首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
admin
2020-04-30
8
问题
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (71)________________ our welfare.In online environments we depend on a wide spectrum of things,ranging from computer hardware,software and data to people and organizations.A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions,hence,a trusted entity is the same as an entity that is assumed to function according to policy. A consequence of this is that a trusted component of a system must work correctly in order for the security of that system to hold,meaning that when a trusted (72)________________ fails,then the systems and applications that depend on it can (73)________________ be considered secure.An often cited articulation of this principle is:‘a trusted system or component is one that can break your security policy’(which happens when the trusted system fails).The same applies to a trusted party such as a service provider(SP for short),that is,it must operate according to the agreed or assumed policy in order to ensure the expected level of security and quality of services.A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on.This is because the security of an infrastructure consisting of many trusted components typically follows the principle of the weakest link,that is,in many situations the overall security can only be as strong as the least reliable or least secure of al l the trusted components.We cannot avoid using trusted security components,but the fewer the better.This is important to understand when designing the identity management architectures,that is,fewer the trusted parties in an identity management model,stronger the security that can be achieved by it.
The transfer of the social constructs of identity and trust into digital alld computational conceptshelpsindesigningandimplementinglarge scaleonlinemarketsandcommunities,and also plays an important role in the converging mobile and Internet environments.Identity management fdenoted IdM hereafter)is about recognizing and verifying the correctness of identities in online environments.Trust management becomes a component of (74)________________ whenever different parties rely on each other for identity provision and authentication.IdM and trust management therefore depend on each other in complex ways because the correctness of the identity itself must be trusted for the quality and reliability of the corresponding entity to be trusted.IdM is also an essential concept when defining authorisation policies in personalised services.
Establishing trust always has a cost,so that having complex trust requirements typically leads to high overhead in establishing the required trust.To reduce costs there will be incentives for stakeholders to‘cut comers’regarding trust requirements,which could lead to inadequate security.The challenge is tO design IdM systems with relatively simple trust requirements.Cryptographic mechanisms are often a core component of IdM solutions,for example,for entity and data authentication.With cryptography,it is often possible to propagate trust from where it initially exists to where it is needed.The establishment of initial (75)________________ usually takes place in the physical world,and the subsequent propagation of trust happens online,often in an automated manner.
选项
A、with
B、on
C、of
D、for
答案
D
解析
转载请注明原文地址:https://kaotiyun.com/show/jMTZ777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2013上集管)某政府部门需要改造现有信息系统,目前正在开展项目立项工作,该项目经初步投资估算确定的投资额为950万,而项目可行性研究报告,得到批复确定为890万。这种情况下建设单位恰当的做法是______。
(2014上集管)(2009下架构)商业智能是指利用数据挖掘、知识发现等技术分析和挖掘结构化的、面向特定领域的存储与数据仓库的信息。它可以帮助用户认清发展趋势、获取决策支持并得出结论。______不属于商业智能范畴。
(2013上项管)分析成本构成结果,找出各种可以相互替代的成本,协调各种成本之间的关系属于______的内容。
(2009下项管)______不是成本估算的方法。
(2008下项管)(2009上项管)(2010上项管)某工程包括A、B、C、D、E、F、G七项工作,各工作的紧前工作、所需时间以及所需人数如下表所示(假设每个人均能承担各项工作):该工程的工期应为______(1)天。按此工期,整个工程最少需要____
(2009上项管)某项目的时标网络图如下(时间单位:周),在项目实施过程中,因负责实施的工程师误操作发生了质量事故,需整顿返工,造成工作④-⑥拖延3周,受此影响,工程的总工期会拖延______周。
(2010下集管)工作流(workflow)需要依靠______来实现,其主要功能是定义、执行和管理工作流,协调工作流执行过程中工作之间以及群体成员之间的信息交互。
(2009下集管)承建单位有时为了获得项目可能将信息系统的作用过分夸大,使得建设单位对信息系统的预期过高。除此之外,建设单位对信息系统的期望可能会随着自己对系统的熟悉而提高。为避免此类情况的发生,在合同中清晰地规定______对双方都是有益的。
Typically, these are concern with the establishment of(66)the network and with the control of the flow of messages across this
随机试题
A基底膜顶段最大振幅振动B基底膜中段最大振幅振动C基底膜起始段最大振幅振动D基底膜起始段振动,然后以行波形式向顶部传递E行波经过最大振动的点后,振幅急剧减小,最后消失中频声波传入耳蜗将引起
关于碘及碘化物的药理作用特点不正确的是
医学科研的根本价值目标是
叶某将自有房屋卖给沈某,在交房和过户之前,沈某擅自撬门装修.施工导致邻居赵某经常失眠。下列哪些表述是正确的?(2013年卷三第55题)
“经营单位”栏:()。“运输方式”栏:()。
甲公司是一家生产和销售高效照明产品的企业,国家为了支持高效照明产品的推广使用,通过统一招标的形式确定中标企业、高效照明产品及其中标协议供货价格,甲企业作为中标企业,需以中标协议价格减去财政补贴资金后的价格将高效照明产品销售给终端用户,并按高效照明产品实际安
江苏淮安大云山汉墓群是汉代的一座规模宏大的陵园,总面积达25万平方米,考古显示周边曾有500米见方的围墙,里面曾经有密集的建筑群,陵园东门尚有道路、阙基等遗迹存在。经过鉴定,该墓主人是西汉江都王刘非。以下哪项如果为真。最不能支持上述鉴
在执行下列命令SEEK、FIND、LOCATE、TOTAL和JOIN时,不用首先对表文件进行索引的命令是______和______。
Youknowwhatotherpeoplemean.Youthinkwhatotherpeoplehavesaidisfight.
Thefollowingisanadvertisement.SecurityandPrivacyonWalmart.comHowWeProtectYourPrivacy:
最新回复
(
0
)