Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

To achieve the goals of the iSHARE Trust Framework, it is paramount to stay close to a set of guiding principles. As time progresses new principles can be defined, existing principles can be adapted or dropped if deemed necessary. The guiding principles were defined using the format as suggested* by TOGAF 9.2 architectural principles

The following principles define the Trust Framework and must be kept in mind at all times during further development (see details of guiding principles below):

Principle #Principle name
1Generic building block to enable data exchange
2Limited scope: identification, authentication, and authorisation
3Leverage existing (international) building blocks
4Agnostic towards nature and content of data
5Benefits outweigh investment for all types of participants
6International orientation

...

Principle 1Generic building block to enable data exchange
StatementiSHARE is provides a generic identification, authentication and authorisation scheme Trust Framework to be used as enabler for data exchange in logistics.
RationaleIn every exchange of data, identification, authentication and authorisation are fundamental factors. iSHARE aims to simplify processes of identification, authentication and authorisation as a generic solution to facilitate data exchange in the logistics sector.
Implications
  • The Framework will allow for extension or adaptability so it can be used in situation/sector specific cases;
  • The Framework will not cater to a specific sector or market, it is applicable in an N amount of cases;
  • The Framework will not be a point solution.

...

Principle 2Limited scope: identification, authentication, and authorisation
StatementThe iSHARE Trust Framework's scope is limited to topics of identification, authentication and authorisation in the context of data exchange
RationaleiSHARE aims to improve the circumstances for data exchange throughout the logistics sector and provides focus on the topic of identification, authentication and authorisation. Identification, authentication and authorisation are a fundamental part of any data exchange, but are not solved in a scalable or standardised way at the moment.
Implications
  • Without this principle, there is a risk of 'scope creep': related topics could take away the focus off the intended topics

...

Principle 3Leverage existing (international) building blocks
StatementWhere possible, iSHARE Trust Framework should be realised using existing and proven standards, technology or initiatives
RationaleBy reusing building blocks already available and in use, the impact on organisations to participate in the iSHARE network and the time to  realiseadopt the iSHARE Trust Framework are lowered. Standards, technology and initiatives preferably have a broad (international) usage base and are backed by a professional organisation charged with maintenance of the standards, technology or initiatives.
Implications
  • the Framework will build on or use existing (international) standards, technology or initiatives where possible;
  • the Framework will aim to use open standards, technology or initiatives;
  • the Framework may use proprietary standards, technology or initiatives;
  • if existing and/or proven standards, technology or initiatives do not provide what is needed, alternative solutions will be sought.

...