GLOSSARY ENTRY (DERIVED FROM QUESTION BELOW) | ||||||
---|---|---|---|---|---|---|
|
11:01 Oct 10, 2005 |
Spanish to English translations [PRO] Tech/Engineering - Computers: Systems, Networks / digital certification | |||||||
---|---|---|---|---|---|---|---|
|
| ||||||
| Selected response from: Jane Lamb-Ruiz (X) | ||||||
Grading comment
|
Summary of answers provided | ||||
---|---|---|---|---|
5 +1 | unique identifier |
| ||
4 +1 | univocal |
| ||
5 | unequivocal |
| ||
4 | unanimous |
|
unívoco univocal Explanation: [PDF] LOCAL MANAGEMENT OF CREDITS AND DEBITS IN MOBILE AD HOC NETWORKSFile Format: PDF/Adobe Acrobat - View as HTML discuss a solution to achieve a univocal identification of a node in MANET en- ... Digital certificates have a validity period, after that they expire. ... sec.isi.salford.ac.uk/cms2004/ Program/CMS2004final/p2a1.pdf sec.isi.salford.ac.uk/cms2004/ Program/CMS2004final/p2a1.pdf |
| |
Login to enter a peer comment (or grade) |
unívoco unequivocal Explanation: Meaning "unambiguous"... GlobalSign SSL certificate and PKI solutions A digital certificate is a virtual document that guarantees the identity of the ... certificate is an unequivocal e-mail address without authentication. ... www.globalsign.net/company/press/worldonline.cfm Golden Telecom This feature provides for unequivocal identification of the sender or author of a document ... A digital certificate is signed with a private key of the CA, ... www.goldentelecom.ru/eng/services.asp?c_no=2002&d_no=2072 Traveling in the Digital Age. A key component of such solutions is the unequivocal identification of a person. ... A digital certificate can be issued for the data on the chip, ... www.gi-de.com/portal/page?_pageid=44,93797&_dad=portal&_sch... Hope it helps! |
| |
Login to enter a peer comment (or grade) |
unívoco unique identifier Explanation: is the usual term....in TCP/IP.....there are unique identifier for different segments on a network....they are given in bits..zeros and ones A UUID is an identifier that is unique across both space and time1, with respect ... Depending on the network data representation, the multi-octet unsigned ... www.opengroup.org/onlinepubs/9629399/apdxa.htm - 20k - Cached - Similar pages Windows XP Bridging and Media Support for Home Networking ... each network segment must have a unique network identifier and each host must ... network segment identifier and a unique host identifier for each host. ... www.microsoft.com/technet/ prodtechnol/winxppro/plan/xpbrdgnt.mspx - 33k - Cached - Similar pages -------------------------------------------------- Note added at 2 hrs 29 mins (2005-10-10 13:30:45 GMT) -------------------------------------------------- More on Digital Certificates: Contents of a digital certificate A certificate contains several pieces of information, including information about the owner of the certificate and the issuing CA. Specifically, a certificate includes: The distinguished name (DN) of the owner. ****A DN is a unique identifier*****, a fully qualified name including not only the common name (CN) of the owner but the owner's organization and other distinguishing information. The public key of the owner. The date on which the certificate is issued. The date on which the certificate expires. The distinguished name of the issuing CA. The digital signature of the issuing CA. The message-digest function creates a signature based upon all the previously listed fields. The core idea of a certificate is that a CA takes the owner's public key, signs the public key with its own private key, and returns the information to the owner as a certificate. When the owner distributes the certificate to another party, it signs the certificate with its private key. The receiver can extract the certificate that contains the CA signature) with the owner's public key. By using the CA public key and the CA signature on the extracted certificate, the receiver can validate the CA signature. If valid, the public key that is used to extract the certificate is recognized as good. The owner signature is validated, and if the validation succeeds, the owner is successfully authenticated to the receiver. The additional information in a certificate helps an application decide whether to honor the certificate. With the expiration date, the application can determine if the certificate is still valid. With the name of the issuing CA, the application can check that the CA is considered trustworthy by the site. A process that uses certificates must provide its personal certificate, the one containing its public key, and the certificate of the CA that signed its certificate, called a signer certificate. In cases where chains of trust are established, several signer certificates can be involved. |
| |
Grading comment
| ||
Login to enter a peer comment (or grade) |
unívoco unanimous Explanation: Just another option |
| |
Login to enter a peer comment (or grade) |
Login or register (free and only takes a few minutes) to participate in this question.
You will also have access to many other tools and opportunities designed for those who have language-related jobs (or are passionate about them). Participation is free and the site has a strict confidentiality policy.