Page 21 - Trust in ICT 2017
P. 21

Trust in ICT                                                1
























                           Figure 2 – General Trust Model with Trust Metrics and Technical Attribute
            Depending  on  services  and  applications,  the  required  attributes  of  trust  may  vary.  For  example,  for  a
            particular application, technical attributes may be consisted of security, reliability and availability. Whereas,
            for other applications, security and reliability may be needed for such trust provisioning.

            4.3.3   Level of trust

            Due to the diversity of applications and their inherent differences in nature, trust is hard to formalize in a
            general setting, and up to now no commonly accepted definition is appeared. However, it is important to
            quantify level of trust in ICT. The level of trust can be measured classified which is similar with Quality of
            Service (QoS) as objective manner (e.g., measured quantitatively) or Quality of Experience (QoE) as subjective
            manner (e.g., counted qualitatively). A certain level of trust should be derived from the associated services
            and applications of trust.

            4.3.4   Trust domain
            Different trust domains may share the same physical components. Also, a single trust domain may include
            various levels of trust. Depending on what levels of trust the users need to know including sensitivity of
            information and associated resources, there may be a lot of service level agreement (SLA) of trust.


            4.4     Trust in ICT Environment
            As disused in previous sub-sections, the term trust in the context of ICT world differs from the concept of
            trust among people. This notion of trust stands in contrast to some more intuitive notions of trust expressing
            that someone behaves in a particular well-behaved way. Trust in ICT is an important concept in the sense
            that a trusted resource is one that you are forced by necessity to trust. The failure of this resource would
            compromise the function, integrity or security of a system which are not in expected ways.
            As trust can be interpreted in different ways, here there are various meanings from literature for more clear
            views on trust in terms of telecommunication systems and ICT and show relationships between knowledge
            and trust.
            Traditionally, as a lexical-semantic, trust means reliance on the integrity, strength, ability, surety, etc., of a
            person or object. Generally trust is used as a measure of confidence that an entity will behave in an expected
            manner, despite the lack of ability to monitor or control the environment in which it operates.

            On the other hand, trust in computer science in general can be classified into two broad categories: “user”
            and “system”. The notion of “user” trust is derived from psychology and sociology, with a standard definition
            as  “a  subjective  expectation  an  entity  has  about  another’s  future  behaviour”.  “System”  trust  is  “the
            expectation  that  a  device  or  system  will  faithfully  behave  in  a  particular  manner  to  fulfil  its  intended
            purpose”.






                                                                                                           13
   16   17   18   19   20   21   22   23   24   25   26