A strategy for the VRE end-users to handle security, privacy and trust issues – second version

Summary
Strategy for the VRE end-users to handle security, privacy and trust issues – second version (M33)