Difference between revisions of "Trustworthiness"

From PKC
Jump to navigation Jump to search
Line 5: Line 5:


=Security=
=Security=
If the data can only be accessed by someone who holds a piece of [[secret]], then, data security is protected by the ownership of such [[secret]]. Since people who don't have the [[secret]] simply have no access to the data content, therefore, the degree of security is determined by the strength of the [[secret]] protection. It stronger if the secret cannot be broken or guessed by the third party.
If the data can only be accessed by someone who holds a piece of [[secret]], then, data security is protected by the possession of such [[secret]]. Since people who don't have the [[secret]] simply have no access to the data content, therefore, the degree of security is determined by the strength of the [[secret]] protection. It stronger if the secret cannot be broken or guessed by the third party.


=Irrefutability=
=Irrefutability=

Revision as of 09:42, 9 September 2021

The quality of being trust-worthy can be related to the following three properties:

  1. Security
  2. Irrefutability
  3. Availability

Security

If the data can only be accessed by someone who holds a piece of secret, then, data security is protected by the possession of such secret. Since people who don't have the secret simply have no access to the data content, therefore, the degree of security is determined by the strength of the secret protection. It stronger if the secret cannot be broken or guessed by the third party.

Irrefutability

The data content is irrefutable, if the data content includes information that indicates data sources, while the data set can be verified using publicly-known Tamperproofing techniques..

Availability

Some thing becomes available, when the resources is available over spacetime through Backup and Restore as a required reflexive procedure.


Related Pages