版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
NISTInternalReportNISTIR8356
SecurityandTrustConsiderationsforDigitalTwinTechnology
JeffreyVoasPeterMell
PhillipLaplanteVartanPiroumian
Thispublicationisavailablefreeofchargefrom:
/10.6028/NIST.IR.8356
NISTInternalReportNISTIR8356
SecurityandTrustConsiderationsforDigitalTwinTechnology
JeffreyVoas PeterMellPhillipLaplante
ComputerSecurityDivisionInformationTechnologyLaboratory
VartanPiroumianIndependentConsultant
Thispublicationisavailablefreeofchargefrom:
/10.6028/NIST.IR.8356
February2025
U.S.DepartmentofCommerce
JeremyPelter,ActingSecretaryofCommerce
NationalInstituteofStandardsandTechnology
CraigBurkhardt,ActingUnderSecretaryofCommerceforStandardsandTechnologyandActingNISTDirector
NISTIR8356
SecurityandTrustConsiderations
February2025
forDigitalTwinTechnology
Certaincommercialequipment,instruments,software,ormaterials,commercialornon-commercial,areidentifiedinthispaperinordertospecifytheexperimentalprocedureadequately.Suchidentificationdoesnotimply
recommendationorendorsementofanyproductorservicebyNIST,nordoesitimplythatthematerialsorequipmentidentifiedarenecessarilythebestavailableforthepurpose.
TheremaybereferencesinthispublicationtootherpublicationscurrentlyunderdevelopmentbyNISTin
accordancewithitsassignedstatutoryresponsibilities.Theinformationinthispublication,includingconceptsandmethodologies,maybeusedbyfederalagenciesevenbeforethecompletionofsuchcompanionpublications.
Thus,untileachpublicationiscompleted,currentrequirements,guidelines,andprocedures,wheretheyexist,remainoperative.Forplanningandtransitionpurposes,federalagenciesmaywishtocloselyfollowthe
developmentofthesenewpublicationsbyNIST.
OrganizationsareencouragedtoreviewalldraftpublicationsduringpubliccommentperiodsandprovidefeedbacktoNIST.ManyNISTcybersecuritypublications,otherthantheonesnotedabove,areavailableat
/publications
.
NISTTechnicalSeriesPolicies
Copyright,Use,andLicensingStatements
NISTTechnicalSeriesPublicationIdentifierSyntax
PublicationHistory
ApprovedbytheNISTEditorialReviewBoardon2025-01-31
HowtoCitethisNISTTechnicalSeriesPublication:
VoasJ,MellP,LaplanteP,PiroumianV(2025)SecurityandTrustConsiderationsforDigitalTwinTechnology.
(NationalInstituteofStandardsandTechnology,Gaithersburg,MD),NISTInternalReport(IR)NISTIR8356.
/10.6028/NIST.IR.8356
AuthorORCIDiDs
JeffreyVoas:0000-0003-1139-3690
PeterMell:0000-0003-2938-897X
PhillipLaplante:0000-0002-0415-271X
VartanPiroumian:0000-0000-0000-0000
ContactInformation
nistir-8356-comments@
NationalInstituteofStandardsandTechnology
Attn:ComputerSecurityDivision,InformationTechnologyLaboratory
100BureauDrive(MailStop8930)Gaithersburg,MD20899-8930
AdditionalInformation
Additionalinformationaboutthispublicationisavailableat
/pubs/ir/8356/final
,includingrelatedcontent,potentialupdates,anddocumenthistory.
AllcommentsaresubjecttoreleaseundertheFreedomofInformationAct(FOIA).
NISTIR8356
SecurityandTrustConsiderations
February2025
forDigitalTwinTechnology
i
Abstract
Digitaltwintechnologyenablesthecreationofelectronicrepresentationsofreal-worldentitiesandtheabilitytoviewthestatesandtransitionsbetweenstatesoftheseentities.Thisreport
discussestheconceptandpurposeofdigitaltwintechnologyanddescribesitscharacteristics,features,functions,andexpectedoperationaluses.Thisreportalsodiscussesbothtraditionalandnovelcybersecuritychallengespresentedbydigitaltwintechnologyaswellastrust
considerationsinthecontextofexistingNISTguidanceanddocuments.
Keywords
computercybersecurity;control;digitaltwintechnology;instrumentation;real-timecommand;real-timemonitoring;simulation;standards;testing;trust;usecasescenarios.
ReportsonComputerSystemsTechnology
TheInformationTechnologyLaboratory(ITL)attheNationalInstituteofStandardsand
Technology(NIST)promotestheU.S.economyandpublicwelfarebyprovidingtechnical
leadershipfortheNation’smeasurementandstandardsinfrastructure.ITLdevelopstests,testmethods,referencedata,proofofconceptimplementations,andtechnicalanalysestoadvancethedevelopmentandproductiveuseofinformationtechnology.ITL’sresponsibilitiesinclude
thedevelopmentofmanagement,administrative,technical,andphysicalstandardsand
guidelinesforthecost-effectivesecurityandprivacyofotherthannationalsecurity-relatedinformationinfederalinformationsystems.
Audience
Thispublicationisintendedforanyonewhowantstounderstandtheunderlyingtechnologyandenvisionedcapabilitiesofdigitaltwintechnology.ItisparticularlyapplicabletoStandardsDevelopingOrganizations(SDOs)andimplementersofdigitaltwintechnology.
NISTIR8356
SecurityandTrustConsiderations
February2025
forDigitalTwinTechnology
ii
PatentDisclosureNotice
NOTICE:ITLhasrequestedthatholdersofpatentclaimswhoseusemayberequiredfor
compliancewiththeguidanceorrequirementsofthispublicationdisclosesuchpatentclaimstoITL.However,holdersofpatentsarenotobligatedtorespondtoITLcallsforpatentsandITLhasnotundertakenapatentsearchinordertoidentifywhich,ifany,patentsmayapplytothis
publication.
Asofthedateofpublicationandfollowingcall(s)fortheidentificationofpatentclaimswhoseusemayberequiredforcompliancewiththeguidanceorrequirementsofthispublication,nosuchpatentclaimshavebeenidentifiedtoITL.
NorepresentationismadeorimpliedbyITLthatlicensesarenotrequiredtoavoidpatentinfringementintheuseofthispublication.
NISTIR8356
SecurityandTrustConsiderations
February2025
forDigitalTwinTechnology
iii
TableofContents
1.Introduction 1
2.DefinitionofDigitalTwins 2
3.MotivationandVision 4
3.1.AdvantagesofDigitalTwinTechnology…4
3.3.supportiveTechnologies…5
a.OperationsonDigitalTwins 7
4.1.DigitalTwinsDefinitionsandthecreationofDigitalTwinInstances…7
4.2.ManipulationandModificationofDigitalTwinDefinitionsandInstances…8
4.3.ExchangeofDigitalTwinDefinitionsandInstances…8
5.UsageScenariosforDigitalTwins 9
5.1.viewingstaticModelsofDigitalTwins…9
5.2.ExecutingandviewingDynamicModelsofDigitalTwins…9
5.3.Real-TimeMonitoringofReal-worldEntities11
5a.eal-imecommandandcontrolofeal-worldEntties………11
6.HighlightedUseCases 12
7.CybersecurityConsiderations 13
7.1.Novelcybersecuritychallenges13
7.1.1.MassiveInstrumentationofObjects 13
7.1.2.CentralizationofObjectMeasurements 14
7.1.3.VisualizationandRepresentationofObjectOperation 14
7.1.4.RemoteControlofObjects 14
8.TrustConsiderations 17
9.Conclusions 21
References 22
AppendixA.ListofSymbols,Abbreviations,andAcronyms 24
AppendixB.Glossary 25
NISTIR8356
SecurityandTrustConsiderations
February2025
forDigitalTwinTechnology
1
1.Introduction
Adigitaltwin(DT)isanelectronicrepresentationofareal-worldentity;providingthecapabilitytoevaluatethisentity.Adigitaltwincanemulatebothphysicalthings(e.g.,buildings,
electronics,livingthings),andnon-physicalthings(e.g.,processes,conceptualmodels).Aswithmanynewinformationtechnologies,digitaltwintechnologyemploysexistingfoundational
technologiesandmayreflectexistingcapabilities.Itcoverswhatcurrentlyexistsinmodeling
andsimulationbutthencastsabroadervisionforfuturecapabilities.Thefullbenefitsofdigitaltwintechnologywillrequireinteroperabledefinitions,tools,andstandardsaswellasearly
considerationofdigitaltwincybersecurityandtrust.Thissituationisespeciallytruefornascentstandardseffortsthatseektodefineandstructurethetechnology.
Thisreportintroducestheconceptofadigitaltwin,describestheunderlyingtechnologies,andexpandsonitscurrentcapabilitiesbydiscussingkeycomponents,functions,andcybersecurityandtrustconsiderations.Itisnotintendedtodefine“digitaltwin”–thisactivityshouldbe
undertakenbySDOs.Anydefinitionof“digitaltwin,”however,shouldaddressasetoftechnicalconsiderations,whichareofferedherein.Thesetechnicalconsiderationscanalsobeusedto
testanydefinitionthatiscreatedbyanySDO.
Thisreportisorganizedasfollows:
•Section
2
definesdigitaltwintechnology.
•Section
3
describesthemotivationsforusingdigitaltwintechnology,includingadvantagesandsupportivetechnologies.
•Section
4
discussestypicaloperationsperformedondigitaltwins.
•Section
5
describestechnicalusagescenariosfordigitaltwins.
•Section
6
providesexampleindustryapplicationsofdigitaltwintechnology.
•Section
7
explorescybersecurityconsiderationsinthecontextofexistingNISTguidancebyidentifyingandexploringtraditionalcybersecurityneeds,novelcybersecurity
challenges,andapproachesthatapplytodigitaltwintechnology.
•Section
8
discussestrustissuesthatcanpreventadigitaltwinfromprovidingthe
desiredoperationalfunctionalitywithanacceptablelevelofqualityinthecontextofexistingNISTguidance.
•Section
9
offersconcludingthoughts.
NISTIR8356
SecurityandTrustConsiderations
February2025
forDigitalTwinTechnology
2
2.DefinitionsofDigitalTwins
Thereareseveralexistingdefinitionsfordigitaltwins.Somehavebeencreatedbyresearchers,standardscommittees,consortia,andindustry.Othersareimplicitlysuggestedbycommercialenterprisesthatmakestatementsabouthowtheirsoftwareapplicationsare“digitaltwin-
compliant.”Despitethesedefinitionsthereisnoagreed-upondefinitionfororconsensusonthefullpotentialofdigitaltwins
[1]
.
TheDigitalTwinConsortium(DTC)offersthefollowingdescriptionfordigitaltwins:
Adigitaltwinisavirtualrepresentationofreal-worldentitiesandprocessessynchronizedataspecifiedfrequencyandfidelity.
•Digitaltwinsystemstransformbusinessbyacceleratingholistic
understanding,optimaldecision-making,andeffectiveaction.
•Digitaltwinsusereal-timeandhistoricaldatatorepresentthe pastandpresentandsimulatepredictedfutures.
•Digitaltwinsaremotivatedbyoutcomes,tailoredtousecases, poweredbyintegration,builtondata,guidedbydomain knowledge,andimplementedinIT/OTsystems
[1]
.
Asimplifieddefinitionfordigitaltwins
1
couldbe:
Adigitaltwinisthevirtual(i.e.,digital)representationofaphysicalorperceivedreal–worldentity,concept,ornotion.
Theuseoftheword“virtual”isappropriatebecauseadigitaltwinissomethingthathastheeffectbutnottheactualformofwhatisspecified.DTsoftwareimplementationspresentahumanuserwithanobject’svisualgraphicrepresentation,eitherstaticordynamic,viatheobject’sDT.
Arelatedimportanttermisthatofadigitaltwindefinition:
Adigitaltwindefinitionisamachine–readablespecificationthatdescribesfeaturesthatmaybemodeledforaparticulartypeofreal–worldentity.
Thus,adigitaltwindefinitionreferstoaparticulartypeofentityratherthanthespecificentityitself.Itdefinesthefeaturesofanentitytypethatcanbestaticallyanddynamicallymodeled,
howthosefeatureswillbedigitallyencodedandrepresented,andhowtheywillpersistina
digitalcomputerenvironment.Computersoftwareapplicationswillreaddigitaltwindefinitionstocreatedigitaltwininstances(orsimply,digitaltwin),whichareinstantiationsofreal-world
objectsthatmodelthestateofrepresentedobjects.
Whilemanyofthesereal-worldentitieshavephysicalforms(e.g.,anaircraftengine,anoil
derrick,avalveinanoilpipelinepumpingstation),digitaltwinscanalsorepresentsomething
abstract.TheDTCdefinitioncontainstheword“processes,”whichisanabstractnotion,andthesimplifieddefinitiondiscussesentitiesthatmaybeperceivedorconceivedwithouthavinga
1Section
3
discussesthedifferencesbetweendigitaltwintechnologyandtraditionalmodelingandsimulation,andSec.
9
discussestheimportanceofsynchronizationbetweenadigitaltwinandareal-worldentity.
NISTIR8356
SecurityandTrustConsiderations
February2025
forDigitalTwinTechnology
3
physicalform.Forexample,aprocessinacomputeroperatingsystemisreal,evenifitdoesnothaveaconcreteorphysicalshape.Itisaconglomerationofmultipleintangiblethings,suchaselectricalsignals,thestatesofregistersthatcontainvoltageandcurrentlevels,andthe
electricalstateofmemory.Whetheritisviewedstaticallyordynamically,acomputerprogramisreal,andonecanclearlyobservetheeffectsthatithasonotherobjects.
Abusinessprocessisanotherexampleofanabstractconceptthatisrealbuthasnomaterialform.Infact,somesoftwaredefinesdigitaltwinsasrepresentationsofbusinessprocesses.
Digitaltwinscouldevendescribethestepsinamanufacturingprocessorsimulateaspectsof
thedynamicexecutionofspecificprocessesinafactoryorchemicalplant,suchasoilrefiningortheproductionofnuclearfuel.Inshort,adigitaltwincanrepresentanythingthatahumancanconceiveorperceive,whetherphysicalornot.
NISTIR8356
SecurityandTrustConsiderations
February2025
forDigitalTwinTechnology
4
3.MotivationandVision
Elementsofdigitaltwintechnologyhavelongexistedincomputersandsoftwarethatrepresententitiesandsimulatedynamicbehavior.Now,thematurationofnumerousunderlying
technologiesismakingitpossibletobroadlyapplysimulationandmodelingintheformof
digitalrepresentationsandmakethetechnologyaccessibletoamuchwideruserbase.The
InternetofThings(IoT)hasledtotheemergenceofsmall,low-cost,battery-poweredsensorsthatconnectoveranetworkandenablemassivesensordeploymenttoawidevarietyof
objects(e.g.,modernbuildingsmayhavethousandsofsensors).Thesesensorsthenprovide
informationthatcanfeedandmaintaincomplexmodelsofthoseobjects.Theadvancesin
powerfulbutlow-costprocessingandstorageenableustomaintain,view,andmanipulate
thesedigitalreplicaswithouthavingtousespecial-purposeorexpensivehardware.Therecentadvancesinvirtualreality(VR)andaugmentedreality(AR)haveenabledinexpensive
visualizationofdigitaltwins.
Digitaltwintechnologyisalsoanadvancementoverexistingsimulationandmodelingbecauseitallowsforthereal-timemonitoringofentitieswhiledynamicallyupdatingtheirdigitaltwins.Thereisalsoatrendtoremotecontrolphysicalentitiesbymanipulatingdynamicmodels(i.e.,digitaltwins)asopposedtodirectlymanipulatingtheobjectsthemselves.Suchcontrolismoreindirectandabstractsawaydetailsthathumansmaynotbeabletomanage.
Standardsdevelopmentwilllikelyimpactwhetherdigitaltwintechnologybecomeswidely
used.MostIoTsystems,simulationandmodelingsoftware,andVRandARsystemscurrentlyexistinstovepipeproprietarysystemsandintegratingthemrequiressignificantwork.Muchoftheworkinemergingdigitaltwintechnologyisinthecreationofprotocolsandstandardsto
enableplugandplayintegration.Thegoalistobeabletoloadanydigitaltwincomputerfileintoadigitaltwinsystemandhaveitfunctionregardlessofwhatisbeingmodeled.
3.1.AdvantagesofDigitalTwinTechnology
Aplatformormechanismthatsupportsthecreationofdigitalmodelsofreal-worldobjectsisadvantageousforseveralreasons.Forexample,onecanstudytheobjectviaitsmodelpriortobuildingthereal-worldversion,studytheobjectasitprogressesthroughitslifecycle,and
conceivablycontroltheobjectthroughthemodeltopreventundesirableoutcomesfortheobject,thusreducingcertaintypesofrisk.
Thisadvantageincreaseswhenmodelingmultipleobjectsthatneedtoworktogether,eveniftheobjectsaremaintainedbydifferentorganizations.Ifcooperatingentitiescansharedigitaltwindefinitions,thentheycanmoreeasilymodelanddigitallysimulateobjectinteractions
priortotherealizationoftheoutputproduct.However,theinternaldefinitionsand
representationsoftheobjectsbeingmodeledbyeachsoftwareapplicationtendtobehighlyproprietary.Thedigitalartifactscreatedbytoday’sapplicationsarenoteasilyshared,andtheapplicationsarethereforenotinteroperable.
NISTIR8356
SecurityandTrustConsiderations
February2025
forDigitalTwinTechnology
5
3.2.ExpectationofStandards
Theadoptionofandadherencetostandardsmayensureinteroperability,compatibility,safety,andcybersecurity.Moreover,theassurancethatsoftwareandhardwaresystems,tools,and
applicationsadheretoandproperlyimplementstandardsengenderscredibilityandtrust
[3]
.
Effortsareunderwaytodevelopdigitaltwinspecificstandardsthatwillbeutilizedinadditiontotheexistingvariousinformationandcommunicationtechnologystandards.
Digitaltwintechnologywillbebuiltuponexistingcomputingsystemstacks,platform
architectures,programmingplatforms,systems,libraries,applicationprogrammerinterfaces
(APIs),andinfrastructure.Forexample,OpenGLisapossible3Dgraphicsstandardusedto
renderthevisualrepresentationcomponentofdigitaltwins.Whileexistingcybersecurity
encryptionstandardswillbeleveraged,multiplecooperating(orcompeting)standardsthatarespecifictodigitaltwintechnologywillbeneeded.Asinglestandardmaynotadequatelyaddressallneeds,andstandardsharmonizationorblendingmaybeappropriate
[4]
.Toolvendors,
softwareandhardwareapplicationvendors,anduserscancomplywithstandardsbyensuringthattheyonlyusevettedelements,whichshouldalsoleadtotheinteroperabilityoftoolsandapplications.
Oneapproachtoestablishingstandardsfordigitaltwintechnologyistofocusonstandardmechanismsforexchanginginformation,suchastherepresentationofreal-worldobjects.
Algorithmsthatsimulatethedynamicbehaviorofobjectscouldremainproprietarytoprotectintellectualproperty,butthedescriptionoftheobjectwhosebehaviorisbeingsimulatedcouldbestandardizedandopeninordertobeexchangedbetweenapplications,domains,industries,andverticalmarkets.Inthesimulationandmodelingarena,therearemanysophisticated
softwaretoolsandapplicationsthatsupport2Dand3Dmodelingandengineeringanalysis.
Eachoftheseapplicationsusesproprietaryinternalmodelstorepresenttheobjectsbeing
modeled(i.e.,thosecreatedbytheuser).Theyalsouseproprietaryandoftencloselyguardedalgorithmsthatrepresentthefunctionalcapabilitiesformodelingandsimulation.
Potentialstandardswouldneedtocovereachinvolvedbusinessdomain.Everyonewho
employsdigitaltwintechnologyinspecificbusinessdomainswouldneedtheirownunique
standardsandstandards-basedproductsthatadheretoacommonsetofbusinessprocessesandusecaseswhereinteroperabilitycanbeachieved.Itisinsufficientforstandardstomerelyenableinteroperabilityinpurelytechnologicaldomains.
3.3.SupportiveTechnologies
Twoofthesupportivetechnologiesthatsupporttherecentinterestindigitaltwintechnology
areVR/ARandIoT.OneexpectationfordigitaltwintechnologyistoleverageVRandARto
createenhanceduserinterfacesanduserexperiencesforhumanbeingstocomprehendthe
modeling,simulation,monitoring,andcommandandcontrolofcomplexentities.Humansrelyheavilyonvisualsensoryinput,andVRandARpromisetopresentmodelsofreal-worldentitiesthroughamediumthatisamenabletohumanconsumptionandcomprehension.
IoThasbeenreferencedindigitaltwindiscussionsandliteraturethankstorecentadvancesinsensorsandtheirongoinganddramaticproliferationinvariousoperations.Thesesensorsare
6
typicallynetwork-connectedanddrivetheabilityofdigitaltwinstomodelreal-worldobjectsinwaysthatwerenotpossibleuntilrecently.Additionally,IoTdevicesareoftenusedtocreateaninformationfabricor“network”thatconsistsoftheobservedentities,thesensorsthatobserveandgatherinformation,theconnectivityelements,theprocessingcomponents(i.e.,backend
computeservers),andthecomponentsthatusetheprocessedIoTdata.Withthesenew
sensorsbeingdeployedonanIoTfabric,digitaltwinscanrepresentanddynamicallymaintaintherepresentationofaninstanceofaninstrumentedobject
[5]
.
Thus,theapplicationofdigitaltwinsgoesbeyondsimplymodelingaclassofreal-worldentities.Itcanalsobeusedtorepresentandtrackaspecificobject,maintainthereal-timestatus,and
presentadynamicallyupdatedviewtoauser.Withanaccurateunderstandingofthestateof
anobject,adigitaltwinmayalsobemanipulatedbyausertocontroltheactualobject,
meaningthatDTtechnologymayadvancebeyondtraditionalmodelingandsimulationsoftwaretoencompasscommand-and-control.Forexample,operatorscouldremotelycommandsurfacerailorsubwaytrainsfromanoperationscenter.
Dependingontheobject,asystemthatmonitorstheobject’sstatemayneedtounderstandthestate’sratesofchange.Forexample,asystemthatmonitorstherateofvelocitychangemay
needtodetectwhentheboundariesofsafeoperationaresurpassed.Forthis,artificial
intelligence(AI)andmachinelearning(ML)couldpotentiallyoutperformtraditionalcomputingmethodsaswellashumanswhomonitorconditionsandmakepredictions.Scientistsand
engineerscouldcreatemodelsofreal-worldconditionsandemploythemtotrainAIsystemstorecognizethoseconditions.Suchapplicationsforsimulation,modeling,andmonitoringare
majormotivationforadvancingdigitaltwintechnology.
NISTIR8356
SecurityandTrustConsiderations
February2025
forDigitalTwinTechnology
7
4.OperationsonDigitalTwins
Thissectiondiscussesseverallower-leveloperationsthatareperformedondigitaltwins:
•Digitaltwindefinitions(i.e.,descriptionsofobjecttypes)andthecreationofdigitaltwininstances
•Manipulationandmodificationofdigitaltwindefinitionsandinstances
•Exchangeviaelectroniccommunicationsofdigitaltwindefinitionsandinstances
Itisenvisionedthattherewillbemanydigitaltwindefinitionsthatdescribemanykindsofentities.Thissectionalsodiscussesoperationsondigitaltwins,
2
whicharespecificinstancescreatedfromdigitaltwindefinitions.
4.1.DigitalTwinsDefinitionsandtheCreationofDigitalTwinInstances
Adigitaltwindefinitionisaformaldescriptionofthereal-worldentitythatthedigitaltwinrepresents.Forthepurposesofthisreport,thinkofaformaldescriptionasatechnical
definitionofaparticularcategoryorclassofreal-worldobjects.
Thestartingpointforallactivityinvolvingdigitaltwintechnologyistocreateorfindadigital
twindefinitionthatrepresentsthetypeofreal-worldobjectthatistoberepresentedvirtually.Computersoftwareapplicationsarethenusedtocreateaninstanceforthatdefinitiontoholdand/ormaintainthestateoftherepresentedobject.Thesedigitaltwinelectronicinstancescanrepresentbothstaticanddynamicmodelsofthereal-worldentitiesthatcorrespondtotheir
respectivedigitaltwindefinitions.
Thespecificdigitaltwindefinitioncreatedforsomeobjecttypeswilldictatetheprecisemakeupoftheartifactsthatareinstantiatedfromthedefinition.Forexample,adigitaltwindefinitionisnotrequiredtoincludeadynamicviewofitsreal-worldcounterpart.Rather,itcouldcompriseonlyastaticviewoftheobject.Thus,notalldigitaltwindefinitionswillnecessarilycontainall
possibledeclarationsordefinitionconstructsdefinedinsomefuturestandard.Similarly,notallhypertextmarkuplanguage(HTML)filesutilizealltagsdefinedbytheHTMLstandard
[6]
.Ifa
particulardigitaltwindefinitiononlysupportsrepresentingastaticmodelofanentity,the
relatedinstanceswouldcontainnodynamicinformation,suchashowtorenderanimation,
video,ordynamicgraphics.Consider,forexample,aVRpresentationofanavalvessel.AstaticviewcouldrepresenttheinternalelementsoftheshipseenthroughVRasifapersonwere
literallywalkingthroughthevessel.VRtechnologywouldbemoreamenabletothisapplicationthana3DPDFview.Thelatterwouldcomprisedetailedengineeringdrawingstantamounttoanarchitect’sblueprintdrawings.However,itwouldbedifficulttopresenttheequivalentofwhatapersonwouldseewalkingthroughtheinterioroftheship.
Adigitaltwindefinitionshouldcreateamodeloftheobjectitrepresents,notjustaparticular
view.Themodelcouldthenbeusedtopresentthedesiredviewpointofthereal-worldentity.Adefinitioncancontainasmuchoraslittleinformationaboutitsreal-worldcounterpartasits
2Areferencetoa“digitaltwin”withoutotherqualifiersreferstothedigitaltwininstancethatrepresentstheentity.
NISTIR8356
SecurityandTrustConsiderations
February2025
forDigitalTwinTechnology
8
authordesires,whichmaylimitthetypesofviewsthatcanbecreated.Digitaltwindefinitionauthorsdecidethebreadth,scope,degreeofgranularity,anddetail.
Apracticalconsiderationistheprocessofdigitaltwindefinitionauthoringandencoding.Whileitmaybepossibletoauthordefinitionsusingatexteditor,thispracticecouldbecome
supplantedbymoreadvancedtools.Thisissimilartohownotmanypeoplehand-codeHTMLorXMLanymore
[7]
.Moreover,thecomplexityofdigitaltwindefinitionscouldentirelyprecludetheabilitytocraftdefinitionsbyhand.Manyindustriesusesophisticatedsoftwareapplicationstocreatedigitalartifactsthatrepresentwhattheyplantobuild.Someofthesesoftware
applicationssupportthe“export”oftheirartifactsinstandardfileformatsandencodings,suchasthe3DPDFstandard
[8]
.However,themajorityoftheseapplicationsusetheirown
propri
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年六安市叶集区人民医院招聘2人考试历年真题汇编附答案
- 2025年温州平阳县第二人民医院医共体公开招聘工作人员13人备考题库附答案
- 2025年甘肃省平凉华亭市城镇公益性岗位专场招聘会备考题库(115人)附答案
- 2025年马鞍山市民政局下属事业单位招聘编外聘用人员3名考试模拟卷附答案
- 2025年黑龙江省神经精神病医院引进高层次人才(博士)招聘4人备考题库附答案
- 2025广东广州市黄埔区人民政府黄埔街道办事处党建组织员招聘1人(公共基础知识)综合能力测试题附答案
- 2026广东蓝海豚旅运股份有限公司招聘1人笔试备考试题及答案解析
- 2026北京协和医院内科ICU合同制科研助理招聘笔试模拟试题及答案解析
- 2026年1月西安医学高等专科学校附属医院招聘(58人)笔试模拟试题及答案解析
- (拓展拔高)2025-2026学年下学期人教统编版小学语文四年级第三单元练习卷
- 五育融合课件
- 海姆立克急救课件 (完整版)
- 2025年互联网营销游戏化营销案例解析可行性研究报告
- DB31∕T 1048-2020“上海品牌”认证通 用要求
- 意识障碍的判断及护理
- 病理性赌博的识别和干预
- 2025年宿迁市泗阳县保安员招聘考试题库附答案解析
- 校园文化建设协议合同
- 2025年广东省中考物理试卷及答案
- 2026届高三语文联考作文题目导写分析及范文:当语言与真实经验脱钩
- 皮革项目商业计划书
评论
0/150
提交评论