Page 239 - Trust in ICT 2017
P. 239

Trust in ICT                                                4


            Interoperability

            •       It is required to provide for all participants interacting within trusted environment to be able to
                    exchange information with any entity within trusted environment in ICT infrastructure.
            •       Trusted  environment  in  ICT  infrastructure  is  required  to  support  internetwork  connections  to
                    provide unified interaction capabilities to each participant independent of technical infrastructure
                    (core networks) used.
            •       All predictability, information security and availability of administration services requirements are
                    required to be supported for internetwork connections.
            Availability of administration services

            •       Continuous customer support is required to be provided for all participants of interaction within
                    trusted environment in ICT infrastructure as well as prompt compensation in the case of failure in
                    the provision of services.
            •       Trusted environment in ICT and its technical infrastructures are required to maintain the capacity to
                    enroll  new  participants  enabling  them  to  rapidly  integrate  and  start  operating  within  trusted
                    environment in ICT.


            8       The basic principles of trusted environment in ICT

            The need to create trusted environment is associated with the increased convergence of ICT, general mobility
            and increasing the number of interactions between humans and machines. The task of creating trusted
            environment  especially  actual  for  ICT  used  in  socially  and  economically  significant  interactions  between
            machines,  humans,  organizations  and  other  entities.  Examples  of  such  interactions  are  e-commerce,  e-
            government and rescue guidance in emergency. The latter is related to a direct threat to human life and also
            represents high importance interaction within trusted environment.

            The  trusted  environment  in  global  scope  is  prevented  by  absence  of  ICT  interoperability.  The  field  of
            interoperability of ICT can be characterized by the following statements:

            1)      Presence of a large number of information systems operating within the governmental institutions
                    and companies. These systems typically use their own hardware and software, and most of them
                    can not exchange information directly in the "machine-to-machine" mode.
            2)      The presence of many competing standards that only hinder the exchange of information despite
                    the  excellent  work  carried  out  by  numerous  standardization  bodies  (at  national,  regional  and
                    international levels).

            3)      The majority of developed economies are not ready to abandon the already established and well-
                    functioning information systems for the benefit of future non-prescribed systems.

            Basic principles of creation of trusted environment in ICT are:

            1)      The principle of non-discrimination - the electronic interaction in trusted environment will not be
                    exempted from legal consequences, validity or enforceability solely on the ground that it is provided
                    in electronic form. This involves adoption of regulatory legal acts, but the first step is to provide
                    related  technological  capabilities  in  ICT  infrastructure  to  ensure  the  same  level  of  security  for
                    electronic  transactions  as  signature  on  the  paper  documents.  E-signature  and  certification
                    authorities can serve as examples of such technologies.
            2)      The principle of technological neutrality of ICT in trusted environment, which involves creating
                    trusted environment in ICT neutral with regard to the given technology used. Given the rapid pace
                    of  technological  progress  neutral  regulations  are  intended  to  allow  the  use  of  any  future
                    development without further action of the legislative procedure.
            3)      The principle of functional equivalence, which sets the criteria by which electronic interactions (for
                    example, electronic  document) may  be  recognized as  the  equivalent of  live  interactions  (paper
                    documents). This provision involves the adoption of regulatory legal acts, but the first step is to



                                                                                                         231
   234   235   236   237   238   239   240   241   242   243   244