01-10-2016
-30-09-2019
Calltopic: FoF.2016.11
Comments
cloud solution Open APIs and Communication Protocols ICT performance characteristics Application level interoperability Data communication and interoperability NIMBLE Task 2.3 OpenAPI for the NIMBLE Platform
Periodic Reporting for period 1 - NIMBLE (Collaboration Network for Industry, Manufacturing, Business and Logistics in Europe) Result description architectural baseline that takes into account the expertise provided by e.g. the IIRA, RAMI, FI-Ware and COMPOSE architectures. (2) Interoperability: improve semantic interoperability to enable cross-platform
Design of an Open API for the NIMBLE Platform Result comments result_rcn_EC admin deliverableType_EC admin Documents, reports Connectivity & network interoperability – communication protocols ICT performance characteristics Integration level interoperability Data
Semantic/information interoperability Taxon title Semantic/information interoperability
AAA - Access, Authorisation and Authentication Taxon description Once authorized, and authenticated, access can be granted to the location, system, application, and / or information. Access control levels can thus be set up on different layers.
Periodic Reporting for period 1 - NIMBLE (Collaboration Network for Industry, Manufacturing, Business and Logistics in Europe) Result description architectural baseline that takes into account the expertise provided by e.g. the IIRA, RAMI, FI-Ware and COMPOSE architectures. (2) Interoperability: improve semantic interoperability to enable cross-platform
Design of an Open API for the NIMBLE Platform Result comments result_rcn_EC admin deliverableType_EC admin Documents, reports Connectivity & network interoperability – communication protocols ICT performance characteristics Integration level interoperability Data
Semantic/information interoperability Taxon title Semantic/information interoperability
AAA - Access, Authorisation and Authentication Taxon description Once authorized, and authenticated, access can be granted to the location, system, application, and / or information. Access control levels can thus be set up on different layers.