Page 243 - Trust in ICT 2017
P. 243

Trust in ICT                                                4


            The principle of scalability – the security system is required to support the connection of new users and
            groups, and ensure their interaction with the system immediately after the connection. For example, a man
            entered  the  building,  in  which  there  was  an  emergency,  should  be  immediately  informed  about  the
            emergency situation and his further actions should be corrected by the security system.


            The principle of equal reliability – individual user characteristics (limits of hearing, vision, motor functions,
            etc.) is required not to affect the timeliness of the information provision, the eligibility notification and
            control process in an emergency evacuation.

            The principle of legalization – the information from one security system is required to have full legal force in
            another  within  trusted  environment.  For  example,  the  alarms  from  external  security  systems  (federal,
            regional, municipal) should be relevant in the object security system (in the buildings) in the case of natural
            disasters. The object system is required to organize the evacuation process and other actions of people in
            the building in accordance with the external instructions to minimize the risk for human lives.

            The principle of client-orientation – messages and signals from the security system is recommended to be
            personalized for user. For example, the object security system may support individualized management of
            the evacuation process and provide personal messages to mobile users terminals.

            The principle of systematization – it is required to develop the uniform standards for security systems in
            trusted environment as well as the uniform set of instructions in case of emergencies.

            The principle of finiteness – the security system is recommended to be implemented within a limited space
            (of the object, state, federal), in which the system will be maintained and improved: updating manuals,
            instructions, the set of supporting events, types of emergencies, types of natural and man-made disasters,
            technical characteristics of sensors, etc.







                                                     Bibliography




            [b-ITU-T X.805]  Recommendation ITU-T X.805 (2003), Security architecture for systems providing end-to-
                                end communications.





























                                                                                                         235
   238   239   240   241   242   243   244   245   246   247   248