{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:13:17Z","timestamp":1743088397110,"version":"3.40.3"},"publisher-location":"Cham","reference-count":6,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030798505"},{"type":"electronic","value":"9783030798512"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,7,3]],"date-time":"2021-07-03T00:00:00Z","timestamp":1625270400000},"content-version":"vor","delay-in-days":183,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>While information security nowadays represents a core concern for any organization, Trust Management is usually less elaborated and is only important when two or more organizations cooperate towards a common objective. The overall Once-Only Principle Project (TOOP) architecture relies on the concept of trusted sources of information and on the existence of a secure exchange channel between the Data Providers and the Data Consumers in this interaction framework. Trust and information security are two cross-cutting concerns of paramount importance. These two concerns are overlapping, but not identical and they span all of the interoperability layers, from the legal down to the technical, passing through organizational and semantic layers. While information security aims at the preservation of confidentiality, integrity and availability of information, trust establishment guarantees that the origin and the destination of the data and documents are authentic (authenticity) and trustworthy (trustworthiness), and that data and documents are secured against any modification by untrusted parties (integrity). In this chapter, the TOOP Trust Architecture is presented, starting from a simple abstract model of interaction between two agents down to the detailed end-to-end trust establishment architecture, modeled onto the Toop Reference Architecture presented in the previous chapter.<\/jats:p>","DOI":"10.1007\/978-3-030-79851-2_7","type":"book-chapter","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T06:03:12Z","timestamp":1625205792000},"page":"126-140","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["TOOP Trust Architecture"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8403-1506","authenticated-orcid":false,"given":"Luca","family":"Boldrin","sequence":"first","affiliation":[]},{"given":"Giovanni Paolo","family":"Sellitto","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2974-2190","authenticated-orcid":false,"given":"Jaak","family":"Tepandi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"key":"7_CR1","unstructured":"ISO\/IEC 27000:2018. Information technology \u2014 Security techniques \u2014 Information security management systems \u2014 Overview and vocabulary"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Cofta, P.: Trust, Complexity and Control: Confidence in a Convergent World. John Wiley I and Sons (2007)","DOI":"10.1002\/9780470517857"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Raj, G., Sarfaraz, M., Singh, D.: Survey on trust establishment in cloud computing. In: 2014 5th International Conference - Confluence the Next Generation Information Technology Summit (Confluence), pp. 215\u2013220 (2014)","DOI":"10.1109\/CONFLUENCE.2014.6949375"},{"issue":"6","key":"7_CR4","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MIC.2002.1067734","volume":"6","author":"M Winslett","year":"2002","unstructured":"Winslett, M., et al.: Negotiating trust in the web. IEEE Internet Comput. 6(6), 30\u201337 (2002)","journal-title":"IEEE Internet Comput."},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"23","DOI":"10.4018\/jthi.2009040102","volume":"5","author":"M Taddeo","year":"2011","unstructured":"Taddeo, M.: Defining trust and e-trust. Int. J. Technol. Hum. Interact. 5, 23\u201335 (2011). https:\/\/doi.org\/10.4018\/jthi.2009040102","journal-title":"Int. J. Technol. Hum. Interact."},{"key":"7_CR6","unstructured":"European Interoperability Framework 2.0"}],"container-title":["Lecture Notes in Computer Science","The Once-Only Principle"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-79851-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T06:05:07Z","timestamp":1625205907000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-79851-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030798505","9783030798512"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-79851-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}