Page 240 - Trust in ICT 2017
P. 240

4                                                    Trust in ICT



                    provide related technological capabilities in ICT infrastructure to ensure the integrity of transported
                    information (electronic documents).
            4)      The principle of unification. ICT used in trusted environment is required to have unified forms of
                    information,  while  maintaining  its  unique  content.  Due  to  the  possible  wide  range  of  entities
                    involved in information interaction within the trusted environment, it is especially important to use
                    unified interfaces of information interaction within the entire trusted environment.
            5)      The principle of scalability. Organizational and technical infrastructures of trusted environment in
                    ICT are required to have the capacity to enroll new participants enabling them to start operating
                    within trusted environment. These infrastructures are also required to enable their users to choose
                    a set of services matching the user’s needs.
            6)      The principle of equal reliability of infrastructure of trusted environment, which applies common
                    minimal security requirements to all of the participants, regardless of their own parameters. This is
                    important to prevent the occurrence of vulnerabilities in trusted environment in ICT, which can be
                    used to attack the whole trusted environment.
            7)      The principle of legalization of electronic documents in trusted environment, ensuring that issued
                    e-documents  are  equally  recognized  by  respective  jurisdictions  (e-apostille).  It  is  important  to
                    ensure  safety  and  integrity  of  information  flows  during  transportation through  networks  which
                    combined numerous ICT and standards.
            8)      The principle of client-oriented architecture which includes simple, clear and handy user interfaces
                    and  unified  system  of  accessors  to  the  services  in  trusted  environment  in  ICT.  It  also  includes
                    providing  capabilities  of  trusted  environment  in  ICT  within  the  widely  used  general  purpose
                    networks, e.g. Internet.
            9)      The principle of systematization, which includes three main components:

                    –   consistency of organizational, legal and technical arrangements;
                    –   consistency in reliability structures and infrastructure systems;
                    –   moving  from  bilateral  interoperability  arrangements  towards  multi-vectored  ones,  where
                        appropriate.
            This principle concerns not only technological area, but mainly legal and organizational field.

            10)     The principle of finiteness of trusted environment which suggests that trusted environment could
                    be  organized  in  the  scope  of  a  specific  information  interaction  space  and  to  be  continuously
                    maintained and improved within this space. In case where trusted environment in ICT covers the
                    whole existing ICT infrastructure, the complexity of trusted environment maintenance (including
                    administration)  becomes  extremely  high.  Therefore  it  is  reasonable  to  establish  trusted
                    environment only within the specific part of the ICT infrastructure, where maintaining is possible.
            It is important for ICT infrastructure to support implementation of all these principles to be compatible with
            trusted environment.























            232
   235   236   237   238   239   240   241   242   243   244   245