Page 95 - Trust in ICT 2017
P. 95
Trust in ICT 1
• Others: Depending on specific topics, a collaborative work is needed, for instance, identification
issue with SG2.
Finally, a close collaboration with other SDOs and forums (listed below) is needed.
• Existing security solutions: IETF, W3C
• IoT: oneM2M, FI-WARE, OIC, AllSeen Alliance
• Cloud Computing: TCG, Cloud Security Alliance
• Other groups: OTA
Furthermore, there is a need to address lots of issues on governance and transparency while developing trust
related standards.
11 References
[1] B. Alcalde, “Towards a Decision Model based on Trust and Security Risk Management,” Seventh
Australasian Conference on Information Security, pp. 61-67, 2009.
[2] D. Gambetta, “Can We Trust Trust,” in Trust: Making and Breaking Cooperative Relations, 1990, pp.
213-238.
[3] M. S. T. Grandison, “A Survey of Trust in Internet Applications,” IEEE Communications Surveys and
Tutorials, 2009.
[4] Entrust, “White Paper: The concept of trust in network security,” 2011.
[5] I. Pranata and R. A. Geoff Skinner, “A Holistic Review on Trust and Reputation Management Systems
for Digital Environments,” International Journal of Computer and Information Technology, 2012.
[6] E. Chang, F. Hussain and T. S. Dillon, “Fuzzy nature of trust and dynamic trust modelling in service
oriented environments,” in Workshop on secure web services, Fairfax, USA, 2005.
[7] E. Chang, T. Dillon and F. K. Hussain, “Trust Reputation for Service-Oriented Environments,” West
Sussex, England, John Wiley & Sons Ltd, 2006.
[8] uTRUSTit-2012, “White Paper: Trust Definition “Defining, Understanding, Explaining TRUST within
the uTRUSTit Project”, August 2012.,” 2012.
[9] C. M. a. L. C. Liam McNamara, “Trust and Mobility aware Service Provision for,” in In Proceedings of
Workshop on Requirements and Solutions for Pervasive Software Infrastructures, Dublin, Ireland,
2006.
[10] A. C. &. J. P. &. C. Wolf, “SmartPrivacy for the Smart Grid: embedding privacy into the design of
electricity conservation,” Toronto, Ontario, Canada, 2010.
[11] L. Atzori, A. Iera and G. Morabito, “SIoT: Giving a Social Structure to the Internet of Things,”
Communications Letters, pp. 1193-1195, 2011.
[12] F. Bao and I. Chen, “Dynamic Trust Management for Internet of Things Applications,” in
International Workshop on Self-Aware Internet of Things, Self-IoT, USA, 2012.
[13] C. D. D. O. N. S. P. Bonatti, “An integration of reputation-based and policy-based trust
management,” in Proceedings of the Semantic Web Policy Workshop, 2005.
[14] T. Y. K. S. A. H. J. J. R. J. B. S. T. M. Winslett, “Negotiating trust on the web,” in IEEE Internet
Computing, 2002.
87