iSHARE Trust Body of Knowledge
Other Resources
  • Welcome to the Trust Body of Knowledge
  • Understand iSHARE
    • Introduction
    • Design Principles
    • ✨Data Sharing Principles
    • iSHARE Trust Framework
    • General FAQs
  • Apply iSHARE
    • Introduction
    • Test Certificate
    • eSEALS and key vaults
    • Technical Standards
    • Authentication
    • Authorisation
    • Participant Registry
    • Quick walkthroughs
      • Participant Management
      • Postman Collections
      • Demo Videos
    • Conformance Test Tool (CTT)
    • Certificates Cheat Sheet
    • Technical FAQs
  • Enable iSHARE
    • Introduction
    • 🎨Data Space Designers
    • Business Models for Data Spaces
    • Governance in Data Spaces
Powered by GitBook
LogoLogo

  • Cookie Policy

  • Privacy Policy

  • Imprint

  • Contact us

Copyright Β© 2024 iSHARE Foundation

On this page
  1. Understand iSHARE

Design Principles

PreviousIntroductionNextData Sharing Principles

Last updated 8 months ago

At the core of lies a vision for open, federated, and interoperable data sharing, ensuring data accessibility for all users, both new and established, without the dominance of any single entity. To understand the practical application of data spaces for businesses, it’s essential to explore the different layers involved:

Layer 1 - Applications and Users

Every data space is driven by a practical use case where data exchange directly impacts stakeholders, driving demands and the resources needed for implementation. Some examples include:

  • Sustainability Reports: for secure access to energy, building and energy label data.

  • CO2 Reports and Advice: to reduce CO2 emissions in logistics.

  • Traffic and Water Management Inspection (IVW): for road safety through data collection on transported goods.

Layer 2 – Data Space Building Blocks

Building blocks are crucial for facilitating data exchange in an open and federated manner. They provide:

  • Data Sovereignty and Trust: to ensure data stays within authorised boundaries.

  • Data Value Creation: to maximise data utility and profitability.

  • Data Space Governance: for structured oversight.

  • Data Interoperability: for standardising communication protocols.

Layer 3 – Data Availability

Data sources within a data space require access control, software, and API authorisations. Different classifications of data include:

  • Public/ open data: No access control or usage restrictions are necessary.

  • Licensed data: Access control based on conditions.

  • Business confidential data: Specific policies required.

  • Consumer confidential data: Specific access policies are necessary for privacy reasons.

Together, these layers facilitate secure and sovereign data exchange, certification, and governance, fostering collaboration across Europe and beyond.

iSHARE