Recommendation ITU-T X.1812 (05/2022) Security framework based on trust relationships for the IMT-2020 ecosystem
Summary
History
FOREWORD
Table of Contents
Introduction
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview
7 Security framework supported by the trusted model
8 Stakeholder role in scenarios for the IMT-2020 ecosystem
     8.1 General
     8.2 Scenario 1: Virtualization network deployment in a network operator domain
          8.2.1 General
          8.2.2 Roles of stakeholders in this scenario
     8.3 Scenario 2: Interconnection and roaming
          8.3.1 General
          8.3.2 Roles of stakeholders in this scenario
     8.4 Scenario 3: Car rental with remote operation
          8.4.1 General
          8.4.2 Roles of stakeholders in this scenario
     8.5 Scenario 4: Network capability exposure for industry
          8.5.1 General
          8.5.2 Roles of stakeholders in this scenario
     8.6 Scenario 5: Supply chains
          8.6.1 General
          8.6.2 Roles of stakeholders in this scenario
     8.7 Stakeholders in the IMT-2020 ecosystem
9 Trust level, trust criteria, and trust model
     9.1 General
     9.2 Trust levels
     9.3 Trust criteria
     9.4 Trust model based on trust relationship mapping
10 Security requirements supported by trust model based on trust relationships
     10.1 General
     10.2 Security requirements from trust level
          10.2.1 Overview
          10.2.2 Organization requirements
               10.2.2.1 Introduction
               10.2.2.2 Reputation
               10.2.2.3 Contract execution
               10.2.2.4 Consistency of valuee
               10.2.2.5 Compensation
               10.2.2.6 Independence
               10.2.2.7 Summary
          10.2.3 Procedure requirements
               10.2.3.1 Introduction
               10.2.3.2 Development and product lifecycle security
               10.2.3.3 Security operation capability
               10.2.3.4 Summary
          10.2.4 Technology requirements
     10.3 Interpreting trust to detailed assurance requirements
Bibliography
<\pre>