首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
admin
2020-04-30
45
问题
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (71)________________ our welfare.In online environments we depend on a wide spectrum of things,ranging from computer hardware,software and data to people and organizations.A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions,hence,a trusted entity is the same as an entity that is assumed to function according to policy. A consequence of this is that a trusted component of a system must work correctly in order for the security of that system to hold,meaning that when a trusted (72)________________ fails,then the systems and applications that depend on it can (73)________________ be considered secure.An often cited articulation of this principle is:‘a trusted system or component is one that can break your security policy’(which happens when the trusted system fails).The same applies to a trusted party such as a service provider(SP for short),that is,it must operate according to the agreed or assumed policy in order to ensure the expected level of security and quality of services.A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on.This is because the security of an infrastructure consisting of many trusted components typically follows the principle of the weakest link,that is,in many situations the overall security can only be as strong as the least reliable or least secure of al l the trusted components.We cannot avoid using trusted security components,but the fewer the better.This is important to understand when designing the identity management architectures,that is,fewer the trusted parties in an identity management model,stronger the security that can be achieved by it.
The transfer of the social constructs of identity and trust into digital alld computational conceptshelpsindesigningandimplementinglarge scaleonlinemarketsandcommunities,and also plays an important role in the converging mobile and Internet environments.Identity management fdenoted IdM hereafter)is about recognizing and verifying the correctness of identities in online environments.Trust management becomes a component of (74)________________ whenever different parties rely on each other for identity provision and authentication.IdM and trust management therefore depend on each other in complex ways because the correctness of the identity itself must be trusted for the quality and reliability of the corresponding entity to be trusted.IdM is also an essential concept when defining authorisation policies in personalised services.
Establishing trust always has a cost,so that having complex trust requirements typically leads to high overhead in establishing the required trust.To reduce costs there will be incentives for stakeholders to‘cut comers’regarding trust requirements,which could lead to inadequate security.The challenge is tO design IdM systems with relatively simple trust requirements.Cryptographic mechanisms are often a core component of IdM solutions,for example,for entity and data authentication.With cryptography,it is often possible to propagate trust from where it initially exists to where it is needed.The establishment of initial (75)________________ usually takes place in the physical world,and the subsequent propagation of trust happens online,often in an automated manner.
选项
A、with
B、on
C、of
D、for
答案
D
解析
转载请注明原文地址:https://kaotiyun.com/show/jMTZ777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2010下集管)2005年,我国发布《国务院办公厅关于加快电子商务发展的若干意见》(国办发(2005)2号),提出我国促进电子商务发展的系列举措。其中,提出的加快建立我国电子商务支撑体系的五方面内容指的是______。
(2010上集管)与基于C/S架构的信息系统相比,基于B/S架构的信息系统______。
(2009下项管)下列选项中,项目经理进行成本估算时不需要考虑的因素是______。
(2005上项管)质量控制非常重要,但是进行质量控制也需要一定的成本,______可以降低质量控制的成本。
(2007下系分)某工程包括7个作业(A~G),各作业所需的时间和人数以及互相衔接的关系如图所示(其中虚线表示不消耗资源的虚作业):如果各个作业都按最早可能时间开始,那么,正确描述该工程每一天所需人数的图为______。
(2010下集管)程序员小张在某项目中编写了源代码文件X的0.1版(以下简称Xv0.1)。随后的开发中小张又修改了Xv0.1,得到文件X的1.0版(以下简称Xv1.0)。经过正式评审后,Xv1.0被纳入基线进行配置管理。下列后续活动中符合配置管理要求的是_
(2009上项管)把产品技能和知识带到项目团队的恰当方式是______。
(2008上项管)下图标明了六个城市(A~F)之间的公路(每条公路旁标注了其长度公里数)。为将部分公路改造成高速公路,使各个城市之间均可通过高速公路通达,至少要改造总计____(1)公里的公路,这种总公里数最少的改造方案共有____(2)个。(2)
区块链是一种按照时间顺序将数据区块以顺序相连的方式组合成的一种链式数据结构,并以密码学方式保证的不可篡改和不可伪造的分布式账本。主要解决交易的信任和安全问题,最初是作为______的底层技术出现的。
以数字表示的声音在时问上是离散的,而模拟声音在时间上是连续的。要把模拟声音转换为数字声音,就需在某些特定的时刻获取模拟声音,该过程称为________________。
随机试题
垂盆草能利湿退黄,清热解毒。主治__________,__________,__________,__________,__________。
治疗咳嗽,应以治肺为主,还应注意治
A.侧脑室B.大脑半球C.小脑D.第四脑室E.灰白质交界儿童胶质瘤好发于
有藏泄互用关系的两脏是
某一多层住宅,每户4kW用电设备容量,共30户,其供电电压应选择()。
下列各项业务,不可能影响主营业务成本金额的是()。
副文化指某一文化体系中相对于主文化的非从众的文化价值亚体系,由社会少数成员发明或引进,对社会秩序和发展起促进或阻碍作用。下列不属于副文化的是()。
教师拟定具体的教学活动目标时,应尽可能地从情感、态度、能力、知识、技能等方面加以考虑。()
下列各组词语中,没有错别字一组是()。
下列关于法律原则与法律规则的说法中哪些是正确的?()
最新回复
(
0
)