Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (

admin2020-04-30  11

问题   Trust is typically interpreted as a subjective belief in the reliability,honesty and security  of an entity on which we depend (71)________________  our welfare.In online environments we depend on  a wide spectrum of things,ranging from computer hardware,software and data to people and  organizations.A security solution always assumes certain entities function according to  specific policies.To trust is precisely to make this sort of assumptions,hence,a trusted entity  is the same as an entity that is assumed to function according to policy. A consequence of this  is that a trusted component of a system must work correctly in order for the security of that  system to hold,meaning that when a trusted (72)________________  fails,then the systems and applications  that depend on it can  (73)________________  be considered secure.An often cited articulation of this  principle is:‘a trusted system or component is one that can break your security policy’(which  happens when the trusted system fails).The same applies to a trusted party such as a service  provider(SP for short),that is,it must operate according to the agreed or assumed policy in  order to ensure the expected level of security and quality of services.A paradoxical conclusion  to be drawn from this analysis is that security assurance may decrease when increasing the  number of trusted components and parties that a service infrastructure depends on.This is  because the security of an infrastructure consisting of many trusted components typically  follows the principle of the weakest link,that is,in many situations the overall security can  only be as strong as the least reliable or least secure of al l the trusted components.We cannot  avoid using trusted security components,but the fewer the better.This is important to  understand when designing the identity management architectures,that is,fewer the trusted  parties in an identity management model,stronger the security that can be achieved by it.
    The transfer of the social constructs of identity and trust into digital alld computational conceptshelpsindesigningandimplementinglarge scaleonlinemarketsandcommunities,and also  plays an important role in the converging mobile and Internet environments.Identity management  fdenoted IdM hereafter)is about recognizing and verifying the correctness of identities in online  environments.Trust management becomes a component of  (74)________________  whenever different parties  rely on each other for identity provision and authentication.IdM and trust management  therefore depend on each other in complex ways because the correctness of the identity itself  must be trusted for the quality and reliability of the corresponding entity to be trusted.IdM is  also an essential concept when defining authorisation policies in personalised services.
    Establishing trust always has a cost,so that having complex trust requirements  typically leads to high overhead in establishing the required trust.To reduce costs there  will be incentives for stakeholders to‘cut comers’regarding trust requirements,which  could lead to inadequate security.The challenge is tO design IdM systems with relatively  simple trust requirements.Cryptographic mechanisms are often a core component of IdM  solutions,for example,for entity and data authentication.With cryptography,it is often  possible to propagate trust from where it initially exists to where it is needed.The  establishment of initial  (75)________________  usually takes place in the physical world,and the subsequent  propagation of trust happens online,often in an automated manner.

选项 A、entity
B、person
C、component
D、thing

答案C

解析
转载请注明原文地址:https://jikaoti.com/ti/d1x7FFFM
0

相关试题推荐
最新回复(0)