Unifying Management of Future Networks With Trust Laurent Ciavaglia, Samir Ghamri-Doudane, Mikhail Smirnov, Panagiotis Demestichas, Vera-Alexandra Stavroulaki, Aimilia Bantouna, and Berna Sayrac Stability, robustness, and security issues arising from future self-organizing networks (SONs) must be understood today, in order to be incorporated into their design, standardization, and certification. We address the issue of operator trust in Long Term Evolution (LTE) SON through the following five requirements and outline our approaches to meet them: 1) trust must be measurable, 2) trust must be SON-specific, 3) trust must be model-driven, 4) trust must be propagated end-to-end, and 5) trust must be certified. As such, we consider the three facets of operator trust—reliable operation, trustworthy interworking, and seamless deployment and suggest a composite metric for SON stability; we define a key performance indicator (KPI)-based envelope of dependable adaptations; we demonstrate how to construct such models based on predicates; we show that trust networks emerge from predicate-enabled behaviors; and we outline the certification process. Trust predicates that are defined at the design phase as abstract behaviors, and verified at runtime as fully qualified ones, prove to have the power of policies. Once checked, they can be reused many times, and rewritten to cater to new behaviors. © 2012 Alcatel-Lucent. entire manufacturing chain from design technology to the deployment process. Network designers today are focused on cogni- tive, software defined, and self-organizing solutions for future networks. We try to take that focus one step further, to the self-orchestration of multiple con- trol loops. Along with self-orchestration, we also believe the deployment of practical machine learning techniques should not be underestimated. Which possible exploits can be eliminated during the design of add-ons? We are not trying to solve a Introduction Our goal is not to identify how future technology may be exploited, but to design technology add-ons that can prevent exploitation. Our intention is to design add-ons that can benefit both the management of future technology (we term it governance, perhaps unconventionally but with the clear goal to differen- tiate it from conventional management) and increase the level of operator trust in that future technology. We are also interested in contributing to the certifica- tion process for future equipment that shall cover the Bell Labs Technical Journal 17(3), 195–214 (2012) © 2012 Alcatel-Lucent. Published by Wiley Periodicals, Inc. Published online in Wiley Online Library (wileyonlinelibrary.com) • DOI: 10.1002/bltj.21568