Answer:
A. Where the private keys are stored
Step-by-step explanation:
In computer security, a trust model is used to define and establish the relationships of trust between entities in a system. It specifies how these entities can be authenticated and authorized to access resources and services on the network.