Table 2.
Principles of trust verification.
| Privacy and trust risksa | THEWS principle | High-level privacy principle |
| Unknown stakeholders’ business needs, interest, purposes, and policies | Right to use trust verification | |
| No predefined trust to any system | Mandatory to publish systems’ trust parameters and policies | Trusted use of data |
| Unknown secondary users | Trust level calculation | |
| Invisible ubiquitous infrastructure | Untrusted systems and users cannot participate in the DS’s health network |
a in the information space and in pervasive health