首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
admin
2020-04-30
12
问题
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (71)________________ our welfare.In online environments we depend on a wide spectrum of things,ranging from computer hardware,software and data to people and organizations.A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions,hence,a trusted entity is the same as an entity that is assumed to function according to policy. A consequence of this is that a trusted component of a system must work correctly in order for the security of that system to hold,meaning that when a trusted (72)________________ fails,then the systems and applications that depend on it can (73)________________ be considered secure.An often cited articulation of this principle is:‘a trusted system or component is one that can break your security policy’(which happens when the trusted system fails).The same applies to a trusted party such as a service provider(SP for short),that is,it must operate according to the agreed or assumed policy in order to ensure the expected level of security and quality of services.A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on.This is because the security of an infrastructure consisting of many trusted components typically follows the principle of the weakest link,that is,in many situations the overall security can only be as strong as the least reliable or least secure of al l the trusted components.We cannot avoid using trusted security components,but the fewer the better.This is important to understand when designing the identity management architectures,that is,fewer the trusted parties in an identity management model,stronger the security that can be achieved by it.
The transfer of the social constructs of identity and trust into digital alld computational conceptshelpsindesigningandimplementinglarge scaleonlinemarketsandcommunities,and also plays an important role in the converging mobile and Internet environments.Identity management fdenoted IdM hereafter)is about recognizing and verifying the correctness of identities in online environments.Trust management becomes a component of (74)________________ whenever different parties rely on each other for identity provision and authentication.IdM and trust management therefore depend on each other in complex ways because the correctness of the identity itself must be trusted for the quality and reliability of the corresponding entity to be trusted.IdM is also an essential concept when defining authorisation policies in personalised services.
Establishing trust always has a cost,so that having complex trust requirements typically leads to high overhead in establishing the required trust.To reduce costs there will be incentives for stakeholders to‘cut comers’regarding trust requirements,which could lead to inadequate security.The challenge is tO design IdM systems with relatively simple trust requirements.Cryptographic mechanisms are often a core component of IdM solutions,for example,for entity and data authentication.With cryptography,it is often possible to propagate trust from where it initially exists to where it is needed.The establishment of initial (75)________________ usually takes place in the physical world,and the subsequent propagation of trust happens online,often in an automated manner.
选项
A、entity
B、person
C、component
D、thing
答案
C
解析
转载请注明原文地址:https://jikaoti.com/ti/d1x7FFFM
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2012上项管)机会研究、初步可行性研究、详细可行性研究、评估与决策是项目前期的四个阶段,在实际工作中,依据项目的规模和繁简程度,其中可以省略的阶段是______。
(2010上集管)为了解决C/S模式中客户机负荷过重的问题,软件架构发展形成了______模式。
(2012上项管)某大型布线项目由甲、乙两个项目组成。甲项目场地准备需3天,乙项目场地准备需2天;甲项目施工需5天,乙项目施工需4天。两个项目的场地准备都需要一台专用设备。在只有一台可用的专用设备的情况下,此大型项目至少需要______天才能完成。
(2010上项管)某市数字城市项目主要包括A、B、C、D、E等五项任务,且五项任务可同时开展。各项任务的预计建设时间以及人力投入如下表所示。以下安排中,______能较好地实现资源平衡,确保资源的有效利用。
(2010上监理)支持较高传输速率的无线网络协议是______。
(2008上项管)TCP/IP是Internet采用的协议标准,它是一个协议系列,由多个不同层次的协议共同组成。其中______是属于网络层的低层协议,主要用途是完成网络地址向物理地址的转换。
(2009上软评)下面关于加密的说法中,错误的是______。
(2009下网规)网管人员在监测网络运行状态时,发现下列现象:服务器上有大量的TCP连接,收到了大量源地址各异、用途不明的数据包;服务器收到大量的ARP报文。网管人员的判断是______(1),针对前一现象将采取的措施是______(2),针对后一现象可能
(2011下项管)系统工程师小李希望查询到中国计算机职业技术资格网(http://www.rkb.gov.cn)的Web服务器的IP地址,他在一台连接到互联网的工作站上用命令行方式进行查询,下列命令中的______无法让小李查询到该网站的IP地址。
(2014下项管)当千兆以太网使用UTP作为传输介质时,限制单根电缆的长度不超过______(1)米,其原因是千兆以太网______(2)。(1)
随机试题
国有企业联华纺织厂,因不能清偿到期债务,于2002年6月16日,该厂向人民法院提出破产申请,人民法院受理此案后,依照法定程序,于2002年10月20日宣告该纺织厂破产,并于同年12月25日成立了清算组接管该纺织厂。随后,清算组对纺织厂的财产进行了清理,有关
作图3-3所示开孔斜圆锥管的展开图。
股份有限公司修改公司章程,必须经出席股东大会的股东所持表决权的()通过。
资本充足率的计算公式为()。
规章制度、办事程序、行为规范等属于组织文化中的()。
学生学习了m(a+b)=ma+mb后,认为lg(a+b)=la+lb,这在心理学中称为_____。
【2014年上】某初级中学开展法制教育月活动,要求学生的父母积极配合。有些父母说:“孩子到了学校,学校就该负责他的所有教育,我们平时工作忙,哪有时间管呐?”这些父母的说法()。
只有被告人供述,没有其他证据的不能认定被告人有罪和处以刑罚;没有被告人供述,证据充分确实的,可以认定被告人有罪和处以刑罚。()
TheweatherwasniceinTrumbullCountyonSaturdayevening.TherehadnotbeensuchaseverestorminTrumbullCountyforah
下面各项中,不在大连商品交易所上市的品种是()。
最新回复
(
0
)