Trust in ICT  2017
Foreword
Table of contents
1.Standardization ofTrust ProvisioningStudy
     1 Scope
     2 Abbreviations and acronyms
     3 Introduction
     4 Understanding of Trust
          4.1 Definition of Trust
               4.1.1 Generic Definition of Trust in ICT
               4.1.2 Trust Definitions under Different Perspectives
               4.1.3 Different stakeholders� viewpoints on trust
          4.2 General Aspects of Trust
               4.2.1 Trust Notation
               4.2.2 Trust Characteristics
          4.3 Key features of Trust
               4.3.1 Classifications for trust provisioning
               4.3.2 The Trust Metrics and Technical Attributes
               4.3.3 Level of trust
               4.3.4 Trust domain
          4.4 Trust in ICT Environment
               4.4.1 Knowledge and Trust
               4.4.2 Relationships with security and privacy
     5 Use cases and explanation of trust provisioning
          5.1 Trust Use Cases in Networking Aspects
               5.1.1 Trust-based routing protocols
                    5.1.1.1 Description
                    5.1.1.2 Actors
                    5.1.1.3 Pre-condition
                    5.1.1.4 Triggers
               5.1.2 Trust-based malicious node detection and prevention
                    5.1.2.1 Description
                    5.1.2.2 Actors
                    5.1.2.3 Pre-condition
                    5.1.2.4 Triggers
               5.1.3 Trust-based access control mechanism
                    5.1.3.1 Description
                    5.1.3.2 Actors
                    5.1.3.3 Pre-condition
                    5.1.3.4 Triggers
                    5.1.3.5 High Level Illustration
          5.2 Use Case of Services and Applications in IoT
               5.2.1 Trusted Data Usage Mechanism in Smart Cities
                    5.2.1.1 Definition
                    5.2.1.2 Actors
                    5.2.1.3 Triggers
               5.2.2 Secure Remote Patient Care and Monitoring
                    5.2.2.1 Description
                    5.2.2.2 Actors
                    5.2.2.3 Pre-condition
                    5.2.2.4 Triggers
               5.2.3 Trust for Time critical and Real-time applications
                    5.2.3.1 Definition
               5.2.4 Home energy Management
                    5.2.4.1 Description
                    5.2.4.2 Actor list
                    5.2.4.2 Analysis
               5.2.5 Smart Office Service
                    5.2.5.1 Description
                    5.2.5.2 Actor list
               5.2.6 Document sharing
                    5.2.6.1 Description
                    5.2.6.2 Actor list
                    5.2.6.3 Analysis
               5.2.7 Multi-hop device-to-device network path selection
                    5.2.7.1 Description
                    5.2.7.2 Actor list
                    5.2.7.3 Analysis
               5.2.8 Trust provisioning of used car transaction service
                    5.2.8.1 Description
                    5.2.8.2 Actor list
                    5.2.8.3 Analysis
               5.2.9 Trust provisioning of car sharing system
                    5.2.9.1 Description
                    5.2.9.2 Actor list
                    5.2.9.3 Trigger
                    5.2.9.4 Pre-conditions
                    5.2.9.5 Analysis
               5.2.10 Trust provisioning of mobility management
                    5.2.10.1 Description
                    5.2.10.2 Actors
                    5.2.10.3 Analysis
               5.2.11 Smart Building use case
                    5.2.11.1 Description
                    5.2.11.2 Actors
                    5.2.11.3 Analysis
          5.3 Summary of User Cases
     6 A strategy for trust provisioning of ICT infrastructure, services and applications
          6.1 Understanding of Trust Taxonomy
          6.2 Trust Provisioning Processes
               6.2.1 Data Collection Strategy
               6.2.2 Data Parsing and Access Control
               6.2.3 Data Processing and Trust Analytic
                    6.2.3.1 Trust Model and Trust Metrics
                    6.2.3.2 Trust Ontology
               6.2.4 Reputation and Trust Analytic
               6.2.5 Trust Establishment
                    6.2.5.1 Trust Establishment Policy
                         6.2.5.1.1 Social Patterns
                         6.2.5.1.2 The Lifespan of Elements of Reputation and Recommendation
                    6.2.5.2 Reputation Boot-Strap and Incentive Policies
               6.2.6 Trust Computation
               6.2.7 Trust Management System
               6.2.8 Decision Making
          6.3 Trust Provisioning in Networking Domain
               6.3.1 Security and Privacy
               6.3.2 Region
          6.4 Trust Provisioning in Architecture Domain
               6.4.1 CT Ecosystem
          6.5 Trust Provisioning in System Domain
               6.5.1 System Lifecycle
          6.6 Trust Provisioning for Services and Applications
     7 Architecture framework for trusted social cyber physical infrastructure
          7.1 Social-Cyber-Physical Infrastructure
          7.2 Social-Cyber-Physical Trust Relationships
          7.3 Trust Components and Platform Architecture
          7.4 Develop a framework for decision making in the trust analysis system of trustworthy ICT Eco-system
          7.5 Specify key functionalities and standard interfaces for autonomic decision making
     8 Trust modeling and policy/rule-based decision making
          8.1 Information context of a trust model
          8.2 Trust modeling based on key features of trust
               8.2.1 Develop a trust model for a specific use case
                    8.2.1.1 Trust Networks on Sematic Webs
                    8.2.1.2 Beta Reputation System (BRS) [67]
                    8.2.1.3 Abdul-Rahman, Hailes (ARH)
                    8.2.1.4 Travos (TRA) [69]
                    8.2.1.4 Eigen Trust [70]
               8.2.2 Specify trust attributes and trust relationships among entities
               8.2.3 Implement an trust ontology based on trust modeling
                    8.2.3.1 Trust Network in Friend of a Friend (FOAF) scheme [79]
                    8.2.32 Konfidi � Trust Network using PGP and RDF [80]
                    8.2.3.3 Trust Ontology for Data Usage Policy in Smart Cities
          8.3 Development of a static policy/rule-based trust-level decision making mechanism
               8.3.1 Specify policy/rule for deciding trust levels
               8.3.2 Develop a decision making algorithm for policy decision and enforcement [81]
               8.3.3 Implement a trust reasoner using rule languages [83]
          8.4 A reputation and knowledge based trust model and decision making mechanism
               8.4.1 Trust in the Internet of Things
               8.4.2 Social IoT Environment
               8.4.3 Trust Models and Trust Metrics
          8.5 Autonomic trust management
          8.6 Using Blockchain as Tool
     9 Roadmap and working priority for standardization
          9.1 Related standardization activities in ITU-T
               9.1.1 Correspondence Group on Trust (CG-Trust) in SG13
               9.1.2 Trust related activities in cloud computing group of SG13
               9.1.3 New Question proposal on security and trust provisioning in IoT in SG20
          9.2 Related standardization activities in other SDOs
               9.2.1 Activities in Online Trust Alliance (OTA) for IoT
               9.2.2 Activities in Trusted Computing Group (TCG) for Interoperable Trusted Computing Platforms
          9.3 Important work items for trust provisioning in ICT infrastructure
          9.4 Next step for future standardization
     10 Conclusions and future work
     11 References
2-Future social media and knowledge society
     1 Scope
     2 Definitions
     3 Abbreviations
     4 Vision and technology trends toward knowledge society
          4.1 Vision toward knowledge society
          4.2 New technologies for knowledge society
     5 Vision and technology trends of social media
          5.1 New trends of social media
          5.2 New technologies for social media
     6 Risks of knowledge society
     7 New opportunity of knowledge society and social media
     8 ICT standardization for future knowledge society
     9 Conclusions
     11 References and bibliography
3-Trust Provisioning for future ICT infrastructures and services
     1 Scope
     2 References
     3 Terms and definitions
          3.1 Terms defined elsewhere
          3.2 Terms defined here
     4 Abbreviations
     5 Introduction to Trust toward Knowledge Societies
          5.1 Toward knowledge societies
          5.2 Potential risks in ICT infrastructures
          5.3 Trust for future ICT infrastructures and services
     6 Understanding of Trust
          6.1 Generic definitions of trust
          6.2 Trust in ICT Environments
          6.3 Relationship among security, privacy and trust
          6.4 Relationship between knowledge and trust
     7 Features, Challenges and Technical Issues for Trusted ICT infrastructures
          7.1 Trusted ICT infrastructure
          7.2 Key features of trust
          7.3 Key challenges for trust provisioning
          7.4 Technical issues for trust provisioning
               7.4.1 Trustworthy data collection and aggregation
               7.4.2 Trustworthy data process and analysis
               7.4.3 Trust metric and modelling
               7.4.4 Trust index
               7.4.5 Dissemination of trust information
               7.4.6 Trustworthy system lifecycle management
     8 Architectural overview for trust provisioning for ICT infrastructures
          8.1 Generic ICT trust conceptual model
          8.2 Trust Architectural Framework
               8.2.1 Trust Agent (TA)
               8.2.2 Trust Analysis and Management Platform (TAMP)
               8.2.3 Trust Service Enabler (TSE)
               8.2.4 Trust Service Broker (TSB)
     9 Trust based ICT Service Models
          9.1 Mistrust in current ICT environments
          9.2 A framework for analysing a trust based ICT service model
     10 Use cases of Trust Provisioning for ICT infrastructures and services
     11 Strategies for future standardization on trust
     Appendix I Trust definitions
     Appendix II Standardization Activities on Trust in related SDOs
          1 Activities in Internet Engineering Task Force (IETF) for Internet Trust
          2 Activities in Online Trust Alliance (OTA) for IoT
          3 Activities in Trusted Computing Group (TCG) for Interoperable Trusted Computing Platforms
          Appendix III Backgrounds for Trust based ICT Service models
          Appendix IV Use cases of trust provisioning for ICT infrastructures and services
          1 Smart home service
               1.1 Description
               1.2 Actors
               1.3 Detailed service flow
               1.4 Trust matrix
               1.5 Analysis
          2 Smart office service
               2.1 Description
               2.2 Actors
               2.3 Detailed service flow
               2.4 Trust matrix
               2.5 Analysis
          3 Document sharing service
               3.1 Description
               3.2 Actors
               3.3 Detailed service flow
               3.4 Trust matrix
               3.5 Analysis
          4 Device selection for data transmission
               4.1 Description
               4.2 Actors
               4.3 Detailed service flow
               4.4 Trust matrix
               4.5 Analysis
          5 Car sharing service
               5.1 Description
               5.2 Actors
               5.3 Detailed service flow
               5.4 Trust matrix
               5.5 Analysis
          6 Used car transaction service
               6.1 Description
               6.2 Actors
               6.3 Detailed service flow
               6.4 Trust matrix
               6.5 Analysis
          Bibliography
4-The basic principles of trusted environment in ICT infrastructure
     1 Scope
     2 References
     3 Definitions
          3.1 Terms defined elsewhere
          3.2 Terms defined in this Recommendation
     4 Abbreviations and acronyms
     5 Conventions
     6 Necessity of trusted environment in ICT infrastructure
     7 Requirements of trusted environment in ICT infrastructure
     8 The basic principles of trusted environment in ICT
     Appendix I  The first steps to create trusted environment for cross-border e-commerce
     Appendix II  Use case of creating trusted environment for rescue systems
     Bibliography
5-Overview of Trust Provisioning in ICT Infrastructures and Services
     1 Scope
     2 References
     3 Definitions
          3.1 Terms defined elsewhere
          3.2 Terms defined in this Recommendation
     4 Abbreviations and acronyms
     5 Conventions
     6 Introduction
          6.1 Potential risks and necessity of trust
          6.2 Trust provisioning in ICT infrastructures and services
     7 Overview of trust and trust provisioning
          7.1 Concept of Trust
               7.1.1 Direct trust
               7.1.2 Indirect trust
          7.2 Fundamental characteristics of trust
          7.3 Model for trust provisioning
          7.4 Trust evaluation for trust provisioning
     8 Trust provisioning processes
          8.1 Data collection
          8.2 Data management
          8.3 Trust information analysis
          8.4 Dissemination of trust information
          8.5 Trust information lifecycle management
     9 Security considerations
     Appendix I  Detailed potential risks in ICT infrastructures and services
          I.1 Risks at the physical world
          I.2 Risks at the cyber world
          I.3 Risks at the social world
          I.4 Risks from the integration of the physical, cyber, and social worlds
     Appendix II  Trustworthiness attributes
     Appendix III  Trust provisioning use cases
          III.1 Trustworthy Peer-to-Peer Accommodation service
               III.1.1 Description
               III.1.2 Actors
               III.1.3 Service flow
          III.2 Smart office sharing
               III.2.1 Description
               III.2.2 Actors
               III.2.3 Service flow
          III.3 Document sharing service
               III.3.1 Description
               III.3.2 Actors
               III.3.3 Service flow
          III.4 Intermediate device selection in device-to-device environment
               III.4.1 Description
               III.4.2 Actors
               III.4.3 Service flow
          III.5 Used car transaction service
               III.5.1 Description
               III.5.2 Actors
               III.5.3 Service flow
     Bibliography
6-ITU Workshop on Future Trust and Knowledge Infrastructure - Phase 1
7-ITU Workshop on Future Trust and Knowledge Infrastructure - Phase 2