iSHARE Dataspace Template
Other Resources
  • Introduction to the iSHARE Data Space Template
  • Documentation structure
  • Designed on basis of the iSHARE Trust Framework 2.0
  • Glossary
  • Legal notices
  • Business
    • Business model
    • Use cases
    • Data products
    • Data space intermediary
  • Governance
    • Organisational governance & governance authority
    • Participation management
  • Legal
    • Regulatory compliance
    • Contractual framework
  • Data interoperability
    • Data models
    • Data exchange
    • Provenance and traceability
  • Data sovereignty & trust
    • Access & usage policies and enforcement
    • Identity & attestation management
    • Trust framework
  • Data value creation
    • Data, services & offerings descriptions
    • Publication & discovery
    • Value added services
  • Operational
    • Operational processes
Powered by GitBook
LogoLogo

  • Cookie Policy

  • Privacy Policy

  • Imprint

  • Contact Us

Copyright © 2024 iSHARE Foundation

On this page
  1. Business

Use cases

PreviousBusiness modelNextData products

Last updated 10 months ago

The iSHARE Trust Framework describes , explaining the basic design and implementation of the Trust Framework:

The three primary use cases are supported by .

A more practical description of the frameworks functionality is provided in .

These use cases provide a generic overview of functionality the framework provides. In order to get a more practical view on provided functionality by this particular data space, it is suggested to provide real life examples under this page, that resonate with (potential) data space participants.

DSSC description

The value of a data space stems from its use cases. Data space use cases are specific settings where two or more participants use a data space to create business, societal or environmental value from data sharing. Use Case Development aims to amplify such value of a data space. Use cases are operational settings. Not yet operational, planned or envisaged settings are called use case scenarios.

The consecutive and partially iterative core elements of Use Case Development are identification and monitoring of use case scenarios, refinement of use case scenarios, and use case implementation. New ideas for potential future use cases are generated in the identification and monitoring of use case scenarios process element. Use case implementation enables the realisation of best use case scenarios into operative use cases once their details have been set and viability tested in refinement of use case scenarios. Refinement of use case scenarios is the most central element. It includes, at the minimum, the setting of the purpose and value of the use case, the parties participating in the use case, and the necessary data flows of the use case. The three other elements of Use Case Development that are simultaneous with and supportive of refinement of use case scenarios are brokering and ensuring synergies, support for value sharing in use cases, and ensuring adherence to principles.

The complete description is available .

three primary use cases
Machine-to-machine service provision
Human-to-machine service provision with identity info at the Service Provider
Human-to-machine service provision with identity info at the Identity Provider
seven secondary use cases
these four example use cases
here