces the risk of data breaches and unauthorized access. | ||
Increased Trust: Builds confidence among dataspace participants through verified interactions. | |||
Regulatory Compliance: Meets data protection and privacy regulations. | |||
• ''' | • '''Metrics/KPIs''': N.A. | ||
• ''' | • '''Completion Date ''': Ongoing | ||
Go back to the '''[[Solutions for circularity Data Space implementations]]''' | Go back to the '''[[Solutions for circularity Data Space implementations]]''' | ||
Latest revision as of 12:37, 27 December 2024
• Purpose/Short Description:
• Applicable Data Spaces Building Block (see DSCC Buildign Blocks): Data Sovereignty & Trust
• Reference, URL: https://eclipse-edc.github.io/docs/#/README & https://github.com/eclipse-edc/MinimumViableDataspace
• Challenge addressed: Ensures the integrity and security of data exchanges in data spaces, starting with the crucial step of credential verification.
• Applicable Business area : Data Exchange Platforms, IoT, Smart Cities, and any sector requiring secure data interactions.
• Affected Stakeholders: Data providers, data consumers, technology providers, and regulatory bodies involved in data governance.
• Key components: A) Credential Exchange Protocol: Manages the secure exchange of credentials. B) Authentication Service: Verifies credentials and authorizes data exchange. C) Data Catalogs: Allows participants to request access post-credential exchange.
• Benefits: Enhanced Security: Reduces the risk of data breaches and unauthorized access. Increased Trust: Builds confidence among dataspace participants through verified interactions. Regulatory Compliance: Meets data protection and privacy regulations.
• Metrics/KPIs: N.A.
• Completion Date : Ongoing
Go back to the Solutions for circularity Data Space implementations