Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Trusted computing

2025-01-15 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Seeing the video of Ma Yun's speech some time ago, he said that many people think that this society lacks trust, people in this society lack social morality; people do not trust each other, do not want to help strangers, people do not trust the government, lack of confidence in the government; society has no confidence in companies, no confidence in products, no confidence in food and drinking water, no confidence in all kinds of social security. But in this society, this kind of thing still happens every day, remit money to a completely unknown person, wait a few days to get what they want, and before some buyers confiscate the money, they send the product to a place they have never heard of to a person they have never heard of, and then get it back. This happens millions or millions of times every day. Our society is trustworthy.

Some time ago, I listened to the teachers at the forefront of the subject talk about the credibility of software and systems. I think Taobao is actually a web application with high credibility in China. Of course, Baidu search and Google search are more worthy of the trust of people all over the world.

Trusted computing is actually a technology, and proponents of this technology say it will make computers more secure, less vulnerable to viruses and malware, and therefore more reliable from an end-user perspective. Trusted computing will enable computers and servers to provide stronger computer security than existing ones. Opponents argue that the companies behind trusted computing are not so trustworthy, and that the technology gives system and software designers too much power and control. It is also considered that trusted computing will potentially force users' online interaction process to lose anonymity and enforce some unnecessary technologies. Finally, it is seen as the future version of copyright and copyright protection, which is important to users in the company and other markets, which has led to criticism and concerns about improper censorship.

Trusted software

The so-called "trusted software" usually refers to those software whose running behavior and results are always in line with people's expectations and can still provide continuous services in the event of interference.

The key project of the National 863 Program "highly trusted Software production tools and Integrated Environment" further defines the concept of "trusted software".

First, "software credibility" is used to refer to the objective quality of software, and "trusted software" is used to refer to users' subjective recognition of software objective quality.

Second, the more software that helps users identify with their objective quality, the more likely they are to get a higher level of credibility.

Credible challenges posed by the Internet

On the research object, the Internet-based software system runs in an open, dynamic and difficult-to-control Internet environment. Are those traditional software models and theories produced in a relatively closed, static and controllable environment applicable?

In terms of quality objectives, the credibility of Internet-based software systems has become the most important indicator. Is the traditional software quality evaluation system focusing on program correctness enough?

In terms of guarantee methods, Internet-based software systems need to obtain systematic credibility guarantee from development, verification and operation. Do the traditional software methods that focus on functional requirements and functional correctness need to be changed?

The research contents of Internet trusted technology need to be adjusted:

The research object has changed from "traditional software produced in a relatively closed, static and controllable environment" to "networked software running in an open, dynamic and difficult-to-control Internet environment".

The focus of the quality goal has changed from "internal and external quality of the system with relatively single index" to "credibility-based use quality with more comprehensive indicators".

The construction method has changed from "meeting functional requirements and ensuring functional correctness" to "meeting quality requirements and ensuring credibility".

The operation support has changed from "condensing the common application function and ensuring the correct operation of the software" to "condensing the common management function and ensuring the reliable operation of the software".

The credibility of Internet Information

Information credibility oriented to information itself

The credibility of the information itself is mainly based on the information itself, and the credibility of the information is studied according to its content characteristics and the relationship between them.

Website-oriented information credibility

Website credibility is the earliest area of Internet information that people pay attention to. The basic idea is that the credibility of the website is positively related to the credibility of the information in the website.

User-oriented information credibility

It is of practical significance to study the credibility of information from the user's point of view.

Two evaluation methods: credibility evaluation mechanism based on rating and voting and credibility evaluation mechanism based on trust propagation

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report