Page 179 - Trust in ICT 2017
P. 179

Trust in ICT                                                3




            1       Scope
            This technical report provides an overview of trust provisioning for future trusted ICT infrastructures and
            services. More specifically, this technical report covers the following:
                   The importance and necessity of trust toward knowledge societies;
                   Concepts and key features of trust;
                   Key challenges and technical issues for trusted ICT infrastructures;

                   Architectural overviews of trusted ICT infrastructures;
                   Trust based ICT service models;
                   Summary of use cases for trusted ICT infrastructures;
                   Strategies for future standardization on trust.



            2       References
            The following ITU-T Recommendations and other references contain provisions which, through reference in
            the text of this technical report form basis and help understanding the topic of trust provisioning in ICT. At
            the time of publication, the editions indicated were valid. All Recommendations and other references are
            subject to revision; readers are therefore encouraged to investigate the possibility of applying the most
            recent edition of the Recommendations and other references listed below. A list of the currently valid ITU-T
            Recommendations is regularly published.

            [ITU-T M.3410]    Recommendation ITU-T M.3410 (2008), Guidelines and requirements for security
                               management systems to support telecommunications management.
            [ITU-T X.509]      Recommendation ITU-T X.509 (2012), Information technology - Open Systems
                               Interconnection - The Directory: Public-key and attribute certificate frameworks.
            [ITU-T X.1163]     Recommendation ITU-T X.1163 (2015), Security requirements and mechanisms of peer-
                               to-peer-based telecommunication networks.
            [ITU-T X.1252]     Recommendation ITU-T X.1252 (2010), Baseline identity management terms and
                               definitions.
            [ITU-T Y.2701]     Recommendation ITU-T Y.2701 (2007), Security requirements for NGN release 1.

            [ITU-T Y.2720]     Recommendation ITU-T Y.2720 (2009), NGN identity management framework.


            3       Terms and definitions

            3.1     Terms defined elsewhere

            This Technical Report uses the following terms defined elsewhere:
            3.1.1   Cloud computing [b-ITU-T X.1601]: A paradigm for enabling network access to a scalable and elastic
            pool of shareable physical or virtual resources with on-demand self-service provisioning and administration.
            3.1.2   Internet of Things [b-ITU-T Y.2060]: A global infrastructure for the information society, enabling
            advanced  services  by  interconnecting  (physical  and  virtual)  things  based  on  existing  and  evolving
            interoperable information and communication technologies.
            NOTE  1  –  Through  the  exploitation  of  identification,  data  capture,  processing  and  communication
            capabilities, the IoT makes full use of things to offer services to all kinds of applications, whilst ensuring that
            security and privacy requirements are fulfilled.
            NOTE 2 – From a broader perspective, the IoT can be perceived as a vision with technological and societal
            implications.



                                                                                                         171
   174   175   176   177   178   179   180   181   182   183   184