首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
admin
2020-04-30
33
问题
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (71)________________ our welfare.In online environments we depend on a wide spectrum of things,ranging from computer hardware,software and data to people and organizations.A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions,hence,a trusted entity is the same as an entity that is assumed to function according to policy. A consequence of this is that a trusted component of a system must work correctly in order for the security of that system to hold,meaning that when a trusted (72)________________ fails,then the systems and applications that depend on it can (73)________________ be considered secure.An often cited articulation of this principle is:‘a trusted system or component is one that can break your security policy’(which happens when the trusted system fails).The same applies to a trusted party such as a service provider(SP for short),that is,it must operate according to the agreed or assumed policy in order to ensure the expected level of security and quality of services.A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on.This is because the security of an infrastructure consisting of many trusted components typically follows the principle of the weakest link,that is,in many situations the overall security can only be as strong as the least reliable or least secure of al l the trusted components.We cannot avoid using trusted security components,but the fewer the better.This is important to understand when designing the identity management architectures,that is,fewer the trusted parties in an identity management model,stronger the security that can be achieved by it.
The transfer of the social constructs of identity and trust into digital alld computational conceptshelpsindesigningandimplementinglarge scaleonlinemarketsandcommunities,and also plays an important role in the converging mobile and Internet environments.Identity management fdenoted IdM hereafter)is about recognizing and verifying the correctness of identities in online environments.Trust management becomes a component of (74)________________ whenever different parties rely on each other for identity provision and authentication.IdM and trust management therefore depend on each other in complex ways because the correctness of the identity itself must be trusted for the quality and reliability of the corresponding entity to be trusted.IdM is also an essential concept when defining authorisation policies in personalised services.
Establishing trust always has a cost,so that having complex trust requirements typically leads to high overhead in establishing the required trust.To reduce costs there will be incentives for stakeholders to‘cut comers’regarding trust requirements,which could lead to inadequate security.The challenge is tO design IdM systems with relatively simple trust requirements.Cryptographic mechanisms are often a core component of IdM solutions,for example,for entity and data authentication.With cryptography,it is often possible to propagate trust from where it initially exists to where it is needed.The establishment of initial (75)________________ usually takes place in the physical world,and the subsequent propagation of trust happens online,often in an automated manner.
选项
A、SP
B、IdM
C、Internet
D、entity
答案
B
解析
转载请注明原文地址:https://www.kaotiyun.com/show/3MTZ777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2009下架构)软件架构设计是降低成本、改进质量、按时和按需交付产品的关键活动。以下关于软件架构重要性的叙述中,错误的是______。
(2005上项管)当评估项目的成本绩效数据时,根据数据与基线的偏差程度将作出不同的反应。例如,10%的偏差可能不需作出反应,而100%的偏差将需要进行调查,对成本偏差的判断会使用______。
(2008上项管)以下关于成本估算的说法错误的是______。
(2011下集管)某单位规定对所有承担的项目全部按其报价的15%提出公司管理费,该项费用对于项目而言属于______。
(2011上集管)______不是进行项目质量保证采用的方法和技术。
(2014下集管)“十二五”期间,电子政务促进行政体制改革和服务型政府建设的作用更加显著,其发展目标不包括______。
(2014上项管)OSI安全体系结构定义了五种安全服务,其中_____(1)用于识别对象的身份并对身份核实。______(2)用于防止对资源的非授权访问,确保只有经过授权的实体才能访问受保护的资源。(1)
(2009下系管)某网站向CA申请了数字证书,用户通过______来验证网站的真伪。
(2007下项管)为了对计算机信息系统的安全威胁有更全面、更深刻的认识,信息应用系统安全威胁的分类方法一般用______三种“综合分类”方法。
计算机获取模拟视频信息的过程中首先要进行(14)。
随机试题
关节面形状决定了关节的运动轴数量和运动方式,下列动作的哪一阶段膝关节和髋关节完成“屈”?()
什么叫做脉冲焊接电流和基值焊接电流?
某患者,已患高血压,近年出现劳力性心前区疼痛,平时活动量稍大或上三楼时出现胸部疼痛,休息缓解。近1个月发作频繁。1~2次/天,约15分/次。休息时也有发作。发作时做心电图示ST段压低。应该诊断为()
A.射干麻黄汤B.三子养亲汤C.定喘汤D.厚朴麻黄汤E.麻杏石甘汤治疗哮病寒包热证,应首选()
根据《税收征收管理法》的规定,由税务机关处以不缴或少缴税款50%以上5倍以下罚款的税务违法行为包括()。
审慎原则并不是不尊重科学,而是对科学应用的务实态度。科研成果的取得及其社会认可,往往代表着巨大的经济利益甚或科学家的终身成就,这就很难保证科学家不会放松科学原则要求而违规;科研成果的社会化往往与企业利益相连,企业逐利时难免会刻意隐瞒危害;由于科研的未知性因
“男孩危机”是指男孩调皮捣蛋、胆小怕事、学习成绩不如女孩好等现象。近年来,“男孩危机”现象成为儿童教育专家关注的一个重要问题,而对“现在男孩为什么从小学、中学到大学全面落后于同年龄段的女孩”的疑问,某教育专家通过分析指出,是家庭和学校不适当的教育方法导致了
switchingtoflourishmarketplaceA.whichcompanieswill【T7】______B.whohavetheoptionof【T8】______trucksC.wholosesin
设函数y=f(x)在点x=x0处可导,△x,△y分别为自变量和函数的增量,dy为其微分且f’(x0)≠0,则=()。
Shelookedeverywhereforherbookbutfinallyhadtoreturnhomewithoutit.
最新回复
(
0
)