Difference between revisions of "Trustworthiness"
Line 5: | Line 5: | ||
=Security= | =Security= | ||
If the data can only be accessed by someone who holds a piece of [[secret]], then, data security is protected by the | If the data can only be accessed by someone who holds a piece of [[secret]], then, data security is protected by the possession of such [[secret]]. Since people who don't have the [[secret]] simply have no access to the data content, therefore, the degree of security is determined by the strength of the [[secret]] protection. It stronger if the secret cannot be broken or guessed by the third party. | ||
=Irrefutability= | =Irrefutability= |
Revision as of 09:42, 9 September 2021
The quality of being trust-worthy can be related to the following three properties:
Security
If the data can only be accessed by someone who holds a piece of secret, then, data security is protected by the possession of such secret. Since people who don't have the secret simply have no access to the data content, therefore, the degree of security is determined by the strength of the secret protection. It stronger if the secret cannot be broken or guessed by the third party.
Irrefutability
The data content is irrefutable, if the data content includes information that indicates data sources, while the data set can be verified using publicly-known Tamperproofing techniques..
Availability
Some thing becomes available, when the resources is available over spacetime through Backup and Restore as a required reflexive procedure.