Page 264 - Trust in ICT 2017
P. 264
5 Trust in ICT
Appendix II
Trustworthiness attributes
(This appendix does not form an integral part of this Recommendation.)
This appendix provides some descriptions about trustworthiness attributes. Table II.1 shows general
description of trustworthiness attributes which are introduced in clause 7.1.1.
Table II.1 – Trustworthiness attributes
Trust-worthiness Attributes Description
The quality or state of something that is not easily changed or likely
to change at any time.
Stability means that a physical things perform its own operation
consistently. That is, with a given input, the physical thing always
Stability
gives the same output. Users may consider cyber objects to be stable
if they performs communication, control, and computing functions
work continuously. In other words, stability might imply that a
stakeholder continuously performs his/her role.
The ability of an entity to perform a required function sufficiently
under any conditions.
Reliability means that a physical thing works properly by following
Reliability user’s requests at any condition. The reliability of a cyber object
might imply that the cyber object fulfils the required quality of
service. The reliability can be measured as probability that an entity
correctly performs a required job in a specified period of time under
stated conditions.
The ability of something to adapt to increased demands. The
capability of a system or process to handle a growing amount of
work, or its potential to be enlarged in order to accommodate that
Ability / growth.
Capability Scalability Cyber-physical systems which can afford to handle numerous
sensors and their measured data might be judged scalable. Cyber
objects that can process huge amount of queries and requests also
might be considered as scalable.
The ability to protect the entity from existing risk and danger; the
ability to take care of oneself not to be in danger of oneself. The
ability to operate without risk of injury or harm to users and the
system’s environment.
Safety
A service that adopts the cyber security system might be thought
safe from existing internal and external cyber-attack. On the other
hands, the device itself might be safe when the device satisfies
safety certification of each country.
Strong and effective in all or most situations and conditions. The
ability of a system to cope with errors during execution and
erroneous input. The capability of the service to behave in an
acceptable way in anomalous or unexpected situations or when the
Robustness
context changes.
Users might consider the system with backup process and fault
tolerant robust. For example, the communication system might be
established with robustness by installing duplicate paths to each
256