Page 239 - Trust in ICT 2017
P. 239
Trust in ICT 4
Interoperability
• It is required to provide for all participants interacting within trusted environment to be able to
exchange information with any entity within trusted environment in ICT infrastructure.
• Trusted environment in ICT infrastructure is required to support internetwork connections to
provide unified interaction capabilities to each participant independent of technical infrastructure
(core networks) used.
• All predictability, information security and availability of administration services requirements are
required to be supported for internetwork connections.
Availability of administration services
• Continuous customer support is required to be provided for all participants of interaction within
trusted environment in ICT infrastructure as well as prompt compensation in the case of failure in
the provision of services.
• Trusted environment in ICT and its technical infrastructures are required to maintain the capacity to
enroll new participants enabling them to rapidly integrate and start operating within trusted
environment in ICT.
8 The basic principles of trusted environment in ICT
The need to create trusted environment is associated with the increased convergence of ICT, general mobility
and increasing the number of interactions between humans and machines. The task of creating trusted
environment especially actual for ICT used in socially and economically significant interactions between
machines, humans, organizations and other entities. Examples of such interactions are e-commerce, e-
government and rescue guidance in emergency. The latter is related to a direct threat to human life and also
represents high importance interaction within trusted environment.
The trusted environment in global scope is prevented by absence of ICT interoperability. The field of
interoperability of ICT can be characterized by the following statements:
1) Presence of a large number of information systems operating within the governmental institutions
and companies. These systems typically use their own hardware and software, and most of them
can not exchange information directly in the "machine-to-machine" mode.
2) The presence of many competing standards that only hinder the exchange of information despite
the excellent work carried out by numerous standardization bodies (at national, regional and
international levels).
3) The majority of developed economies are not ready to abandon the already established and well-
functioning information systems for the benefit of future non-prescribed systems.
Basic principles of creation of trusted environment in ICT are:
1) The principle of non-discrimination - the electronic interaction in trusted environment will not be
exempted from legal consequences, validity or enforceability solely on the ground that it is provided
in electronic form. This involves adoption of regulatory legal acts, but the first step is to provide
related technological capabilities in ICT infrastructure to ensure the same level of security for
electronic transactions as signature on the paper documents. E-signature and certification
authorities can serve as examples of such technologies.
2) The principle of technological neutrality of ICT in trusted environment, which involves creating
trusted environment in ICT neutral with regard to the given technology used. Given the rapid pace
of technological progress neutral regulations are intended to allow the use of any future
development without further action of the legislative procedure.
3) The principle of functional equivalence, which sets the criteria by which electronic interactions (for
example, electronic document) may be recognized as the equivalent of live interactions (paper
documents). This provision involves the adoption of regulatory legal acts, but the first step is to
231