Common use of Conclusions and Next Steps Clause in Contracts

Conclusions and Next Steps. This document provides a thorough review of the state of the art in trust modelling, covering both human and machine aspects as well as trustworthiness by design approaches. We have described the trust aspects of 4G networks through defining the actors and business models and their consequences for trust. We note that there is no formal specification of trust in 4G networks to report on or build upon. Looking to the future we have documented the new actors and business models expected in 5G networks including the consequences of virtualisation, new domains and tighter integration of satellite and HAPS systems. This is followed by an analysis of the majority of the 5G use cases defined in 5G-ENSURE D2.1 where in each case the entities and trust issues are enumerated. Taking all this into account we have discussed the role of privacy in 5G and propose an approach to modelling trust in 5G networks, extending the state of the art. This “draft” trust model document contains a large amount of documentation and analysis. The 5G use case analysis will be completed and the entirety will then be combined with further information from various sources to analyse the architecture and potential risks in more detail:  the CAPEC database [Mitre-3] of known attacks to ensure that a broad range of known malicious attacks is modelled;  deliverable D2.4 “Security architecture (draft)” and 5G architecture documents from elsewhere for details on generic 5G stakeholder roles and technology asset types once they are determined. The results of the analysis will then be captured in a machine understandable form, and algorithms defined for quantification of trust (and trustworthiness) going beyond the simple ones proposed in this report. All of these results will then feed into the development of security architecture in WP2, also trust enablers in WP3, as well as the specification of the full 5G-ENSURE trust model in Deliverable D2.5 which will include an analysis of the 5G-ENSURE trust enablers.

Appears in 2 contracts

Samples: eprints.soton.ac.uk, 5gensure.eu

AutoNDA by SimpleDocs

Conclusions and Next Steps. This document provides a thorough review of the state of the art in trust modelling, covering both human and machine aspects as well as trustworthiness by design approaches. We have described the trust aspects of 4G networks through defining the actors and business models and their consequences for trust. We note that there is no formal specification of trust in 4G networks to report on or build upon. Looking to the future we have documented the new actors and business models expected in 5G networks including the consequences of virtualisation, new domains and tighter integration of satellite and HAPS systems. This is followed by an analysis of the majority of the 5G use cases defined in 5G-ENSURE D2.1 where in each case the entities and trust issues are enumerated. Taking all this into account we have discussed the role of privacy in 5G and propose an approach to modelling trust in 5G networks, extending the state of the art. This “draft” trust model document contains a large amount of documentation and analysis. The In the “final” version, the 5G use case analysis will be completed and extended to the next level of detail and the entirety will then be combined with further information from various sources to analyse the architecture and potential risks in more detail:  the CAPEC database [Mitre-3] of known attacks to ensure that a broad range of known malicious attacks is modelled;  deliverable D2.3 “Risk assessment mitigation and requirements (draft)”;  deliverable D2.4 “Security architecture (draft)” and 5G architecture documents from elsewhere for details on generic 5G stakeholder roles and technology asset types once they are determined. The results of the analysis will then be documented in the “Trust Model” chapter and also captured in a machine understandable form, and algorithms . Algorithms will be defined for quantification of trust (and trustworthiness) going beyond the simple ones proposed in this report. All of these results will then feed into the development of security architecture in WP2, also trust enablers in WP3, as well as the specification of the full 5G-ENSURE trust model in Deliverable D2.5 which will include an analysis of the 5G-ENSURE trust enablers.

Appears in 1 contract

Samples: 5gensure.eu

AutoNDA by SimpleDocs

Conclusions and Next Steps. This document provides a thorough review of the state of the art in trust modelling, covering both human and machine aspects as well as trustworthiness by design approaches. We have described the trust aspects of 4G networks through defining the actors and business models and their consequences for trust. We note that there is no formal specification of trust in 4G networks to report on or build upon. Looking to the future we have documented the new actors and business models expected in 5G networks including the consequences of virtualisation, new domains and tighter integration of satellite and HAPS systems. This is followed by an analysis of the majority of the 5G use cases defined in 5G-ENSURE D2.1 where in each case the entities and trust issues are enumerated. Taking all this into account we have discussed the role of privacy in 5G and propose an approach to modelling trust in 5G networks, extending the state of the art. This “draft” trust model document contains a large amount of documentation and analysis. The 5G use case analysis will be completed and the entirety will then be combined with further information from various sources to analyse the architecture and potential risks in more detail: the CAPEC database [Mitre-3] of known attacks to ensure that a broad range of known malicious attacks is modelled; deliverable D2.4 “Security architecture (draft)” and 5G architecture documents from elsewhere for details on generic 5G stakeholder roles and technology asset types once they are determined. The results of the analysis will then be captured in a machine understandable form, and algorithms defined for quantification of trust (and trustworthiness) going beyond the simple ones proposed in this report. All of these results will then feed into the development of security architecture in WP2, also trust enablers in WP3, as well as the specification of the full 5G-ENSURE trust model in Deliverable D2.5 which will include an analysis of the 5G-ENSURE trust enablers.

Appears in 1 contract

Samples: bscw.5g-ppp.eu

Time is Money Join Law Insider Premium to draft better contracts faster.