“…Attacks' consequences could be similar to traditional cyber-attacks; however, new attacks with serious impacts might be orchestrated, such as injection of manipulated information during a collaboration session, the deployment of disguised services and searching for victims with specific vulnerabilities. Multiple security facets have been discussed, including identity and authentication (Toosi et al, 2014;Touceda et al, 2015), access control systems (McCarthy et al, 2015;Huang et al, 2014;Vassilakis et al, 2016;Dsouza et al, 2014), protocol and network security (Kreutz et al, 2015;Li and Chen, 2015;Chen et al, 2016), intrusion detection systems (Mtibaa et al, 2015;Gai et al, 2016;Shi et al, 2015) and privacy (Ravichandran et al, 2015;Zhang et al, 2015;Huang et al, 2016). This paper focuses on trust, however, these topics have been briefly referred-to when necessary.…”