首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
admin
2020-04-30
18
问题
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (71)________________ our welfare.In online environments we depend on a wide spectrum of things,ranging from computer hardware,software and data to people and organizations.A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions,hence,a trusted entity is the same as an entity that is assumed to function according to policy. A consequence of this is that a trusted component of a system must work correctly in order for the security of that system to hold,meaning that when a trusted (72)________________ fails,then the systems and applications that depend on it can (73)________________ be considered secure.An often cited articulation of this principle is:‘a trusted system or component is one that can break your security policy’(which happens when the trusted system fails).The same applies to a trusted party such as a service provider(SP for short),that is,it must operate according to the agreed or assumed policy in order to ensure the expected level of security and quality of services.A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on.This is because the security of an infrastructure consisting of many trusted components typically follows the principle of the weakest link,that is,in many situations the overall security can only be as strong as the least reliable or least secure of al l the trusted components.We cannot avoid using trusted security components,but the fewer the better.This is important to understand when designing the identity management architectures,that is,fewer the trusted parties in an identity management model,stronger the security that can be achieved by it.
The transfer of the social constructs of identity and trust into digital alld computational conceptshelpsindesigningandimplementinglarge scaleonlinemarketsandcommunities,and also plays an important role in the converging mobile and Internet environments.Identity management fdenoted IdM hereafter)is about recognizing and verifying the correctness of identities in online environments.Trust management becomes a component of (74)________________ whenever different parties rely on each other for identity provision and authentication.IdM and trust management therefore depend on each other in complex ways because the correctness of the identity itself must be trusted for the quality and reliability of the corresponding entity to be trusted.IdM is also an essential concept when defining authorisation policies in personalised services.
Establishing trust always has a cost,so that having complex trust requirements typically leads to high overhead in establishing the required trust.To reduce costs there will be incentives for stakeholders to‘cut comers’regarding trust requirements,which could lead to inadequate security.The challenge is tO design IdM systems with relatively simple trust requirements.Cryptographic mechanisms are often a core component of IdM solutions,for example,for entity and data authentication.With cryptography,it is often possible to propagate trust from where it initially exists to where it is needed.The establishment of initial (75)________________ usually takes place in the physical world,and the subsequent propagation of trust happens online,often in an automated manner.
选项
A、with
B、on
C、of
D、for
答案
D
解析
转载请注明原文地址:https://kaotiyun.com/show/jMTZ777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2014下集管)某负责人在编制项目的《详细可行性研究报告》时,列出的提纲如下,按照详细可行性研究报告内容要求,该报告中缺少的内容______。①项目概述;②需求确定;③现有资源、设施情况分析;④设计(初步)技术方法;⑤投资估算和资金筹措计划;⑥项目组织
(2007上监理)我国的信息工程监理是指具有相应资质的工程监理企业,接受建设单位的委托对承建单位的______。
(2010下集管)2005年,我国发布《国务院办公厅关于加快电子商务发展的若干意见》(国办发(2005)2号),提出我国促进电子商务发展的系列举措。其中,提出的加快建立我国电子商务支撑体系的五方面内容指的是______。
(2014上集管)某项目经理绘制的WBS局部图如下图所示。B、C工作包的负责人对人日数进行了估算,依据他们的估算结果,项目经理得出了分项工程A的人日数结果,他采用的是______方法。
(2010上项管)对于系统集成企业而言,在进行项目核算时,一般将______列入项目生命周期间发生的直接成本。①可行性研究费用;②项目投标费用;③监理费用;④需求开发费用;⑤设计费用;⑥实施费用;⑦验收费用
(2012上集管)关于范围确认的叙述中,______是不正确的。
(2012上项管)一家公司需要确定使用为期5年的一种设备的更换策略。已知各年购买设备的价格和各年龄设备的维修价格如表1和表2所示:最优的设备更换策略中,总费用是______。
(2011上项管)模型-视图-控制器(MVC)模式是专门针对交互系统提出的。J2EE支持用MVC模式构建应用系统。“视图”是应用系统的表示界面,可由JSP页面产生和实现;“控制器”是提供应用的处理过程控制,一般通过一个Servlet实现;“模型”代表的是应
(2012下项管)假设A和B之间要进行加密通信,则正确的非对称加密流程是______。①A和B都要产生一对用于加密和解密的加密密钥和解密密钥;②A将公钥传给B,将私钥自己保存,B将公钥传送给A,将私钥自己保存;③A发送消息给B
(2014下项管)某项目实施需要甲产品。若自制,单位产品的可变成本为12元,并需另外购买一台专用设备,该设备价格为4000元;若采购,购买量大于3000件,购买价格为13元/件,购买量少于3000件时,购买价为14元/件,则甲产品用量_____(1)时,外
随机试题
金属切削机床是用切削方法将毛坯加工成机器零件的装备。下列选项中属于金属切削机床易造成机械性伤害的危险部位或危险部件有()。
Lifewithoutbooksisincomplete.Booksinfluencethedepthandbreadthoflife.Theymeetthenatural【B1】______forfreedom,for
关于急性泌尿道感染的临床表现,下列哪项是错误的
《招标投标法》规定,招标分为( )。
根据《人民币银行结算账户管理办法》的规定,下列各项中,可以申请开立基本存款账户的是()。
应收账款周转率提高意味着()。Ⅰ.短期偿债能力增强Ⅱ.收账费用减少Ⅲ.收账迅速,账龄较短Ⅳ.销售成本降低
应当先履行合同债务的当事人不得行使不安抗辩权的情形是:有确切证据证明对方()。
精简机构
设奇函数f(x)在[-1,1]上具有2个阶导数,且f(x)=1。证明:存在η∈(-1,1),使得f"(η)+f’(η)=1.
JohnMiltonwasa(n)
最新回复
(
0
)