Page 95 - Trust in ICT 2017
P. 95

Trust in ICT                                                1


            •       Others: Depending on specific topics, a collaborative work is needed, for instance, identification
                    issue with SG2.

            Finally, a close collaboration with other SDOs and forums (listed below) is needed.
            •       Existing security solutions:  IETF, W3C
            •       IoT: oneM2M, FI-WARE, OIC, AllSeen Alliance
            •       Cloud Computing: TCG, Cloud Security Alliance
            •       Other groups: OTA

            Furthermore, there is a need to address lots of issues on governance and transparency while developing trust
            related standards.


            11      References



             [1]    B. Alcalde, “Towards a Decision Model based on Trust and Security Risk Management,” Seventh
                   Australasian Conference on Information Security, pp. 61-67, 2009.

             [2]    D. Gambetta, “Can We Trust Trust,” in Trust: Making and Breaking Cooperative Relations, 1990, pp.
                   213-238.
             [3]    M. S. T. Grandison, “A Survey of Trust in Internet Applications,” IEEE Communications Surveys and
                   Tutorials, 2009.

             [4]    Entrust, “White Paper: The concept of trust in network security,” 2011.

             [5]    I. Pranata and R. A. Geoff Skinner, “A Holistic Review on Trust and Reputation Management Systems
                   for Digital Environments,” International Journal of Computer and Information Technology, 2012.
             [6]    E. Chang, F. Hussain and T. S. Dillon, “Fuzzy nature of trust and dynamic trust modelling in service
                   oriented environments,” in Workshop on secure web services, Fairfax, USA, 2005.

             [7]    E. Chang, T. Dillon and F. K. Hussain, “Trust Reputation for Service-Oriented Environments,” West
                   Sussex, England, John Wiley & Sons Ltd, 2006.

             [8]    uTRUSTit-2012, “White Paper: Trust Definition “Defining, Understanding, Explaining TRUST within
                   the uTRUSTit Project”, August 2012.,” 2012.

             [9]    C. M. a. L. C. Liam McNamara, “Trust and Mobility aware Service Provision for,” in In Proceedings of
                   Workshop on Requirements and Solutions for Pervasive Software Infrastructures, Dublin, Ireland,
                   2006.

             [10]   A. C. &. J. P. &. C. Wolf, “SmartPrivacy for the Smart Grid: embedding privacy into the design of
                   electricity conservation,” Toronto, Ontario, Canada, 2010.
             [11]   L. Atzori, A. Iera and G. Morabito, “SIoT: Giving a Social Structure to the Internet of Things,”
                   Communications Letters, pp. 1193-1195, 2011.

             [12]   F. Bao and I. Chen, “Dynamic Trust Management for Internet of Things Applications,” in
                   International Workshop on Self-Aware Internet of Things, Self-IoT, USA, 2012.

             [13]   C. D. D. O. N. S. P. Bonatti, “An integration of reputation-based and policy-based trust
                   management,” in Proceedings of the Semantic Web Policy Workshop, 2005.

             [14]   T. Y. K. S. A. H. J. J. R. J. B. S. T. M. Winslett, “Negotiating trust on the web,” in IEEE Internet
                   Computing, 2002.




                                                                                                           87
   90   91   92   93   94   95   96   97   98   99   100