Page 247 - Trust in ICT 2017
P. 247

Trust in ICT                                                5



           Recommendation ITU-T Y.3052 (2017) – Overview of Trust Provisioning in ICT
           Infrastructures and Services

                                                    Table of Contents


            1      Scope
            2      References

            3      Definitions
                   3.1      Terms defined elsewhere
                   3.2      Terms defined in this Recommendation
            4      Abbreviations and acronyms

            5      Conventions
            6      Introduction
                   6.1      Potential risks and necessity of trust

                   6.2      Trust provisioning in ICT infrastructures and services
            7      Overview of trust and trust provisioning
                   7.1      Concept of Trust
                   7.2      Fundamental characteristics of trust
                   7.3      Model for trust provisioning

                   7.4      Trust evaluation for trust provisioning
            8      Trust provisioning processes
                   8.1      Data collection

                   8.2      Data management
                   8.3      Trust information analysis
                   8.4      Dissemination of trust information
                   8.5      Trust information lifecycle management
            9      Security considerations

            Appendix I – Detailed potential risks in ICT infrastructures and services
                   I.1      Risks at the physical world
                   I.2      Risks at the cyber world

                   I.3      Risks at the social world
                   I.4      Risks from the integration of the physical, cyber, and social worlds
            Appendix II – Trustworthiness attributes
            Appendix III – Trust provisioning use cases

                   III.1    Trustworthy Peer-to-Peer Accommodation service
                   III.2    Smart office sharing
                   III.3    Document sharing service
                   III.4    Intermediate device selection in device-to-device environment
                   III.5    Used car transaction service

            Bibliography


                                                                                                         239
   242   243   244   245   246   247   248   249   250   251   252