Refrain from proprietary formats; if necessary, build adapters that go both ways (import/export).
Platform-independent micro-service architecture (micro-services are designed to be independent of Bluemix stack (but can use it if it’s there))
Standards compliance for product categorisation (eClass), business process specification (UBL), oneM2M for manufacturing interoperation.
Industrial Reference ICT Architectures
IIRA is the main reference. IIRA is closest in terms of conceptual design for NIMBLE. RAMI is not so applicable to us because we are closer to Internet B2C or B2B platforms. Industrial Data Space is on our radar, but was not sufficiently elaborated at the time of writing the proposal. See https://cloud.effra.eu/index.php/s/NiyTZgM3kw6VCxw The NIMBLE platform is designed to ingest data stemming from edge devices into the platform. Once data has reached the platform, data are stored for future uses such as offline analytics and auditing. In addition, processing of the data as it flows into the platform can be performed in real-time. Offline analytics complements the real-time view by enabling companies to gain insights from their data ...
- General interoperability framework
- Integration with legacy systems
End-to-end security: Data integrity, confidentiality, identity and key management, authentication, fine-grained authorization and access control. Trust and reputation management.
Advanced behavioural security (including game theory)
Spring Cloud Security: Standardized security mechanisms are implemented using Spring Cloud Security. It provides out-of-the-box integration of security modules to Spring Cloud applications. Authentication and authorization between microservices are realized by using Spring Cloud Security, which supports OAuth2 and OpenID Connect and communicates with the authentication server (i.e. Cloud Foundry UAA).
- Risks addressed by security
- Risk or security assessment
- Trustworthy Systems in Platform Lifetime
- A Security Architecture for Digital Manufacturing Platforms
- Specific security standard(s) addressed and impact on implementation
- Used guidelines and specific frameworks for security and/or privacy by design
- Security mechanisms and technologies