Work item:
|
TR.sg-lmcs
|
Subject/title:
|
Technical report: Security guidelines for DLT-based lifecycle management of computing services
|
Status:
|
Under study
|
Approval process:
|
Agreement
|
Type of work item:
|
Technical report
|
Version:
|
New
|
Equivalent number:
|
-
|
Timing:
|
2026-09 (Medium priority)
|
Liaison:
|
-
|
Supporting members:
|
China Mobile, ZTE, Beijing Jiaotong University
|
Summary:
|
Computing services consumers subscribe with service operators, and employ the computing resource provided by different computing resources providers. The credibility and security of the computing service is important to the consumers. The coordination and management of the distributed resources in securely and efficiently way is essential to the computing service operators. The protection of the fair rights and benefits is important for resource providers. The computing resources are owned by multiple different resources providers. There is a lack of trust between the different players in this service, which is the key problem for the challenges. In this technical report, DLT is used to establish trust among all the participants of computing services. The security requirements and guidelines for DLT based lifecycle management of computing services will be provided.
|
Comment:
|
-
|
Reference(s):
|
|
|
Historic references:
|
Contact(s):
|
|
ITU-T A.5 justification(s): |
|
|
|
First registration in the WP:
2024-03-11 13:05:03
|
Last update:
2024-03-12 09:42:08
|