首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
admin
2020-04-30
14
问题
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (71)________________ our welfare.In online environments we depend on a wide spectrum of things,ranging from computer hardware,software and data to people and organizations.A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions,hence,a trusted entity is the same as an entity that is assumed to function according to policy. A consequence of this is that a trusted component of a system must work correctly in order for the security of that system to hold,meaning that when a trusted (72)________________ fails,then the systems and applications that depend on it can (73)________________ be considered secure.An often cited articulation of this principle is:‘a trusted system or component is one that can break your security policy’(which happens when the trusted system fails).The same applies to a trusted party such as a service provider(SP for short),that is,it must operate according to the agreed or assumed policy in order to ensure the expected level of security and quality of services.A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on.This is because the security of an infrastructure consisting of many trusted components typically follows the principle of the weakest link,that is,in many situations the overall security can only be as strong as the least reliable or least secure of al l the trusted components.We cannot avoid using trusted security components,but the fewer the better.This is important to understand when designing the identity management architectures,that is,fewer the trusted parties in an identity management model,stronger the security that can be achieved by it.
The transfer of the social constructs of identity and trust into digital alld computational conceptshelpsindesigningandimplementinglarge scaleonlinemarketsandcommunities,and also plays an important role in the converging mobile and Internet environments.Identity management fdenoted IdM hereafter)is about recognizing and verifying the correctness of identities in online environments.Trust management becomes a component of (74)________________ whenever different parties rely on each other for identity provision and authentication.IdM and trust management therefore depend on each other in complex ways because the correctness of the identity itself must be trusted for the quality and reliability of the corresponding entity to be trusted.IdM is also an essential concept when defining authorisation policies in personalised services.
Establishing trust always has a cost,so that having complex trust requirements typically leads to high overhead in establishing the required trust.To reduce costs there will be incentives for stakeholders to‘cut comers’regarding trust requirements,which could lead to inadequate security.The challenge is tO design IdM systems with relatively simple trust requirements.Cryptographic mechanisms are often a core component of IdM solutions,for example,for entity and data authentication.With cryptography,it is often possible to propagate trust from where it initially exists to where it is needed.The establishment of initial (75)________________ usually takes place in the physical world,and the subsequent propagation of trust happens online,often in an automated manner.
选项
A、with
B、on
C、of
D、for
答案
D
解析
转载请注明原文地址:https://kaotiyun.com/show/jMTZ777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2007下项管)在选项______中,①代表的技术用于决策分析;②代表的技术用于从数据库中发现知识对决策进行支持;①和②的结合为决策支持系统(DSS)开辟了新方向,它们也是③代表的技术的主要组成。
(2012上集管)网络协议和设备驱动软件经常采用分层架构模式,其主要原因是______。
(2011下项管)李先生是某软件开发公司负责某项目的项目经理,该项目已经完成了前期的工作进入实现阶段,但用户提出要增加一项新的功能,李先生应该______。
(2009上项管)某电子政务信息化建设项目的项目经理得知一项新的政府管理方面的要求将会引起该项目范围的变更,为此,项目经理应该首先______。
(2005上项管)活动排序的工具和技术有多种,工具和技术的选取由若干因素决定。如果项目经理决定在进度计划编制中使用子网络模板,这个决策意味着______。
(2010下架构)项目时间管理包括使项目按时完成所必需的管理过程,活动定义是其中的一个重要过程。通常可以使用______来进行活动定义。
(2008上项管)TCP/IP是Internet采用的协议标准,它是一个协议系列,由多个不同层次的协议共同组成。其中______是属于网络层的低层协议,主要用途是完成网络地址向物理地址的转换。
(2013上项管)下图中,从A到E的最短长度是______(图中每条边旁的数字为该条边的长度)。
(2014上项管)OSI安全体系结构定义了五种安全服务,其中_____(1)用于识别对象的身份并对身份核实。______(2)用于防止对资源的非授权访问,确保只有经过授权的实体才能访问受保护的资源。(2)
(2008下监理)某网络用户能进行QQ聊天,但在浏览器地址栏中输入www.rkb.gov.cn却不能正常访问该页面,此时管理员应检查______。
随机试题
WhatdoShoesCanDo?Researcherssaypeoplecan【C1】________(accurate)judge90percentofastranger’spersonalitybylookin
孔子思想的核心是“仁”,认为“仁”就是“爱人”,而“仁”的施行应以“礼”为规范,宣称“克己复礼为仁”。()
DSA造影设备的准备包括
文化因素对人类健康的作用十分明显,广义的文化是指
一个地方的文化思想,往往有一种保守或顽固的性质,虽受外力压迫而不退让,所以文化移植的时候,不免发生冲撞;又因为外来文化必须适应新的环境,所以一方面,本地文化受外来影响而发生变化,另一方面,因外来文化思想须适应本地环境,所以本地文化虽然发生变化,还不至于全部
企业从银行借入的期限为1个月的借款到期,偿还该借款本息时所编制会计分录可能涉及的账户有()。
下列关于利率的等式中,不正确的是()。
下列成语与所涉及的物理知识,对应关系不正确的是:
()是由于脑损伤引起的对刺激的无意识现象
InternetShoppingInternetshoppingisanewwayofshopping.Nowadays,youcanshopforjustaboutanythingfromyourarmch
最新回复
(
0
)