Page 240 - Trust in ICT 2017
P. 240
4 Trust in ICT
provide related technological capabilities in ICT infrastructure to ensure the integrity of transported
information (electronic documents).
4) The principle of unification. ICT used in trusted environment is required to have unified forms of
information, while maintaining its unique content. Due to the possible wide range of entities
involved in information interaction within the trusted environment, it is especially important to use
unified interfaces of information interaction within the entire trusted environment.
5) The principle of scalability. Organizational and technical infrastructures of trusted environment in
ICT are required to have the capacity to enroll new participants enabling them to start operating
within trusted environment. These infrastructures are also required to enable their users to choose
a set of services matching the user’s needs.
6) The principle of equal reliability of infrastructure of trusted environment, which applies common
minimal security requirements to all of the participants, regardless of their own parameters. This is
important to prevent the occurrence of vulnerabilities in trusted environment in ICT, which can be
used to attack the whole trusted environment.
7) The principle of legalization of electronic documents in trusted environment, ensuring that issued
e-documents are equally recognized by respective jurisdictions (e-apostille). It is important to
ensure safety and integrity of information flows during transportation through networks which
combined numerous ICT and standards.
8) The principle of client-oriented architecture which includes simple, clear and handy user interfaces
and unified system of accessors to the services in trusted environment in ICT. It also includes
providing capabilities of trusted environment in ICT within the widely used general purpose
networks, e.g. Internet.
9) The principle of systematization, which includes three main components:
– consistency of organizational, legal and technical arrangements;
– consistency in reliability structures and infrastructure systems;
– moving from bilateral interoperability arrangements towards multi-vectored ones, where
appropriate.
This principle concerns not only technological area, but mainly legal and organizational field.
10) The principle of finiteness of trusted environment which suggests that trusted environment could
be organized in the scope of a specific information interaction space and to be continuously
maintained and improved within this space. In case where trusted environment in ICT covers the
whole existing ICT infrastructure, the complexity of trusted environment maintenance (including
administration) becomes extremely high. Therefore it is reasonable to establish trusted
environment only within the specific part of the ICT infrastructure, where maintaining is possible.
It is important for ICT infrastructure to support implementation of all these principles to be compatible with
trusted environment.
232