首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
admin
2020-04-30
54
问题
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (71)________________ our welfare.In online environments we depend on a wide spectrum of things,ranging from computer hardware,software and data to people and organizations.A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions,hence,a trusted entity is the same as an entity that is assumed to function according to policy. A consequence of this is that a trusted component of a system must work correctly in order for the security of that system to hold,meaning that when a trusted (72)________________ fails,then the systems and applications that depend on it can (73)________________ be considered secure.An often cited articulation of this principle is:‘a trusted system or component is one that can break your security policy’(which happens when the trusted system fails).The same applies to a trusted party such as a service provider(SP for short),that is,it must operate according to the agreed or assumed policy in order to ensure the expected level of security and quality of services.A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on.This is because the security of an infrastructure consisting of many trusted components typically follows the principle of the weakest link,that is,in many situations the overall security can only be as strong as the least reliable or least secure of al l the trusted components.We cannot avoid using trusted security components,but the fewer the better.This is important to understand when designing the identity management architectures,that is,fewer the trusted parties in an identity management model,stronger the security that can be achieved by it.
The transfer of the social constructs of identity and trust into digital alld computational conceptshelpsindesigningandimplementinglarge scaleonlinemarketsandcommunities,and also plays an important role in the converging mobile and Internet environments.Identity management fdenoted IdM hereafter)is about recognizing and verifying the correctness of identities in online environments.Trust management becomes a component of (74)________________ whenever different parties rely on each other for identity provision and authentication.IdM and trust management therefore depend on each other in complex ways because the correctness of the identity itself must be trusted for the quality and reliability of the corresponding entity to be trusted.IdM is also an essential concept when defining authorisation policies in personalised services.
Establishing trust always has a cost,so that having complex trust requirements typically leads to high overhead in establishing the required trust.To reduce costs there will be incentives for stakeholders to‘cut comers’regarding trust requirements,which could lead to inadequate security.The challenge is tO design IdM systems with relatively simple trust requirements.Cryptographic mechanisms are often a core component of IdM solutions,for example,for entity and data authentication.With cryptography,it is often possible to propagate trust from where it initially exists to where it is needed.The establishment of initial (75)________________ usually takes place in the physical world,and the subsequent propagation of trust happens online,often in an automated manner.
选项
A、with
B、on
C、of
D、for
答案
D
解析
转载请注明原文地址:https://www.kaotiyun.com/show/jMTZ777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2007下系分)系统可靠性的简单度量是平均故障间隔时间(MTBF),其计算公式是______(1);软件可用性是指在某个给定时间点上程序能够按照需求执行的概率,其定义为______(2)(MTTF:MeanTimeToFailure;MTTR:Me
(2009上集管)项目论证是指对拟实施项目技术上的先进性、适用性,经济上的合理性、盈利性,实施上的可能性、风险可控性进行全面科学的综合分析,为项目决策提供客观依据的一种技术经济研究活动。以下关于项目论证的叙述,错误的是______。
(2013上项管)某地方政府准备立项改造一个小型信息系统,由于项目投资额较小,立项过程可以简化,但其中______环节不能缺失。
(2012上集管)网络协议和设备驱动软件经常采用分层架构模式,其主要原因是______。
(2009下架构)软件架构贯穿于软件的整个生命周期,但在不同阶段对软件架构的关注力度并不相同,在______阶段,对软件架构的关注最多。
(2006下网工)ARP协议的作用是____(1),ARP报文封装在_____(2)中传送。(1)
(2010下监理)下列关于综合布线系统设计的说法中,错误的是______。
(2007下系分)软件项目中,商业风险威胁到要开发软件的生存能力,而______不属于商业风险。
a=17,b=2,则满足a与b取模同余的是(69)________________。
随机试题
有一直齿园柱齿轮,m=4,Z=36,它的齿高为()
A.Na+、Cl-B.K+、Cl-C.葡萄糖D.白蛋白血浆晶体渗透压的形成主要取决于
下列哪项不是引起肝硬化的因素
在计算房屋建筑面积时,层高在()米以下的夹层、插层、技术层、地下室和半地下室等不计算在内。
均质圆柱体半径为R,质量为m,绕关于对纸面垂直的固定水平轴自由转动,初瞬时静止(G在O轴的铅垂线上),如图所示。则圆柱体在位置θ=90°时的角速度是()。
在条件合适时,山岭、丘陵地区的矿井通常优先采用平硐开拓方式。平硐开拓方式的特点是()。
生产性粉尘按其性质一般分为如下的()。
下面关于行政许可设定的说法,哪些是正确的?()
Formorethantwodecades,U.S.courtshavebeenlimitingaffirmative-actionprogramsinuniversitiesandotherareas.Thelega
在E-R图中,用来表示实体联系的图形是( )。
最新回复
(
0
)