计算机类-外文文献-翻译

上传人:206****923 文档编号:90571470 上传时间:2019-06-13 格式:DOC 页数:13 大小:726.51KB
返回 下载 相关 举报
计算机类-外文文献-翻译_第1页
第1页 / 共13页
计算机类-外文文献-翻译_第2页
第2页 / 共13页
计算机类-外文文献-翻译_第3页
第3页 / 共13页
计算机类-外文文献-翻译_第4页
第4页 / 共13页
计算机类-外文文献-翻译_第5页
第5页 / 共13页
点击查看更多>>
资源描述

《计算机类-外文文献-翻译》由会员分享,可在线阅读,更多相关《计算机类-外文文献-翻译(13页珍藏版)》请在金锄头文库上搜索。

1、本科毕业论文外文文献及译文文献、资料题目:Core Java Volume IIAdvanced Features文献、资料来源:著作文献、资料发表(出版)日期:2008.12.1院 (部): 计算机科学与技术学院专 业: 网络工程班 级: 网络082姓 名: 刘治华学 号: 2008111242指导教师: 许丽娜翻译日期: 2012.5.10山东建筑大学毕业论文外文文献及译文外文文献:Core Java Volume IIAdvanced FeaturesWhen Java technology first appeared on the scene, the excitement was

2、not about a well-crafted programming language but about the possibility of safely executing applets that are delivered over the Internet (see Volume I, Chapter 10 for more information about applets). Obviously, delivering executable applets is practical only when the recipients are sure that the cod

3、e cant wreak havoc on their machines. For this reason, security was and is a major concern of both the designers and the users of Java technology. This means that unlike other languages and systems, where security was implemented as an afterthought or a reaction to break-ins, security mechanisms are

4、 an integral part of Java technology.Three mechanisms help ensure safety:Language design features (bounds checking on arrays, no unchecked type conversions, no pointer arithmetic, and so on).An access control mechanism that controls what the code can do (such as file access, network access, and so o

5、n).Code signing, whereby code authors can use standard cryptographic algorithms to authenticate Java code. Then, the users of the code can determine exactly who created the code and whether the code has been altered after it was signed.Below, youll see the cryptographic algorithms supplied in the ja

6、va.security package, which allow for code signing and user authentication.As we said earlier, applets were what started the craze over the Java platform. In practice, people discovered that although they could write animated applets like the famous nervous text applet, applets could not do a whole l

7、ot of useful stuff in the JDK 1.0 security model. For example, because applets under JDK 1.0 were so closely supervised, they couldnt do much good on a corporate intranet, even though relatively little risk attaches to executing an applet from your companys secure intranet. It quickly became clear t

8、o Sun that for applets to become truly useful, it was important for users to be able to assign different levels of security, depending on where the applet originated. If an applet comes from a trusted supplier and it has not been tampered with, the user of that applet can then decide whether to give

9、 the applet more privileges.To give more trust to an applet, we need to know two things:Where did the applet come from?Was the code corrupted in transit?In the past 50 years, mathematicians and computer scientists have developed sophisticated algorithms for ensuring the integrity of data and for ele

10、ctronic signatures. The java.security package contains implementations of many of these algorithms. Fortunately, you dont need to understand the underlying mathematics to use the algorithms in the java.security package. In the next sections, we show you how message digests can detect changes in data

11、 files and how digital signatures can prove the identity of the signer.A message digest is a digital fingerprint of a block of data. For example, the so-called SHA1 (secure hash algorithm #1) condenses any data block, no matter how long, into a sequence of 160 bits (20 bytes). As with real fingerpri

12、nts, one hopes that no two messages have the same SHA1 fingerprint. Of course, that cannot be truethere are only 2160 SHA1 fingerprints, so there must be some messages with the same fingerprint. But 2160 is so large that the probability of duplication occurring is negligible. How negligible? Accordi

13、ng to James Walsh in True Odds: How Risks Affect Your Everyday Life (Merritt Publishing 1996), the chance that you will die from being struck by lightning is about one in 30,000. Now, think of nine other people, for example, your nine least favorite managers or professors. The chance that you and al

14、l of them will die from lightning strikes is higher than that of a forged message having the same SHA1 fingerprint as the original. (Of course, more than ten people, none of whom you are likely to know, will die from lightning strikes. However, we are talking about the far slimmer chance that your p

15、articular choice of people will be wiped out.)A message digest has two essential properties:If one bit or several bits of the data are changed, then the message digest also changes.A forger who is in possession of a given message cannot construct a fake message that has the same message digest as th

16、e original.The second property is again a matter of probabilities, of course. Consider the following message by the billionaire father:Upon my death, my property shall be divided equally among my children; however, my son George shall receive nothing.That message has an SHA1 fingerprint of2D 8B 35 F3 BF 49 CD B1 94 04 E0 66 21 2B 5E 57 70 49 E1 7EThe distrustful father h

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 中学教育 > 其它中学文档

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号