计算机专业英语论文.doc
《计算机专业英语论文.doc》由会员分享,可在线阅读,更多相关《计算机专业英语论文.doc(18页珍藏版)》请在三一办公上搜索。
1、计算机专业英语论文学校:北京电大怀柔分校专业:08春计算机信息管理学号:20087110130126姓名:网站:一、原文New technique of the computer networkAbstractThe 21 century is an ages of the information economy, being the computer network technique of representative techniques this ages, will be at very fast speed develop soon in continuously creative
2、ly, and will go deep into the peoples work, life and study. Therefore, control this technique and then seem to be more to deliver the importance. Now I mainly introduce the new technique of a few networks in actuality live of application.keywordsInternet Digital Certificates Digital Wallets Grid Sto
3、rage 1. ForewordInternet turns 36, still a work in progressThirty-six years after computer scientists at UCLA linked two bulky computers using a 15-foot gray cable, testing a new way for exchanging data over networks, what would ultimately become the Internet remains a work in progress. University r
4、esearchers are experimenting with ways to increase its capacity and speed. Programmers are trying to imbue Web pages with intelligence. And work is underway to re-engineer the network to reduce Spam (junk mail) and security troubles. All the while threats loom: Critics warn that commercial, legal an
5、d political pressures could hinder the types of innovations that made the Internet what it is today.Stephen Crocker and Vinton Cerf were among the graduate students who joined UCLA professor Len Klein rock in an engineering lab on Sept. 2, 1969, as bits of meaningless test data flowed silently betwe
6、en the two computers. By January, three other nodes joined the fledgling network. Then came e-mail a few years later, a core communications protocol called TCP/IP in the late 70s, the domain name system in the 80s and the World Wide Web - now the second most popular application behind e-mail - in 19
7、90. The Internet expanded beyond its initial military and educational domain into businesses and homes around the world. Today, Crocker continues work on the Internet, designing better tools for collaboration. And as security chairman for the Internets key oversight body, he is trying to defend the
8、core addressing system from outside threats.He acknowledges the Internet he helped build is far from finished, and changes are in store to meet growing demands for multimedia. Network providers now make only best efforts at delivering data packets, and Crocker said better guarantees are needed to pr
9、event the skips and stutters now common with video. Cerf, now at MCI Inc., said he wished he could have designed the Internet with security built-in. Microsoft Corp.Yahoo Inc. and America Online Inc., among others, are currently trying to retrofit the network so e-mail senders can be authenticated -
10、 a way to cut down on junk messages sent using spoofed addresses. Many features being developed today wouldnt have been possible at birth given the slower computing speeds and narrower Internet pipes, or bandwidth, Cerf said. 2.Digital Certificates Digital certificates are data files used to establi
11、sh the identity of people and electronic assets on the Internet. They allow for secure, encrypted online communication and are often used to protect online transactions. Digital certificates are issued by a trusted third party known as a certification authority (CA). The CA validates the identity of
12、 a certificate holder and “signs” the certificate to attest that it hasnt been forged or altered in any way. New Uses For Digital Certificates Digital certificates are now being used to provide security and validation for wireless connections, and hardware manufacturers are one of the latest groups
13、to use them. Not long ago, Version Inc. announced its Cable Modem Authentication Services, which allow hardware manufacturers to embed digital certificates into cable modems to help prevent the pirating of broadband services through device cloning. Using Version software, hardware makers can generat
14、e cryptographic keys and corresponding digital certificates those manufacturers or cable service providers can use to automatically identify individual modems. This ast-mileauthentication not only protects the value of existing content and services but also positions cable system operators to bring
15、a broad new range of content, applications and value-added services to market. When a CA digitally signs a certificate, its owner can use it as an electronic passport to prove his identity. It can be presented to Web sites, networks or individuals that require secure access. Identifying information
16、embedded in the certificate includes the holder s name and e-mail address, the name of the CA, a serial number and any activation or expiration data for the certificate. When the CA verifies a users identity, the certificate uses the holders public encryption key to protect this data. Certificates t
17、hat a Web server uses to confirm the authenticity of a Web site for a users browser also employ public keys. When a user wants to send confidential information to a Web server, such as a credit-card number for an online transaction, the browser will access the public key in the servers digital certi
18、ficate to verify its identity. Role of Public-Key Cryptography The public key is one half of a pair of keys used in public-key cryptography, which provides the foundation for digital certificates. Public-key cryptography uses matched public and private keys for encryption and decryption. These keys
19、have a numerical value thats used by an algorithm to scramble information and make it readable only to users with the corresponding decryption key. Others to encrypt information meant only for that person use a persons public key. When he receives the information, he uses his corresponding private k
20、ey, which is kept secret, to decrypt the data. A persons public key can be distributed without damaging the private key. A Web server using a digital certificate can use its private key to make sure that only it can decrypt confidential information sent to it over the Internet. The Web servers certi
21、ficate is validated by a self-signed CA certificate that identifies the issuing CA. CA certificates are preinstalled on most major Web browsers, including Microsoft Internet Explorer and Netscape Navigator. The CA certificate tells users whether they can trust the Web server certificate when its pre
22、sented to the browser. If the validity of the Web server certificate is affirmed, the certificates public key is used to secure information for the server using Secure Sockets Layer (SSL) technology. Digital certificates are used by the SSL security protocol to create a secure “pipe” between two par
23、ties that seek confidential communication. SSL is used in most major Web browsers and commercial Web servers. 3. Digital Wallets-A digital wallet is software that enables users to pay for goods on the Web It holds credit-card numbers and other personal information such as a shipping address Once ent
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机专业 英语论文

链接地址:https://www.31ppt.com/p-2351533.html