Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Introduction             
        6.1     Potential risks and necessity of trust  
        6.2     Trust provisioning in ICT infrastructures and services  
 7     Overview of trust and trust provisioning      
        7.1     Concept of trust          
        7.2     Fundamental characteristics of trust  
        7.3     Model for trust provisioning  
        7.4     Trust evaluation for trust provisioning
 8     Trust-provisioning processes            
        8.1     Data collection             
        8.2     Data management     
        8.3     Trust information analysis       
        8.4     Dissemination of trust information     
        8.5     Trust information lifecycle management          
 9     Security considerations       
Appendix I – Detailed potential risks in ICT infrastructures and services    
        I.1     Risks in the physical world       
        I.2     Risks in the cyber world            
        I.3     Risks in the social world            
        I.4     Risks arising from the integration of physical, cyber and social worlds   
Appendix II – Trustworthiness attributes    
Appendix III – Trust provisioning use cases    
      III.1     Trustworthy peer-to-peer accommodation service       
      III.2     Smart office sharing   
      III.3     Document-sharing service       
      III.4     Intermediate device selection in device-to-device environment             
      III.5     Used car transaction service   
Bibliography