Page 243 - Trust in ICT 2017
P. 243
Trust in ICT 4
The principle of scalability – the security system is required to support the connection of new users and
groups, and ensure their interaction with the system immediately after the connection. For example, a man
entered the building, in which there was an emergency, should be immediately informed about the
emergency situation and his further actions should be corrected by the security system.
The principle of equal reliability – individual user characteristics (limits of hearing, vision, motor functions,
etc.) is required not to affect the timeliness of the information provision, the eligibility notification and
control process in an emergency evacuation.
The principle of legalization – the information from one security system is required to have full legal force in
another within trusted environment. For example, the alarms from external security systems (federal,
regional, municipal) should be relevant in the object security system (in the buildings) in the case of natural
disasters. The object system is required to organize the evacuation process and other actions of people in
the building in accordance with the external instructions to minimize the risk for human lives.
The principle of client-orientation – messages and signals from the security system is recommended to be
personalized for user. For example, the object security system may support individualized management of
the evacuation process and provide personal messages to mobile users terminals.
The principle of systematization – it is required to develop the uniform standards for security systems in
trusted environment as well as the uniform set of instructions in case of emergencies.
The principle of finiteness – the security system is recommended to be implemented within a limited space
(of the object, state, federal), in which the system will be maintained and improved: updating manuals,
instructions, the set of supporting events, types of emergencies, types of natural and man-made disasters,
technical characteristics of sensors, etc.
Bibliography
[b-ITU-T X.805] Recommendation ITU-T X.805 (2003), Security architecture for systems providing end-to-
end communications.
235