Table of contents Reference Architecture INTRODUCTION Core Principles Stack and KITs BDI Technical Roles Trust KIT Digital Identity Digital Identity M2M Digital Identity H2M Authentication Authentication M2M Page Authentication H2M Authorization Edge agreements Policy agreements Onboarding Terms and Conditions Association Register Discovery Demos Trusted Goods Release & Delegation Logistics Event KIT Notification pub/sub service Event Choreography Trusted Goods Release - Event Demo Semantics KIT Overview Demos Representation KIT Representation Chain Professional Qualification Chain BDI Association Roles Demos Federation KIT Federation of Associations Business Partner Reputation Model Interoperability Demos Data Set KIT Data Licenses Demos Verifiable Credentials KIT Verifiable Credentials Provenance & Traceability Demos Security Information Security Policy Risk Assessment and Treatment Control Implementation Monitoring, Measurement, Analysis, and Improvement Security Software design Emergent security Anomaly detection and autopsy support Operational security Boundary Management Digital Asset Boundaries Physical Asset Boundaries Legal Asset Boundaries Demos GLOSSARY BDI Terms