-
Results:
The Security Framework together with the Blockchain layer is strongly interlaced with the COMPOSITION ecosystem, providing all the necessary security features as authentication, authorization, message integrity and message traceability.
-
Comment: Interoperability between installed equipment and infrastructure (machines, environment, people) is critical to capture and process data for the COMPOSITION IIMS components.
-
Comment: The COMPOSITION project will address the issue of extended enterprises allowing the interaction and collaboration of all stakeholders in the COMPOSITION Marketplace as every business entity will be represented by agents at the ecosystem. Some of information from companies’ IIMS will be reflected at the ecosystem in a Collaborative Manufacturing Services Ontology which will be used as a central knowledge base. The Matchmaker will infer knew knowledge from the knowledge base by applying both syntactic and semantic matching in terms of manufacturing capabilities, in order to find the best possible supplier to fulfil a request. Different criteria for selection according to several qualitative and quantitative factors will be considered.
-
-
Comment: The modular nature of the COMPOSITION system will allow easy and fast scalability for use in both large and small manufacturing sites with high or low complexity. The systems should also be modular such that multiple smaller systems & sub-systems can easily be integrated into larger systems
Security by design approach. Development of a Security Framework composed by a core set of security mechanisms to guarantee the security, confidentiality, integrity and availability of the managed information for all authorised stakeholders in the supply chain while at the same time maintaining suitable levels of IPR and knowledge protection. The COMPOSITION Security Framework iapplies blockchain technology to provide an audit trail for manufacturing and supply chain data, enabling both product data traceability and secure access for stakeholders. Cybersecurity mechanisms will be developed to monitor and protect against potential threats that could affect the COMPOSITION infrastructure.