首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
admin
2020-04-30
12
问题
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (71)________________ our welfare.In online environments we depend on a wide spectrum of things,ranging from computer hardware,software and data to people and organizations.A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions,hence,a trusted entity is the same as an entity that is assumed to function according to policy. A consequence of this is that a trusted component of a system must work correctly in order for the security of that system to hold,meaning that when a trusted (72)________________ fails,then the systems and applications that depend on it can (73)________________ be considered secure.An often cited articulation of this principle is:‘a trusted system or component is one that can break your security policy’(which happens when the trusted system fails).The same applies to a trusted party such as a service provider(SP for short),that is,it must operate according to the agreed or assumed policy in order to ensure the expected level of security and quality of services.A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on.This is because the security of an infrastructure consisting of many trusted components typically follows the principle of the weakest link,that is,in many situations the overall security can only be as strong as the least reliable or least secure of al l the trusted components.We cannot avoid using trusted security components,but the fewer the better.This is important to understand when designing the identity management architectures,that is,fewer the trusted parties in an identity management model,stronger the security that can be achieved by it.
The transfer of the social constructs of identity and trust into digital alld computational conceptshelpsindesigningandimplementinglarge scaleonlinemarketsandcommunities,and also plays an important role in the converging mobile and Internet environments.Identity management fdenoted IdM hereafter)is about recognizing and verifying the correctness of identities in online environments.Trust management becomes a component of (74)________________ whenever different parties rely on each other for identity provision and authentication.IdM and trust management therefore depend on each other in complex ways because the correctness of the identity itself must be trusted for the quality and reliability of the corresponding entity to be trusted.IdM is also an essential concept when defining authorisation policies in personalised services.
Establishing trust always has a cost,so that having complex trust requirements typically leads to high overhead in establishing the required trust.To reduce costs there will be incentives for stakeholders to‘cut comers’regarding trust requirements,which could lead to inadequate security.The challenge is tO design IdM systems with relatively simple trust requirements.Cryptographic mechanisms are often a core component of IdM solutions,for example,for entity and data authentication.With cryptography,it is often possible to propagate trust from where it initially exists to where it is needed.The establishment of initial (75)________________ usually takes place in the physical world,and the subsequent propagation of trust happens online,often in an automated manner.
选项
A、with
B、on
C、of
D、for
答案
D
解析
转载请注明原文地址:https://jikaoti.com/ti/W1x7FFFM
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2012上项管)“先论证,后决策”是现代项目管理的基本原则,关于建设方的项目论证,下列说法中,______是不正确的。
(2012下集管)某单位为加强项目管理、计划在2013年建设一个项目管理系统,但企业领导对该系统没有提出具体要求,钱工是项目负责人,要对项目的技术、经济等深入研究和方案论证,应_____(1)。如果钱工对比了自主开发和外购的成本、时间差异,该行为属于___
(2014上集管)(2009下架构)商业智能是指利用数据挖掘、知识发现等技术分析和挖掘结构化的、面向特定领域的存储与数据仓库的信息。它可以帮助用户认清发展趋势、获取决策支持并得出结论。______不属于商业智能范畴。
(2011下集管)以下各项中,不能作为项目成本预算工具或技术的是______。
(2014上项管)以下关于软件测试与质量保证的叙述中,______是正确的。
(2007上网工)下图为某系统集成项目的网络工程计划图,从图可知项目最短工期为____(1)天,至少需要投入_____(2)人才能完成该项目(假设每个技术人员均能胜任每项工作)。(2)
(2005上软评)由我国信息产业部批准发布,在信息产业部门范围内统一使用的标准,称为______。
(2013上集管)关键路径法是利用进度计划网络图所进行的一种分析技术,下面关于关键路径的说法中______是正确的。
(2008上项管)常见的软件开发模型有瀑布模型、演化模型、螺旋模型、喷泉模型等。其中_______(1)适用于需求明确或很少变更的项目,_______(2)主要用来描述面向对象的软件开发过程。(2)
(2007下项管)为了对计算机信息系统的安全威胁有更全面、更深刻的认识,信息应用系统安全威胁的分类方法一般用______三种“综合分类”方法。
随机试题
在市场规制法领域,属于经济法经济目标的是【】
下列级数中收敛的级数是()。
Inanycomprehensiontextyouwillfindwordsthatyoudon’tknow.Youcan【C1】______themupinadictionary,ofcourse,【C2】____
髓袢升支细段对NaCl的重吸收是()。
不符合肺心病胸部X线片表现的是
关于报关企业注册登记许可与报关单位注册登记的关系:报关企业必须先向海关申请办理注册登记许可手续,然后再向海关申请办理报关单位注册登记手续;而已具有对外贸易经营权的进出口货物收发货人,可直接向海关申请办理注册登记许可手续。
尽管资本是价值创造过程中的重要手段,资本积累的确是经济增长不可缺少的物质条件,但作为物化劳动或死劳动,它不可能自己创造自己。离开了人的劳动,它只能是一堆不能增值的一般等价物而已。资本并非个人努力的产物,而是集体或社会劳动的结果。从生理学的角度来看,每个人的
下面关于电子邮件的说法,不正确的是______。
一个类可以从直接或间接的祖先中继承所有属性和方法。采用这个方法提高了软件的【】。
A、Collectingmorewoodfromforests.B、Growingmoreorganiccrops.C、Makinggooduseofforests.D、Modernizingfarmingtechnolog
最新回复
(
0
)