1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Introduction
6.1 Potential risks and necessity of trust
6.2 Trust provisioning in ICT infrastructures and services
7 Overview of trust and trust provisioning
7.1 Concept of trust
7.2 Fundamental characteristics of trust
7.3 Model for trust provisioning
7.4 Trust evaluation for trust provisioning
8 Trust-provisioning processes
8.1 Data collection
8.2 Data management
8.3 Trust information analysis
8.4 Dissemination of trust information
8.5 Trust information lifecycle management
9 Security considerations
Appendix I – Detailed potential risks in ICT infrastructures and services
I.1 Risks in the physical world
I.2 Risks in the cyber world
I.3 Risks in the social world
I.4 Risks arising from the integration of physical, cyber and
social worlds
Appendix II – Trustworthiness
attributes
Appendix III – Trust
provisioning use cases
III.1 Trustworthy peer-to-peer accommodation service
III.2 Smart office sharing
III.3 Document-sharing service
III.4 Intermediate device selection in device-to-device environment
III.5 Used car transaction service
Bibliography