Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Necessity of trusted environment in ICT infrastructure          
 7     Requirements for a trusted environment in the ICT infrastructure    
 8     The basic principles of for a trusted environment in an ICT   
Appendix I – The first steps for creating a trusted environment for cross-border e-commerce    
Appendix II – Use case of creating a trusted environment for rescue systems    
Bibliography