Spam-I-am A Proposal for Spam Control using Distributed Quota Management
PWM、S-PAM及PHASE电压联动控制技术在变频空调上的应用

Iq,所以在低频下,Ke 越大,产生的电机转矩就越 大。这样高效率电机,可以换言之,将发电定数 Ke
增大设计了的电机。但是这样,按照( 1) 式那样,
将 Ke 变大了的电机的时候,因为即使相同速度诱
起电压也会 变 大,所 以,通 过 高 速 度 驱 动,如 何 增
大电机电压 Vm 成为了必要。
图 5 是表示励磁电流 Id 和电机电流的大小 Im 之间的关系的图。就像刚才用图 3 进行的说明一
电机电流依赖 d 轴和电磁束位置间的角度
图 4 电机等价回路
3 PWM、S - PAM、PHASE 三种电压控制
3. 1 PWM 电压控制法:
图 1 所示的变频器主回路的 6 个晶体管,通
过用比变频 器 频 率 更 高 的 频 率 使 其 转 换,将 电 机
电压弄成正 弦 波 状 的 同 时,控 制 电 机 电 压 的 大 小
样,变频器输出电压的大小还有充分的余量,在
最大可以输出的电压以下的电压范围中,电机电流 按照成为最小的励磁电流 Id 来流动运转。
图 5 励磁电流 Id 和电机电流 Im 的关系
3. 2 S - PAM 电压控制
S - PAM 技术是根据压缩机负荷的变化,自动
改变 PFC( PFC 称为功率因数校正) 回路中的 Ed /
2. 5 输入以上实行 4 个信号的电机控制软 件,应当进行 PFC 主回路 2 的电控以及变频主回 路 3 的两方电控,输出以下 2 种信号:
( 1) PWM Timer1 中,通过 DRIVE 回路,给构 成 PFC 主回路 2 的 IGBT TR1 输送驱动信号。
( 2) 通过 DRIVE 回路 2,给构成变频主回路 3 的 6 个 IGBT TR2 - TR7 输送驱动信号群。
外企邮件常用英语表述

外企邮件常用英语表述很多外企职员需要经常发些英文电子邮件来跟同事、老板沟通汇报工作,本文整理汇总了一些日常电子邮件中可能会频频用到的英文表述,像是咨询、建议、反馈、感谢等,希望有助大家的工作学习。
缩写ext. (Extens ion 电话分机)♦ Greeti ng messag e 祝福Hope you have a good trip back. 祝旅途愉快。
How are you? 你好吗?How is the projec t goingon? 项目进行顺利吗?♦ Initia te a meetin g 发起会议I sugges t we have a call tonigh t at 9:30pm (ChinaTime) with you and Brown. Please let me know if the time is okay for you and Ben.我建议我们今晚九点半和Brown小聚一下,你和Ben有没有空?I wouldlike to hold a meetin g in the aftern oon aboutour develo pment planni ng for the projec t A.今天下午我建议我们就A项目的发展计划开会讨论一下。
We'd like to have the meetin g on Thu Oct 30. Same time.十月三十号(周三),老时间,开会。
Let's make a meetin g next Monday at 5:30 PM SLC time.下周一盐湖城时区下午五点半开会。
I want to talk to you over the phoneregard ing issues aboutreport develo pment and the XXX projec t.我想跟你电话讨论下报告进展和XX X项目的情况。
Controlling Spam through Lightweight Currency

Controlling Spam through Lightweight Currency∗David A.Turner and Daniel M.Havey(dturner@,dhavey@)Department of Computer ScienceCalifornia State University San BernadinoSan Bernardino,CA92407August24,2003Phone:909-473-8678Fax:909-880-7004Topic area of the submission:Computing Practices and ApplicationsKeywords:spam,micro-payments∗The support of the National Science Foundation under award9810708is gratefully acknowledged.1AbstractSpam is an ongoing problem on the Internet today, and an increasing body of literature from research pa-pers to the popular press addresses the problem.The solutions generally fall into the categories of payment-based,legislative,andfilter-based.In this paper,we present a payment-based solution to the spam prob-lem that can reduce the level of unsolicited emails to reasonable levels without imposing legal restric-tions on free speech,and without the use of email filters.Specifically,we propose that mail transfer agents(MTAs)make payments with the Lightweight Currency Protocol(LCP)when sending email into other mail domains.Mail service providers specify payment requirements that discourage spam,but en-courage the freeflow of other email.Thus,our pro-posal makes it possible to control spam without end user involvement or modification to user agents.The advantages of using the LCP for mail delivery include its conceptual simplicity,security,scalability,flexibil-ity and low cost.With LCP,mail domains have the ability to issue their own currency or use currency is-sued by either other mail domains or by other LCP-based service providers outside of the email system. The ability for domains to issue their own currency ensures the system will scale to meet demand,and enables domains to operate spam-reduced mail ser-vices without paying an outside authority for needed currency.1IntroductionFor the purpose of this paper,we make a distinction between the terms spam and junk mail.By spam,we mean email messages that possess one or more of the following characteristics:1.indiscriminately copied to millions of inboxes,rather than targeted to users that have“opted in”in some way2.contains false return addresses,or other false en-velop data3.contains material that is widely held to be ob-jectionable or embarrassing that is sent withoutconsent4.was generated by a computer virus5.has been specifically formatted to pass throughemailfiltersBy junk mail,we mean unsolicited email that doesn’tfit into the definition of spam,but con-tains advertising targeted to the recipient.In other words,junk email should resemble junk mail that people receive non-electronically by post.Obviously, these definitions lack absolute precision.Neverthe-less,they work reasonably well when describing how our payment-based system works in relation to other methods.Approaches to solving the spam problem generally fall into three categories:litigation,filtering and pay-ments.Under the litigation approach,governments pass laws against sending spam,and enforcement of these laws reduces spam after spammers begin to fear punishment.This approach is naively supported by a large segment of the population,because people are unaware of both the social costs of increasing gov-ernment control of speech,and the economic costs of enforcement.Payment-based systems are superior to litigation approaches,because they reduce spam without adding legal restrictions to speech in the form of email,and avoid increasing government taxation.The argument presented so far against a litigation-based approach assumes that government expendi-tures will be sufficient to solve the problem;however, this is not likely to be the case.Another consider-ation is that email can originate from any country, and so a litigation-based approach to spam would re-quire international agreements,and countries would need to provide relatively equal levels of enforcement. Clearly,litigation is an overly complex and expensive solution,and ought to be reconsidered by policy mak-ers in the government.Another general approach to spam is the use of emailfilters,which automatically block spam from entering user inboxes.The main problem with the filter-based approach is that it is not100%accurate in detecting spam;both false positives and false neg-atives occur.A false positive means thefilter has mistakenly marked a legitimate email as spam,and 1thus does not get delivered to the user(or gets deliv-ered to a bulk mail folder).A false negative means that an email that is spam is marked as not being spam.While this may not result in too much of an inconvenience to the user that receives an occasional spam,it encourages spammers to send more emails in an attempt to bypass thefilter.Thus,filters have the negative effect of exacerbating the problem of re-source consumption originating from spam.Clearly,filters are a temporary solution to the problem at the current time,and do not represent a long-term,cost-effective solution as do payment-based systems. Payment-based approaches rely on cooperating email systems to create economic disincentives to spam.To accomplish this,these mail servers require a small payment in exchange for delivering an email to the recipient’s inbox.The payment is kept small enough to allow legitimate email to pass into user in-boxes,but large enough to make sending large num-bers of junk emails unprofitable.While a payment requirement will deter spam,it will most likely not deter junk email.Advertisers still deliver junk mail by post even though the cost is roughly20cents per letter.Although it is possible to set email delivery payments at this level,a payment on the order of one cent per email is more likely.Thus,it is also likely that advertisers will simply accept this cost and con-tinue to deliver junk email.It is also likely that adver-tisers will expend extra effort to narrow their mailing lists to avoid sending unnecessary emails in order to reduce costs.In this paper we propose a solution to the problem using Lightweight Currency Protocol LCP.The idea is that each SMTP mail server will use LCP pseudo-currency to make a payment every time that they send email and will receive a payment when they receive a piece of email.Several other researchers have proposed payment-based schemes.One idea is to require a proof of work (POW)payment[6,8].These payments are one-time payments that the sending domain sends to the re-ceiving domain;they are not reusable or transfer-able.After the sending domain connects,the receiv-ing domain presents a mathematical puzzle to the sender that requires a significant amount of time for the sender to solve.After the sender computes the solution to the puzzle,it sends the solution to thereceiving domain.While computing the solution to the puzzle consumes significant resources,verifying that it is correct can be done relatively easily.After the receiving domain verifies the response is correct, it accepts delivery of the email.The idea is that spammers will not have the resources to compute the solution to the millions of puzzles that will be pre-sented to them.There are two essential problems with POW schemes when compared to LCP:they waste the resources of senders by requiring a mean-ingless computation to be performed,and compute time requirements vary too much across the range of CPU speeds.Fahlman and Wegman of IBM have proposed the use of charity stamps for controlling spam[10].In this system,senders of email purchase stamps that are required in order for delivery of email,and the proceeds are given to charity.One problem with this system is the requirement of a central authority to decide on the price of stamps,and on which chari-ties earn the proceeds.The LCP-based system,in contrast,operates in a self-regulated,fully open mar-ket with multiple currencies.Power is distributed among participants,rather than concentrated in a central authority.Additionally,LCP currencies are not restricted to email services,but are redeemable for services outside of email.In section two of this paper,we present an overview of the LCP,and highlight its features as they per-tain to our solution.In section three,we present our solution to the problem of spam,and define the LCP-based email architecture.In section four,we investigate the cost of controlling spam,and detail the economic ramifications of the use of Lightweight Currency payments.In sectionfive,we illustrate the relationship of our spam solution to the larger peer-to-peer resource market,and describe how wefit into the big picture.Section six is devoted to the inves-tigation of security issues,and in section seven,we describe deployment strategies.We conclude in sec-tion eight.22Overview of LCPThe lightweight currency protocol is a relatively sim-ple mechanism by which an organization can issue a generic currency that can be used as a medium of exchange independent of any particular application. The term lightweight reflects the simplicity by which an organization can issue such currencies,and the ease by which implementers can integrate lightweight currency payment mechanisms in their applications. Lightweight currency is an effective alternative to real-world currency for micro-payment schemes,be-cause it is easy to integrate into applications,and it is not directly tied to real-world currencies.Under the lightweight currency paradigm,an or-ganization issues a currency by generating a pub-lic/private key pair,and distributes the public key as its identifier.Alternatively,an issuer can publish a certificate that binds a domain name to its pub-lic key,and then be identifiable through the domain name.Currency holders also generate a public/private key pair,and use the public key as an identifier.A currency holder holds a particular currency when the issuer of that currency has a record for the number of units of currency owned by the holder of the private key.The use of public keys as identifiers has two bene-fits:it provides a means for entities to generate glob-ally unique identifiers without the need of a central naming authority to control naming collision,and it allows entities to authenticate and establish secure communication channels.The LCP is a request/response protocol in which the issuer plays the role of server and the holder(of currency)plays the role of client.There are two re-quest messages and two corresponding response mes-sages.An entity spends a particular currency he/she holds by sending a transfer-funds message to the is-suer of the currency that identifies the recipient’s public key identifier,the amount to be transferred, and a transaction-id.If the sender of funds has a sufficient balance of funds,the issuer will debit the senders account by the amount requested(and op-tionally a small transaction charge),and will credit the account associated with the recipient.The recip-ient verifies that payment was received by connecting to the issuer and sending a get-activity request mes-sage.The issuer responds with an account-activity-statement that lists the deposits made to his/her ac-count since he last inquired.See[1]for an introduc-tion to the LCP,and visit for a complete definition of the protocol.3LCP-Based Email Architec-tureWe propose a payment mechanism whereby email servers require a payment to be made in a lightweight currency in order to accept an incoming email.The process is transparent to the sender:the mail for-warding agent of the sender’s domain is responsible for making this payment,and no changes need to be made to user agent software.Thus,responsibility is placed on the email service providers to ensure that spam is not passing through their systems.Methods by which service providers monitor and control their user accounts are not covered in this paper,but it is an important component of an overall solution based on the lightweight currency model.Because lightweight currency can be issued by any organization,including the sending and receiving do-mains,there is a lot offlexibility during payment ne-gotiation.In the remainder of this section,we break down payment negation into the important cases,and explain how both sides might come to an agreement. For each of these cases,we assume that a user Al-ice is sending an email to user Bob.Alices email address is alice@,and Bobs email address is bob@.Thus,for this email to be deliv-ered,payment is made by domain to domain .We refer to these domains as simply A and B,respectively.Consider the case that A and B have a history of mail exchange,and that based on this history,both sides have agreed to accept payment in the others currency as long as the accepting end does not hold what it considers to be an excessive amount of the others currency.If A holds B dollars,then the pay-ment is clear:A pays B one B dollar for the delivery 3of Alices email.If B holds A dollars,then A will propose the pay-ment of another one of its dollars for the delivery of the email.If B does not hold(what it considers to be)too many A dollars,then it accepts this payment. On the other hand,if B holds too many A dollars,it will reject A’s offer,and ask for payment in another currency.In this case,B may send a list of curren-cies that it is seeking.This list will likely contain both powerful currencies with wide acceptance in the larger resource market,and the currencies of domains that hold large amounts of B’s currency.The reason B would accept a currency with wide acceptance in-clude the ability of B to redeem this currency for resources that support other applications of interest to its stakeholders,or to redeem this currency for real-world dollars.The reason B would accept a cur-rency from a domain that holds large amounts of Bs currency is that B wants to avoid getting into the sit-uation that A is in.To understand this,suppose that domain C holds a large number of B dollars,and that B wants to deliver email to C.If B gets a C dollar from A,then B is assured of having the email deliv-ered to C by paying with a C dollar.On the other hand,if B does not have a C dollar,then C may re-ject B’s offer to pay another B dollar,forcing B to spend a dollar of a widely accepted currency,which B may need to purchase with real-world dollars. Now we consider the case that A is sending email to B for thefirst time.It is possible,although un-likely,that A holds currency issued by B.If it does, it pays in B dollars.A may try to pay with A dol-lars.If A is using a certificate issued by a certificate authority that B trusts,then B may accept a lim-ited number of A dollars.In this manner,B lets new email into its user accounts,but only up to a limit.If B’s users respond to email coming from A’s domain, then A dollars will be spent by B to send mail back to A.However,there is the possibility that spammers could abuse the system if they are able to obtain new certificates at a cost less than the profit their spam may generate.Thus,the recommended practice is for email systems to require payment from unknown domains in a widely accepted currency that is re-deemable for valuable resources or real-world dollars, or to accept currency issued by domains for which therecipient domain needs funds,as described earlier.Spammers send out millions of emails from their domains without receiving a commensurate level of responses.Thus,a spammer can not acquire the lightweight currency needed to make so many deliver-ies.The spammer is thus forced to earn lightweight currency by selling useful resources in the resource market,or to purchase widely-accepted currency us-ing real-world dollars.While this may not eliminate all email that is judged to be spam,it will greatly reduce the large numbers of unsolicited emails that are currentlyflooding user inboxes.Mail service providers have theflexibility of adjusting their pricing policies to reduce spam to acceptable levels while al-lowing welcome email to enter into user inboxes with little or no cost.4The Cost of Controlling SpamCurrently,bulk email providers charge roughly$100 per million pieces of email,which is0.01cents per email.If these bulk email providers were required to purchase lightweight currency that results in a cost of one cent per email,the cost for sending one million emails becomes$10,000.Thus,it is reasonable to expect that a large percentage of today’s spam would be eliminated with a pricing scheme resulting in a charge of one cent per email.On the other hand,companies now distribute ad-vertising by postal mail at a rate of roughly20cents per piece.At a cost of one cent per email,adver-tisers may decide to spend one cent per email to deliver their message.We expect the result to be an improvement in the quality of unsolicited email. That is,advertisers will only send email that is ex-pected to generate a sufficiently positive response. So,a lightweight currency based solution to email would reduce unwanted emails,but would not elimi-nate them altogether.This is necessary if email is to remain an open communication channel in which one user can send an unsolicited(but welcomed)email to a new user.With a lightweight currency approach,individual 4email service providers have theflexibility of tuning their payment acceptance policies to reduce the fre-quency of unwanted email to acceptable levels.As spamming behaviors change over time,the systems flexibility allows for system operators to continually respond to these changes by adjusting their pricing policies.In some cases,senders of email that are welcomed by recipients naturally have a higher rate of outgoing email compared to their incoming mail.In this case, the sender will not be able to collect revenues from incoming emails.As an example,this may be the case with a mailing list operator,or with an e-commerce site that sends purchase confirmations.A legitimate mailing list operator(an operator sending email that is welcomed by recipients)does not operate at the same levels as indiscriminate spammers.Perhaps a mailing list operator would send out one thousand emails per day as opposed to a spammer who might generate10million emails per day.At one cent per email,this mailing list op-erator pays$10per day compared to the spammer who pays$100,000per day.Thus,an appropriately chosen pricing scheme imposes sustainable costs to the mailing list operator,but not to the spammer. Still,any amount of real-world dollars may be un-acceptable to mailing list operators.In this case, these operators can earn the needed lightweight cur-rencies through several alternative approaches.One solution is for the mailing list operator to request users to respond to emails it sends as an indication that the user desires to continue receiving emails from the list operator.Each time a user sends an email of support,the users domain must transfer funds to the mailing list operators ers that truly value the list operators efforts will take the two or three seconds required to send such a reply.This approach has the advantage of discouraging overzealous list op-erators from sending unwanted emails.A second solution is for the list operator to col-lect needed currencies by selling unused bandwidth, storage and compute power in the raw resource mar-ket.Similar to the example presented in the previous section,the list operator can request payment in var-ious currencies that are acceptable to the domains to which the list operator wishes to send email.A third solution is for the list operator to require lightweight currency payments for the services that it provides to recipients.In this case,the recipients will need to purchase,or earn lightweight currency to make these payments.Alternatively,the list operator can request lightweight currency funds from some of its users as a show of support,and thus to enable it to deliver emails to the larger community of recipients.Another way to manage an imbalance of outgoing to incoming emails is to charge more for incoming emails and pay less for outgoing emails.For instance if a domain sends2emails for every one email re-ceived then this domain could try to charge2times as much for receiving email.Relatively small differ-ences in prices may be acceptable to email systems, because it will correct for any natural imbalances in flows between domains,but still not enable spammers to attain profitability.Under the lightweight currency based payment sys-tem,E-commerce sites that send purchase confirma-tions,but do not receive the same level of incom-ing emails from customers,would also need to earn or purchase the lightweight currency needed to make email deliveries.However,unlike the mailing list op-erators,these confirmations correspond to revenues that renders the cost of email insignificant.For ex-ample,if the average sale at an e-commerce site is $20,the one cent cost they need to expend to deliver a confirmation by email is negligible.5Relation to the Larger P2P Resource MarketRather than define a lightweight,micro-payment cur-rency for the restricted use of making email deliv-ery payments,we propose that email delivery pay-ments be made with the Lightweight Currency Pro-tocol(LCP)as defined in[1],because it is fully trans-ferable within the context of other applications.Be-cause LCP is SOAP-based,it is relatively easy for implementers to incorporate into applications.The benefit to using currencies that are fully transferable into other contexts is that these currencies will more easily acquire value.Additionally,email senders that 5send more email than they receive have access to ad-ditional methods of acquiring necessary currency.It also provides a way for email systems that receive more currency than they consume to redeem it for other desirable resources,or trade it more easily for real-world dollars.We illustrate with an example how the email sys-tem would interact with the broader resource mar-ket.Suppose that user Alice maintains an email ac-count with ,and she is the recipient of a newsletter.In the raw resource market,autonomous agents sell surplus CPU cycles,storage and band-width for their users.These agents provide a means for users to specify currency targets.This is useful for the user who needs to acquire specific currencies for the purchase of certain services,as is the case with Alice.So,Alice could input into her interface that she needs one hundred units of Yahoo currency sent to domain operating the newsletter she desires to receive.The agent would then seek to sell un-used resources for Yahoo dollars.The resources do not need to be sold directly to Yahoo,but can be sold to anyone who holds Yahoo currency.Perhaps an organization has holds some Yahoo currency with which it wishes to purchase CPU cycles,or perhaps a provider of streaming video has some Yahoo cur-rency with which it wishes to purchase bandwidth for the distribution of its content.In either of these cases,Alice’s resource selling agent may earn the de-sired yahoo currency by providing the sought after resources.After the yahoo dollars are earned,Alice’s agent transfers the required amount to the domain of the mailing list operator.Now,the mailing list op-erator can delivery emails to Alice without acquiring funds through any other activity other than deliver-ing its content.It should be kept in mind that this is a futuristic scenario that does not necessarily need to occur for the LCP-based payment system to succeed, but it is feasible,and illustrates theflexibility that results from the use of LCP.6Security IssuesThe lightweight currency protocol was designed as a fully secure method of micro-payment transactions.LCP messages are transported over SSL using client and server authentication.However,possible security vulnerabilities emerge because of the ability for spam-mers and other criminals to generate any number of public key identities at will.We call this the throw-away identity problem.We will look at the throw-away identity attack as well as a man in the middle attack in this section.A naive policy that accepts currency from anyone up to a certain limit is susceptible to the throwaway identity attack.In this attack,a spammer generates a public key identity,issues a currency through it, and uses this currency to send emails until the recip-ient domains currency limit is reached.The spam-mer generates as many public keys as necessary to deliver the desired number of emails to the recipi-ent system.A man-in-the-middle attack is possible if a recipient system accepts public key identities that are not bound by a certificate authority to the do-main name of the sender.In this attack,a man in the middle impersonates the parties on each end of the communication,issues currency that is worthless, and obtains currency issued by the sender.For exam-ple,suppose that A is sending email to B,andB has decided to accept A dollars as payment for delivery of the email.The man in the middle delivers email to B for A,but in the process of doing so,it makes B think that its public key is from A,so that B accepts worthless currency from the attacker.While this is happening,A transfers to the attacker a worthwhile currency.Although this kind of attack can not result in the attacker obtaining very much currency from A,it can discredit A to B,and result in a disruption of normal email service.There are two solutions to the throw away identity attack,depending on whether the recipient system has a small or large number of inboxes.If the recip-ient system has a small number of inboxes,then it is possible for a spammer to purchase a certificate, and use this to deliver a small number of emails to all small-scale systems.In this way,the spammer dis-tributes the expense of the certificate across a large number of small systems.Thus,if a small system does not send email into the domain of the originat-ing email,it should not accept that domains currency, even if that domain presents a valid certificate.If 6on the other hand,it does send email into the do-main,it may accept the senders currency.However, it should only accept its currency if presented with a valid certificate,in order to avoid exposure to the man-in-the-middle attack.The second solution for the throw away identity at-tack is appropriate for domains with large numbers of inboxes.In this case,a spammer must purchase too many certificates in order to reach a large number of inboxes,and so there is a built-in economic disincen-tive by virtue of the domains size.In this case,the recipient domain can simply accept currency from an issuer who presents a valid certificate.Security is a matter of policy.A nave security pol-icy while easy to implement and use is also easy to cheat.A strong policy requires more thought to de-sign and implement but can be just as easy to use while still providing powerful protection for its users. 7DeploymentThere are two avenues through which deployment can take place.In thefirst approach,system administra-tors install email server upgrades that incorporate the LCP based payment mechanism,and then configure and turn on the new functionality so that the system accepts both payment based mail delivery and ordi-nary delivery.We call this the partial deployment strategy.In the second approach,new spam-reduced email services are introduced into the market,and users maintain at least two email identities:one for their ordinary email accounts,and one for the spam-reduced account.We call this the full deployment strategy.Both approaches are promoted by the de-velopment of free open source libraries that provide the new functionality,and by incorporating the new functionality in existing open source code,such as sendmail,postfix,etc.Under the partial deployment strategy,mail ser-vice providers are encouraged to migrate to the new system incrementally.When LCP functionality is turned on in partial deployment mode in a mail domain,then its incoming mail server announces its support during the EHLO greeting when a mail sender connects.If a connecting client does not sup-port LCP,then the incoming mail server simply ac-cepts mail from the sender in the ordinary manner without payment.If the connecting client does sup-port LCP,then both sides transition into the new paradigm.However,for this transition to be se-cure,both ends should authenticate to each other by presenting certificates issued by a trusted authority. If this precaution is not taken,then a man-in-the-middle attack is possible.The connecting mail domains can immediately start using each others currency with some reasonable upper limit on the number of dollars one end will hold of the other ends currency.This limit may be a func-tion of the number of inboxes the system supports. However,this approach exposes small-scale mail sys-tems to the throw-away identity attack described in the section on security.Thus,the upper limit of cur-rency held by one end needs to be a fraction of the number of inboxes.After mailflows in both direc-tions between the two domains,then the upper limit on the number of dollars one end holds can be in-creased,because outgoing responses are demonstra-tion that the incoming mail from the other system is welcome.Of course,users should not respond to spam email for this to work.The partial deployment strategy is made more fea-sible if the currency being transacted between do-mains is used in other application domains,such as peer-to-peer content distribution,distributed backup,grid computing,content sales,etc.In this way,mail service operators will become cognizant of the larger LCP resource market,and thus be more apt to turn on LCP payment functionality in their systems.The benefit for partial deployment is that the delivery of spam can be detected and eliminated from a growing list of cooperating domains.We also believe that an educational campaign about the proper use of the system and the bene-fits that can be achieved from operating in a spam reduced LCP environment should be launched target-ing system administrators and corporate information officers.While the benefits of partial deployment are per-haps not so clear or convincing,the benefits of full deployment are more obviously significant.Under full deployment,users are expected to establish new 7。
2019人教版高中英语必修一Unit 4 词汇测试(四)

Book1 Unit 4词汇测试(四)(每空1分,共170分)一、单词默写1.a huge cloud of _______ 一大团气体2.the __________of the ancient city古城遗迹3.about 75 ________ of people大约75%的人们4.get a ____________吃惊5.set a _________ 设下陷阱6.___________the dead 掩埋死者7.spare no _________to do sth.不遗余力地做某事8.a deep ___________ 一道很深的裂缝9.throw a ___________扔砖块10.a __________ball 一个金属球11.the hope to _____ the country 统一国家的希望12.the _________ of this passage 这篇文章的语境13.__________ the floor 清扫地板14.huge _________ 巨浪15.___________ sb. on the head 击中某人的头16.___________ into a tree 撞上一棵树17.volcanic ____________火山喷发18.first ____________kit 急救箱19.go on ____________ 举行罢工20.keep ____________保持镇静e to ___________上台掌权,执政二、词性转换22.a waste of ______________浪费电→23.________________energy电能24._______ fresh air呼吸新鲜空气→25.take a deep______深呼吸→26.________with fear吓得屏住呼吸27.___________the economy重振经济→28.the ___________ of trade贸易振兴29.a woman of great ____________一个拥有非凡智慧的女人→30.a ___________ decision明智的决定31.____________ from shock遭受惊吓→32.physical ______________身体上的痛苦33.____________ newspapers送报纸→34.the ______________of goods货物的运送35.write a _____________写总结→36._________________the points 总结观点37.have an ____________ on对……有影响→38.an ______________ way一个有效的方法39.the ______________ of the room房间的长度→40.a ____________journey一段漫长的旅程41.quite _______十分安全的→e home_______安全地回家→43.________ instructions 安全指导44.________on依靠...幸存下来→45.the only _________唯一的幸存者→46.________ skills 生存技巧三、重点短语47._____ ruins严重受损;破败不堪48.blow________把……吹走49.instead _____而不是;代替50._____ shock震惊;吃惊51.suffer ________遭受;患……病52.as________像往常一样53.as _____似乎;好像;仿佛e to _____ end终结;走向末日55.dig _____挖掘;挖出56.get back up_____one’s feet站起来;恢复过来57.sweep__________消灭;彻底消除58.carry________执行59.hold_________坚持60._____ all directions朝四面八方61._____ hand 现有(尤指帮助)62._____the open air 露天;在户外四、单句默写★仿佛世界末日即将来临!It seemed 63.________ 64.________the world were coming to 65.________ 66.________!★在不到一分钟的时间里,一座大城市沦为废墟。
商务英语综合教程(中级) Unit 5-《商务英语综合教程》(中级)

Complete the following sentences with the words given.
assessment profile
campaign targeted
promotion simultaneously
branding resources
advertising optimize
Additional Reading
Top 6 Digital Advertising Strategies You Should Use for Mobile
1. Boost social posts
A boosted post on Facebook or Twitter shows up in the news feed like a post from a contact, attracting more attention than traditional advertising and bypassing ad blocks. Boosted posts also have a variety of audience targets you can apply, so you're reaching your ideal customers.
◆ Additional Reading E. Highlights Vocabulary Suggested Answers
Teaching Objectives
• 1. to learn the types of advertising; • 2. to learn advertising slogans; • 3. to learn advertising strategies for small
新疆维吾尔自治区阿克苏地区阿克苏市高级中学2024届高三3月开学考试英语试题含解析

新疆维吾尔自治区阿克苏地区阿克苏市高级中学2024届高三3月开学考试英语试题注意事项1.考生要认真填写考场号和座位序号。
2.试题所有答案必须填涂或书写在答题卡上,在试卷上作答无效。
第一部分必须用2B 铅笔作答;第二部分必须用黑色字迹的签字笔作答。
3.考试结束后,考生须将试卷和答题卡放在桌面上,待监考员收回。
第一部分(共20小题,每小题1.5分,满分30分)1.A scientist’s attempt to produce the world’s first gene-edited babies _____ are immune to HIV has sparked controversy in academia and the public.A.as B.whoC.whom D.whose2.I felt like giving up. I probably ________,but my Dad whispered, “Come on! You can make it.”A.would have B.would C.should D.should have3.-I was afraid I would miss the important lecture.-Oh, was that why you _______asking me to speed up?A.had kept B.are keepingC.would keep D.kept4.One of the true tests of leadership is the ability to recognize a problem ________ it becomes an emergency. A.when B.beforeC.after D.unless5.That was a very busy street that I was never allowed to cross accompanied by an adult.A.when B.if C.unless D.where6.The world’s attention ________ China’s Belt and Road Initiative,as it has great influence on the world’s economy. A.is to fix on B.was fixed onC.has fixed on D.is being fixed on7.— I got that job I wanted at the public library.—___________! That’s good news.A.Go ahead B.Cheers C.Congratulations D.Come on8.______ is important in study is diligence rather than intelligence.A.Which B.WhatC.Who D.When9.It was lucky that little Jack was not at home when the fire broke out;otherwise,he his life.A.had lost B.would lose C.would have lost D.might lose10.The shocking news made me realize ________ terrible problems we would face.A.what B.howC.that D.why11.Why do many students stick to private tutoring _____ they could easily master such knowledge at school? A.unless B.before C.after D.when12.She must have ranked her birthday presents in order of _because the top one is her favorite.A.value B.time C.interest D.preference13.Locals lived in rather ________ conditions until the founding of the People’s Republic of China in 1949. A.precious B.primitiveC.precise D.prior14.______ the efforts made by the police, a fantastic performance will be put on tomorrow.A.In place of B.In search ofC.In charge of D.In praise of15.By the time I saw the angry expression on his face, I ________ exactly what I was having to face.A.knew B.had known C.would know D.have known16.goes up must come down, and gasoline prices are coming down fast in some parts of America. A.WhereB.WhatC.WhichD.That17.To tell the truth, I would rather I ________ the pain instead of you. You don’t know how worr ied I was.A.took B.had takenC.have taken D.should have taken18.Y oung couples will be happy to see their babies _______ with good health and intelligence when they are born. A.to bless B.blessingC.blessed D.being blessed19.Decades ago, scientists believed that how the brain develops when you are a kid ______ determines your brain structure for the rest of your life.A.sooner or later B.more or less C.to and from D.up and down20. a single world can change the meaning of a sentence, a single sentence can change the meaning of a paragraph.A.Just as B.Even thoughC.Until D.Unless第二部分阅读理解(满分40分)阅读下列短文,从每题所给的A、B、C、D四个选项中,选出最佳选项。
英语作文—Spam Message
为了解决垃圾邮件问题,人们应该共同努力。政府应制定法律来严惩违法广告主和那些披露信息。手机的研究人员和开发人员应该升级的产品,使他们能够自动过滤垃圾邮件。人们应该行动起来,他们将摆脱垃圾邮件。
Spam Message
1.目前垃圾短信泛滥
2.这种现象产生的原因
3.如何解决这个问题
【范文】
Spam Message
With the increasing use of cell phones, spam message has become a heated problem. According to a survey, on average, people receive about 40 pieces of spam message per month. Spam message can disturb, confuse, or even threaten people at any time.
垃圾短信
随着手机使用的增加,垃圾邮件已成为一个热门问题。据一项调查显示,平均而言,人们接受了约40件垃圾短信每月。垃圾邮件的干扰,迷惑,甚至威胁到人们在任何时间。
一般来说,有两个原因为垃圾邮件的流行。一方面,由于文本信息是一个相对便宜的渠道,许多公司利用它来宣传他们的产品或服务,忽视人民的意愿。另一方面,那些持有大量的手机用户信息出售信息来赚钱。
To solve the problem of spam message, people should make joint efforts. The government should set up laws to severely punish the illegal advertisers and those who disclose information. Cell phone researchers and developers should upgrade the products and enable them to filter the spam automatically. Should people act together, they would be free from spam message.
作文范文之如何戒掉网瘾英语作文
如何戒掉网瘾英语作文【篇一:四级英语作文】directions: for this part,you are allowed 30 minutes to write a short essay. you should start your essay with a brief description of the picture and then express your views on the influence of smart phone addiction. you should write at least 120 words but no more than 180 words.【范文】smart phone addictionhas it ever happened to you? have you been among friends,whose eyes focused on their smart phones, without saying a word for a long time? as is illustrated in the picture above, lots of people suffer from that “smart phone addiction”.ironically, modern technology, which is supposed to enhance our contact with each other, has actually become the barrier to personal communication. that phenomenon is superficially plausible, but it is harmful in the long run. as for individuals, the unwillingness to communicate may produce the estrangement between people. concerning groups, relations are indispensable for interpersonal communication in the course of team work. from a social aspect, the survival and growth of a group is mainly dependent upon the sound communication with others. if not, the world would become a horrible place filled with misunderstanding and indifference.we can conclude from the previous discussion that interpersonal communication is of vital importance to us. it is high time that we put down the smart phones and resume communication with others. only in this way can we make our society more peaceful and harmonious.【译文】智能手机瘾在你身边发生过这样的事情吗?你是否经历过与一群朋友在一起,大家却都只盯着自己的手机,相互之间长时间一言不发?如上图所示,现在有很多人都有这种“智能手机瘾”。
SAP事务码大全超实用无基础可学会
生产部分:CC01—成立改正主数据CC02—改正改正主数据CC03—显示改正主数据MMR1 —原料MMB1 —半成品MMF1 —成品MM01 —创立物料MM02 —改正物料MM03 —显示物料(能够查察生产版本)MM04 —查问料号改正的历史纪录MM06 —标志待删除物料MM11 —排程成立料号MM13 —立刻履行已经schedule的成立或改正工作MM17 —批量改正物料(比方批量改正生产调动员、物料描绘等)MM50 —扩展物料视图MM60 —物料主数据清单显示(批量显示)MMAM —改正物料类型MR21----改正物质价钱CS01—物料BOM 创立CS02—物料BOM 改正CS03—物料BOM 显示CS07—创立工厂分派(比方将C003 的BOM 分派给C004 工厂)CS08—改正工厂分派CS09—显示工厂分派CS11—物料BOM 逐层睁开CS12—物料BOM 多层睁开CS13—BOM 汇总CS14—物料BOM 比较CS15—物料反查(依据组件查相应的BOM )CS20—物料BOM 批量改正CS80—物料BOM 改正文件(记录改正BOM 的历史记录)CC01—成立改正编号CC02—改正改正编号CC03—显示改正编号CC04—产品构造显示(物料、改正编号等对象)CC05—改正概观(批量显示改正编号追踪下的记录)CC11—成立物料订正版次CC12—改正物料订正版次CC22—改正对象管理记录CC23—显示对象管理记录CR01—创立工作中心CR02—改正工作中心CR03—显示工作中心CR05—批量显示工作中心CR06—批量显示工作中心中成本中心指派CR60—工作中心信息系统CA01—创立工艺路线CA02—改正工艺路线CA03—显示工艺路线CA80—按工作中心查问工艺路线CA85—批量替代工作中心CA98—完全删除工艺路线C223—创立生产版本MS31—创立年度生产计划MS32—改正年度生产计划MS33—显示年度生产计划MD01—运转工厂级MRP(履行多个物料需求计划)MD02—运转单项多层MRPMD03—同意单项、单层MRPMD04—显示库存需求清单MD07—库存需求清单集中显示MD09—查问生产订单的需求根源MD11—创立月度生产计划MD12—改正月度生产计划MD13—个别显示月度生产计划MD16—集中显示月度生产计划MD61--- 创立独立需求计划MD62—改正独立需求计划MD63—显示独立需求计划MD73--- 导出计划订单MDLD —打印物料需求计划清单CO01—创立生产订单CO02—改正生产订单(工单技术了案)CO03—显示生产订单CO05---集中下达生产订单CO07—创立不含物料的工单CO09—物料可用性检查COOIS—生产订单信息系统C027—领货清单CO40—个别变换变换到生产订单CO41—集中变换变换到生产订单CO48—部分变换变换到生产订单COHV—订单批量办理(批量下达生产订单,批量达成订单)CO11N—工单工序确认CO13—工单工序确认撤消CO14—查问竣工确认CO15—订单确认COGI—自动货物挪动:错误办理CO1F—会合订单确认CM01—工作中心检测MB1A —工单发料(装置投入)MB31—货物接受(装置产出)MB03—显示物料凭据(依据凭据号)MBST—撤消/冲物料凭据MB31—工单收货(/撤消收货)MCPO—产品剖析SHDB—bdc 数据导入SE11/SE16—查察详细的某个表的构造和数据内容SQVI—查察表与表的关系SE91—查察系统信息类ST05—SQL 语句追踪OSPL—挪动种类COGI—查察工单确认时产生的错误ME23N—委外加工采买订单的查问MMSC--- 查察物料库位MB21-预留MB24-显示预留清单IQ01—创立序列号IQ02—改正序列号IQ03—显示序列号SBWP—业务工作台(邮件)权限对象:SU21:按模块查权限对象SU22:按事务代码查权限对象可配置物料:CU01—创立有关性CU02—改正有关性CU03—显示有关性CU04—有关性清单CU05—有关性使用清单CU51—订单BOMCU61—创立变式表CU62—改正变式表CU63—显示变式表CU64—变式表清单CU80—依据物料显示对应的特点和值CT04—创立特点CL02—创立类CT10—显示特点清单CL22N—分派类给类(类的继承)CL26—公布类CLMM —批量保护特点值CL30N—依据类及特点值找对象CLHP—显示类的层次构造(图形)CL6C—类层次构造(ALV )CL6BN —对象清单(依据类)CL2A —分类状态(依据类种类查问类及对象的状态)销售:XD01--- 创立客户VK11--- 价钱主数据VK12--- 改正价钱主数据VA01---- 创立销售订单VA02---- 改正销售订单VA03---- 显示销售订单VL01N--- 创立交货单VL02N--- 改正交货单VL09---- 冲销交货MB01----- 发货VF01----发票VF11----冲销发票VF02----同意至会计F-30-----清账ABAP 开发:SE11----数据词典SE16---数据阅读器SA38---程序履行PFCG---权限管理SE38----ABAP 编写器SE55---生产表保护程序SE93---保护事务代码SE71---Form 设计SE78---Form,SmartForms使用图片上载SM04---显示在线用户LSMW--- 数据导入工具ABAPDOCU----ABAP 自带例子MM 部分:MM01- 创立物料主数据XK01- 创立供给商主数据XK02 —改正供给商主数据XK03 —显示供给商主数据XK05 —冻结供给商主数据XK06 —删除标志供给商主数据XK07 —科目组改正ME11-创立采买信息记录ME12—改正采买信息记录ME13—显示采买信息记录ME15—删除标志(采买信息记录)MEMASSIN —成批保护ME01-保护货源清单ME31K- 长久协议签署ME35K-- 合同审批(长久协议审批)ME51N- 创立采买申请ME5A- 显示采买申请清单ME55-同意采买申请(同意组:YH )ME56–分派采买申请ME57–分派并办理采买申请MB21-预留MB24-显示预留清单ME21N- 创立采买订单ME28-同意采买订单(同意组:YS)ME9F-采买订单发送确认ME2L- 查问供给商的采买凭据ME31-创立采买协议MD03-手动MRPMD04-库存需求清单(MD05-MRP 清单)MRKO- 寄售结算MELB- 采买申请列表(需求追踪号)ME41-创立询价单ME47-保护报价ME49-价钱比较清单MI31-成立库存清点凭据MI21-打印清点凭据MI22-显示实质清点凭据内容MI24-显示实质清点凭据清单MI03-显示实质清点清单MI04-依据清点凭据输入库存计数MI20-库存差别清单MI07-库存差额总览记帐MI02-改正清点凭据MB03-显示物料凭据ME2O-查问供给商货源库存MB03-显示物料凭据MMBE- 库存总览MB5L- 查问库存价值余额清单MCBR- 库存批次剖析MB5B- 查问每天的库存MB58-查问客户代保存库存MB25-查问预留和发货状况MB51MB5S-查问采买订单的收货和发票差别MB51-物料凭据查问(能够按挪动种类查问)ME2L- 确认采买单/转储单正确MCSJ-信息构造S911采买信息查问(采买数目价值、收货数目价值、发票数目价值)MCBA- 查对库存数目,金额MM04- 显示物料改变MMSC- 集中创立库存地址MIGO_GR 依据票据收货:MB1C- 其余收货MB1A- 输入发货MB1B- 转储MB5T —查问在途物质MB31-生产收货MB01-采买收货)MBST- 撤消物料凭据MM60- 商品清单ME31L- 创立计划协议ME38-保护交货计划ME2M —依据物料查问采买订单ME9A- 信息输出MB04-分包合同过后调整MB52-显示现有的库房物料库存MB90-来自货物挪动的输出CO03-显示生产订单IW13-物料反查订单(清单)IW33-显示维订正单VA01- 创立销售订单VL01N- 参照销售订单创立外向交货单VL02N–改正外向交货单(拣配、发货过帐)VL09–冲销销售的货物挪动VF01–出具销售发票XK03 —单个供给商查问MKVZ —多条供给商查问ME13—信息记录查问VF04–办理出具发票到期清单VF11–撤消出具销售发票MVTforMIGO_GR101:一步收货103+105:两步收货MVTforMB1A201:发想到成本中心241:从库房发货到财产(在建工程)261:发货到内部订单551:为报废提取555:自冻结库报废601:销售发货653:销售退货Z41:维修工单发货MVTforMB1B344:欲报废物质先移库到冻结库存411K:从代销到本企业的转帐541:从非限制库存到分包商库存的转储记帐(拜托加工)555:自冻结库报废MTVforMI07 (清点记帐)701:实质清点-盘盈702:实质清点-盘亏物料挪动种类(常用挪动种类):261 代表生产订单发料201 代表部门领料561 代表直接改正库存101 代表收货挪动种类挪动种类描绘用途101参照采买订单收参照采买订单收货到非限制使用库存102货201部门领料或从某个库存地址的非限制使用区发出202对成本中心发料301工厂之间移库两个不一样工厂之间的移库物料与物料间物料间的转账310531生产订单副产品532收货311库存地址之间移同一工厂下两个不一样储存地址的移库312库601销售出货从某个库存地址的非限制使用区发出602551报废出库从某个库存地址的非限制使用区发出552561初始化库存562261生产订单发料或从某个库存地址的非限制使用区发出262生产投料321从质检转非限制322221工程物质发料从某个工程项目库存的非限制使用区222发出注意:MB1A 发料(退料),MB31 按订单收货,MB1C 其余种类的收获(退货)--比方初始化库存、副产品收获等MB52—显示库存地址库存MMBE —显示物料库存MB51/MB53 —查察凭据(MB51 能看到每一笔详尽的操作、MB53 查察库存中可用总量)MB5B —过账日期的库存(批量显示指定物料进销存状况)MB1A/MB1C —改正库存中的数目MB1B —物料移库XI:IDX2 查察IDOC 构造,假如发现XI 与SAP 发送来的IDOCmatedate变换失败,能够用这个事务代码查察两边的构造能否同样IDX5 依据日期进行查察发送和接收的IDOC,XMLmessagesinidocadapterIDX1 查察IDOCPort(portmaintenanceinidocadapter)在这个里配置destination(这个在SM59),假如传输有问题,能够在SM59 里做一个连结测试.IDXPPackagingmangermonitor SM58RFC 监控SMQ1qRFCoutboundqueue监控SMQ2outinboundqueue监控SLDHTMLGUI 用WEB 方式查察SLDSXMB_IFR 启动integrationbuilderSMICMICM 监控ALRTCATDEF-AlertsConfiguration.ALRTDISP-DisplayofAlertsCreatedSXMB_IFR-> 启动IntegrationBuilderSXMB_MONI->IntegrationEngine-MonitoringSXI_MONITOR->XI:MessageMonitoringSXI_CACHE->ToAccessISruntimecacheSXI_SUPPORT->TestalltheRepositoryandDirectoryObjects SXI_CACHE->XIdatadirectorycacheidx1->idocadapterIDX2->idocmetadataIDX5->monitoridocadapterST22->ABAPdumpanalysisSMQ1->messagesinboundeoutboundqueueSMQ2->messagesinboundeoutboundqueueSMICM->J2EEadministrationST06->,memoryandfilesystem.ST03->workload.SCC4->ClientAdministrationsale-alesettingsRZ10-editsystemprofileSM59->mantainrfcdestinationsBD64->mantaindistributionmodel(trasformazioni) AL08->listallloggedusers(userloginlogon)SE10->ChangeRequestSE09->ChangeRequestWE05->AllidocsWE19->IDocTestToolWE21->portdefinitionSE11->Datadictionaryse37->mantainfuncionmodulesSICF->httpserverconfigurationSMGW->GatewayMonitorBD13->BD64->MaintenanceofDistributionModelPFCG->RolestableTSTC->saptransactionscodestableTSTCT->transactiondescriptionsSTMS->transportsmanagementSPAM->applyABAPsupportpackagesSPAU->manageobjectsafterapplysupportpackages SE01->managechangerequestsSLDCHECK->TestSLDConnection SLDAPICUST->SLDAPICustomizingSXMB_ADM->IntegrationEngine-Administration SXMB_MONI_BPE->ProcessEngine-MonitoringSE38->ABAPEditorSE11->ABAPDictionaryST22->ABAPdumpanalysisSPROXY->ABAPProxyGenerationSE80->ObjectNavigatorABAPDOCU->ABAPDocumentationandExamples SE24->ClassBuilderSM21->OnlineSystemLogAnalysisSMQ1->qRFCMonitor(OutboundQueue)SMQ2->qRFCMonitor(InboundQueue)RZ70->SLDAdministrationSM58->AsynchronousRFCErrorLogSM59->RFCDestinations(Display/Maintain) SMICM->ICMMonitorWE60->DocumentationforIDoctypesBD87->StatusMonitorforALEMessagesIDX1->PortMaintenanceinIDocAdapterIDX2->MetaDataOverviewinIDocAdapterWE02->DisplayIDocWE09->SearchforIDocsbyContentWE20->PartnerProfilesSE16->DataBrowserSE93->MaintainTransactionCodesSM30->CallViewMaintenanceSU01->UserMaintenanceSM02->SystemMessagesBD54-LogicalSystemCreation.SWF_XI_PBUILDER->forDetailBPMProcessSMQS->toregisterthedestinationinQOUTschedulerWEOUTQUEUE->tostartthequeueprocessingSMQR->toregisterthequeueIDXPW->toactivatetheIDOCmessagepackageIDXP->tomonitorthemessagepackages?.SWF_XI_CUSTOMIZING->transactiontocheckprerequisitesforintegrationprocesses. SWF_XI_ADM_BPE->StartorStopBPESWF_XI_ADM_BPE_DISP->DisplayBPEStatusSXMS_IECONF->IntegrationEngine 配置SXMS_QREG->注册和激活queueSXI_SHOW_MESSAGE 显示message信息,。
2005-2009年MBA联考英语试(考研英语二)真题答案
2009MBA联考英语试(考研英语二)卷参考答案Section I Vocabulary and Structure1-5 BACDD 6-10CBAAC 11-15 BBABD 16-20 DBACBSection II Cloze21-25 CDDBC 26-30BDDBA 31-35 BACDA 36-40DBCACSection III Reading Comprehension41-45 BBAAC 46-50 CCBCC 51-55 DCABD 56-60CAAACSection IV Translation (参考译文)由于国家金融体制处于危机边缘动荡,一些大银行和金融机构中的高级管理人员的补偿金计划就受到密切关注.银行家们过度冒险是金融危机的至关重要原因,在历史上也有类似情况.在这种情况下,一般是由低息引起并造成持续的错觉,其实是一种债务泡沫经济.抵押贷款人很乐意把大量资金借给无力偿还的人,就把贷款瓜分了,并沿这样的链条出售给下一个金融机构,这些做法都在利用高科技证券业,结果,却增加了抵押资产的风险.金融条例必须能应付这种能使银行下滑的,最不负责任的做法,以期扭转下一个危机,而这下一个危机很可能包括有各种类型的技术和资产.但值得审视补偿金计划的根本问题,因为那是眼前利益,但却让银行家们不负责任的甘冒风险.Section V WritingPart ADirections:Suppose you are a freshman. Write a letter to the library in your university, making suggestions for improving its service.You should write about 100 words on ANSWER SHEET 2.Do not sign your own name at the end of the letter. Use “Zhang Wei” instead.Do not write the address. (10 points)审题谋篇建议信的写作目的都是为了解决问题,即写信人就某事提出看法、建议或忠告,诸如旅游计划、条件改善、环境治理、管理提高等。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Spam-I-am:A Proposal for Spam Control using Distributed Quota ManagementHari Balakrishnan and David R.KargerMIT Computer Science and Artificial Intelligence LaboratoryThe Stata Center,32Vassar St.,Cambridge,MA02139Email:{hari,karger}@ABSTRACTEmail spam has reached alarming proportions because it costs virtually nothing to send email;even a small num-ber of people responding to a spam message is adequate incentive for a spammer to send as many messages as pos-sible.Since spammers need to send messages at high rates to as many recipients as they can,quotas on email senders could throttle spam.We argue for separating the allocation of quotas,a relatively rare activity,from the enforcement of quotas,a frequent activity that must scale to the billions of messages sent daily.This paper tackles the quota enforcement problem, where the goal is to ensure that no sender can grossly violate its quota.The challenge is to design an enforce-ment scheme that is scalable,is robust against malicious attackers or participants,and preserves the privacy of com-munication,in a large,distributed,and untrusted environ-ment.We discuss the design of such a system,Spam-I-am,based on a managed distributed hash table(DHT)in-terface,showing that it can be used in conjunction with electronic stamps(for quota allocation)to ensure that any non-negligible reuse of stamps will be detected.1.INTRODUCTIONI do not like that spam in RAMI do not like it,Spam-I-am.With apologies to Dr.SeussThe email spam problem has reached alarming proportions—some studies estimate that spam accounts for nearly60%of the over50billion email messages sent daily[5,15].To combat spam,tools such as SpamAssas-sin[19],whichfilter email based on message content,have become popular.Unfortunately,such tools are routinely overwhelmed by the creativity of spammers in getting past thefilters;when users set more aggressivefilter thresholds in response,legitimate email is trapped as spam. Attention has therefore been given to schemes that force the sender to consume some resource,such as computa-tion,money,or human effort,in order to send email[1, 6,9,2].If resources must be consumed to send email, and individuals have limited resources,then the number of messages they can send is limited.Because few legitimate users send email at the sheer scale of spammers,such a quota on every user(legitimate or not)could effectively choke off spam without limiting legitimate email.A quota-based spam control system must tackle two dis-tinct issues,which we argue must be treated separately. Thefirst,quota allocation,is determining how quotas are allocated to individuals.The second,quota enforcement, is providing a way to detect and respond to quota overruns. We propose a spam control system called Spam-I-am based on explicit email quotas.Spam-I-am separates quota enforcement from allocation,letting us optimize both pieces:investing great care in allocation so that spam-mers cannot cheat to receive large quotas,while offering an enforcement system running on a cheap,large-scale, distributed,untrusted infrastructure,and scaling to meet the significant demands of having to verify the validity of every single received email message.This infrastructure is based on a distributed hash table(DHT)[13]and does not require a large resource allocation by any one party. Spam-I-am requires that an email user(or user’s orga-nization)contact a globally trusted quota allocator once per year(say),and obtain a quota in exchange for pay-ment.1This quota is a digitally signed and dated certificate of the user’s right to send a certain number of messages. It is signed by the allocator,whose public key is widely known.The user’s outgoing mail server(or email send-ing program)manufactures a quota-limited number of un-forgeable stamps using standard cryptographic operations, and attaches one to each outgoing message.Spam-I-am enforces the quota by helping any recipient determine if a stamp is authentic and fresh.If a received stamp is both authentic and fresh,the recipient knows that the message was within the sender’s rightful quota.If not,the recipi-ent may discard the message(or take some other action,as described at the end of this section).Spam-I-am’s enforcement infrastructure for verifying whether a stamp is fresh is a collection of untrusted ma-chines acting as a distributed quota manager(DQM).A DQM stores all stamps used in some past time window.Arecipient queries DQM to determine if a stamp is fresh, while at the same time informing DQM,with suitable proof,that it has received a message with a given stamp. Spam-I-am meets the following key design goals: Scalability.The system should scale to hundreds of mil-lions of users and tens of billions of daily messages, requiring only modest resources at each node. Robustness.The system should resist senders who try to violate their quotas,subversion by malicious partic-ipants,and denial-of-service(DoS)attacks.Faults should never interfere with the delivery of legiti-mately stamped email,and no fault should let more than a small amount of spam through.Privacy.DQM nodes should not be able to infer who is communicating with whom.In addition,a recipient should not be able to prove that the sender sent it any email,and the sender should not be able to prove that the receiver received it.User-transparency.The system should not require users to expend additional effort to send(e.g.,as with CAPTCHAs[21])or receive email.The DQM infrastructure avoids many problems faced by systems that use a central,trusted quota enforcer[1,14].A central enforcer needs to scale to meet the demands of the global email system,imposing significant resource re-quirements on its operator and constituting a single point of failure.In particular,individuals who wish to violate their quotas may mount attacks on the central enforcer.It is also unclear whether offering a centralized enforcement service is a profitable business;and if it were,it is unclear how competing enforcers would interact and how ethical each would be.Instead,we envision that DQM will be composed of servers contributed by participating organi-zations(e.g.,ISPs,companies,universities,etc.),managed like the Internet’s email and Domain Name System(DNS) infrastructures.Unlike the enforcement system,Spam-I-am’s quota al-locator requires little state or computational power because user interactions with it are rare.Since the allocator is not used in enforcement,and users can proactively renew quo-tas,outages in the allocator caused by faults or attacks will not seriously affect email delivery.The main requirement for the allocator is that it be trusted,a property many non-profit organizations possess.We expect that Spam-I-am would typically be used in combination with passive spamfilters.Most spamfilters have a tunable“level of paranoia”to balance false posi-tives against false negatives.Spam-I-am provides a sec-ond chance for legitimate email accidentally blocked by filters:any such email can be passed with a legitimate stamp.This extra protection from falsely blocked email will let users make theirfilters much more aggressive,thus blocking a larger fraction of true spam,even before Spam-I-am is fully adopted.2.RELATED WORKDwork and Naor proposed that each message come with a signature that takes significant CPU time[9]or mem-ory[8]to compute.Microsoft’s Penny Black proposal[1, 17]uses a centralized and trusted ticket server to allocate tickets to clients based on such“proof-of-work”.Email re-cipients contact the ticket server to validate tickets.Cam-ram[6]uses a similar approach to have email senders at-tach“hashcash”[2]stamps to their urie and Clayton[15]have argued convincingly that proof-of-work schemes are unlikely to control spam because of the ease with which spammers are able to subvert numerous insecure computers on the Internet.Various systems,including Bonded Sender[3],Van-quish[18],and SHRED[14]have proposed that email senders should forfeit money,or be sued(Habeas[12]),ifa recipient deems a message to be spam.Such a“bond”[3,18]or“contingent liability”[14]requires users to mark up the email they receive,or carefully tailor their spamfilters. The Sender Policy Framework[20]verifies if the sender email address is consistent with information published in DNS about valid email servers in the sending domain.It provides some protection against forged sender addresses, but none against spammers using unforged addresses. Spam-I-am’s stamps and DQM infrastructure bear some similarity to digital payment schemes[10];quota allo-cation corresponds to digital cash withdrawal,stamps correspond to spending a small amount of digital cash to send every message,and quota enforcement corre-sponds to forgery prevention and double-spending detec-tion.However,the looser requirements of spam blocking —recipients do turn in their stamps for real cash,and a small amount of double spending does not hurt—permit a simpler design.Conversely,our approach may be use-ful for digital cash schemes,allowing forgery and double-spending to be detected in distributed fashion.3.SPAM-I-AM DESIGN AND PROTOCOL Spam-I-am’s protocol is underpinned by a trusted quota allocator QA with a public/private key pair (QA pub,QA priv).2A participant S constructs a pub-lic/private key pair(S pub,S priv)and presents S pub to QA together with either payment or some accepted form of identity.After determining that S should be allo-cated a quota,QA gives S a signed3certificate C S= {S pub,expiration time}QAprivindicating that a quota has been allocated,where“expiration time”is the time at which the certificate C S expires(typically one year or so). Anyone knowing QA pub can verify that S has been allo-cated a quota.It is possible to have several independent (but globally trusted)quota allocators.For quota enforcement,Spam-I-am’s DQM requires a (possibly faulty)“hash-table”interface,offering the op-erations PUT(k,v)to associate value v with key k,and GET(k)to determine the value previously associated with key k.We also use a hash function,such as MD5or SHA1,which we assume every participant can compute but no participant can invert.3.1Basic ProtocolWe introduce our approach using a simple example in which we wish to limit each user to sending m distinct email messages.Sender S includes an unforgeable stamp with each message sent to recipient R.Upon receipt of the message,R checks with DQM whether the included stamp has been used before by querying for an unforge-able postmark that is used to“cancel”that stamp.R only reads the message if the postmark for its stamp is not pub-lished in DQM.R also constructs and publishes the stamp-cancelling postmark in order to prevent the stamp from be-ing reused later.It follows that each stamp can be used to send exactly one message(that is read).The sender S uses its private key to construct m stampsof the form{C S,i}Spriv ,where i is an integer between1and m.We call i the counter;the intent is that each counter value be used in a stamp exactly once.Note that only S can construct its stamps since only it can sign with S priv.However,any recipient can check that a stamp is valid by verifying the signature with S pub,contained in C S, confirming that1≤i≤M,and then consulting DQM to test if the stamp is fresh or not.R cancels stamp P by executing PUT(HASH(P),P);i.e.,R stores the stamp as the value associated with the stamp’s postmark(the key),HASH(P).To prevent pre-vent malicious participants from cluttering DQM,DQM accepts this PUT only if the value is a valid stamp and the hash of the value equals the key.Conversely,to de-cide whether to read the message,R queries the postmark by invoking GET(HASH(P))to determine whether P was previously cancelled.R blocks the mail as spam only if the correct value(P)is returned as the result of its GET.3.2SecurityThis basic protocol has three key security properties. First,no mail with a legitimate fresh stamp can ever be blocked as a result of the protocol,regardless of malicious third parties or DQM nodes.Second,when DQM operates correctly,no malicious third party(spammer)can prevent used stamps from being cancelled.Third,each fault in a DQM node allows only a limited number of reuses of can-celled stamps.Wefirst argue that no legitimate mail can be blocked by our protocol.Since it is signed,a stamp cannot be gener-ated by anyone other than the sender.Furthermore,since the hash function is hard to invert,no one but a recipient of stamp P—not even a malicious DQM node,upon receipt of the query GET(HASH(P))—can generate a postmark for it.In other words,the only way a cancelling postmark will be found is if some entity received the corresponding stamp and cancelled it.4Now recall that when a recipient fails to locate a valid cancellation,they accept the mail as legitimate.Since we have just argued that such a cancel-lation cannot exist for a fresh stamp,we can conclude that no mail carrying a fresh stamp will be blocked.We now consider the converse attack—ways that spam-mers might attempt to reuse their stamps by preventing cancellations.Since recipients ignore invalid cancellations (in case DQM is corrupted),an attacker might hope to in-sert an invalid cancellation of their stamp.However,since DQM verifies all PUT operations,no incorrect value can be associated with a key.Thus,no third party(spammer) can prevent a stamp from being cancelled by inserting an invalid postmark for it.Beyond cheating in the protocol,spammers may attempt to interfere with its execution using DoS or subversive at-tacks on DQM.We discuss such attacks in Section4.If a sending account is compromised and comman-deered to send spam,it can send to at most m emails before its stamps are exhausted.At this point,the com-promised account’s users will suddenly discover that their legitimate email transmissions are being bounced due to cancelled stamps.These bounces will provide a strong hint that the machine is compromised,and an equally strong in-centive tofix the problem.Our approach moves the cost of being hacked to the person being hacked,rather than to the multitude of email recipients.Once the owner of the affected machine has disinfected the machine and re-ceived new certificates for the senders using the machine, the affected senders can resume sending email.3.3PrivacyAs presented thus far,the protocol violates some com-munication privacy because the sender’s identity,as part of the stamp,is published in DQM.Revealing the sender’s identity in the stamp allows DQM(or any eavesdropper) to determine that the sender is sending some email,and possibly connect that email to the recipient performing the query.To eliminate this violation of privacy,we note that DQM is needed only to bind postmarks to stamps;DQM does not need to understand the contents of a stamp.Thus, instead of using the information-carrying stamp P as the value in DQM,we can use HASH(P).With this method,R executes PUT(HASH(HASH(P)),HASH(P))to cancel stamp P.Since the recipient receives P,it can construct both key and value,but DQM cannot.Figure1summarizes this improved protocol.1.STAMP={C S,i}Spriv2.S→R:{STAMP,msg}.3.Upon receiving a message,R verifies using S’s pub-lic key from C S that STAMP is valid.If it is not,then R discards the message.Otherwise,R computesPOSTMARK=HASH(HASH(STAMP)).4.R→DQM:GET(POSTMARK).R considers STAMPused only if HASH(STAMP)is returned.5.R→DQM:PUT(POSTMARK,HASH(STAMP)). Figure1:Spam-I-am’s privacy-preserving protocol. This modified protocol prevents DQM(or anyone else without access to the stamp)from associating the sender and recipient.The recipient,by exhibiting the stamp, can prove that the sender sent some message to someone. However,since the stamp is not determined by the mes-sage or recipient,the recipient cannot prove what message what sent,or to whom.5If the sender randomizes the order of his counter,the recipient cannot even draw conclusions about the number of messages sent by that sender. Conversely,the sender,by checking for a postmark, might become confident that the the receiver received the message;however,since intermediate relays(or the sender itself)can cancel the stamp,the recipient can plausibly deny having received the message.3.4Expiring stampsSpam-I-am’s stamp protocol requires DQM to remem-ber cancelled stamps for as long as the sender’s certifi-cate is valid.If a postmark is dropped from DQM,anyone can reuse the corresponding stamp.However,remember-ing cancelled stamps for that long could be a significant undertaking—it requires a significant quantity and robust-ness of storage.Our solution to this problem is to use stamps that ex-pire(become unusable)within a small number of days,say a week,6at which point their postmarks can be dropped from DQM.We augment each stamp with a weekstamp, a continuously increasing integer indicating the particular week during which the stamp is valid.The stamp thusbecomes{C S,i,w}Spriv ,where w is a weekstamp.Recip-ients can easily check that stamps are being used in the right week,but the weekstamp serves as a nonce that pre-vents anyone else from generating valid new stamps fromspam get through;e.g.,by failing to respond correctly to queries about cancelled stamps.Caching can cope with such adversarial attacks,at the expense of increased storage.The DQM nodes along the DHT path from the query origin to the root responsible for the key can cancel the stamp at every node on the query path.A node making a postmark query can stop anywhere along the path,as soon as it gets a positive response. With this approach,an adversary cannot get their mail through by sending so many copies of a stamp that the ma-chine responsible for holding its postmark gets swamped by the recipients’queries.Instead,each node will receive only one query for a given postmark routed through each of its children,for a total of at most d queries,before its children all know the answer and insulate it from future queries.A similar argument applies to adversarial DQM nodes. Any node may choose to maliciously answer“no”to a postmark query instead of“yes.”However,a response of“no”will just lead to the receiver continuing along the routing path,querying other nodes.Thus,the effect of a false“no”is to exclude the malicious node from the DHT,slightly increasing the query-answering load on some other nodes.The only exception to this argument is at the root for a key:if the root answers“no,”then the re-cipient believes the mail to be legitimate.But because the recipient cancels the stamp all along the query path,each time the malicious root node answers“no”,another of that root’s children caches that ing this argu-ment,we can show that if k machines are compromised but n>kd,the number of additional spam messages accepted by recipients is small.We can further improve robustness by cancelling stamps and querying for postmarks at multi-ple roots,at the expense of increased communication. Another possible attack on the DHT might come in the form of an exhaustion attack,in which the adversary tries tofill the DHT with so many bogus,cancelled postmarks that the DHT has no room to store the valid ones.If we store the stamps explicitly rather than as a hash,then the adversary cannot mount this attack because they cannot generate valid stamps.The price we pay for email privacy is that DQM can no longer tell from looking at a stamp whether it is real.Our solution to this problem is to use the DQM idea recursively,treating DQM storage as the re-source whose quota should be enforced per-recipient.We reserve the details for a longer version of this paper.5.ALLOCATING EMAIL QUOTASWe now consider various mechanisms for allocating quotas.Simply throttling the number of daily messages sent per user is not effective because of the ease with which spammers can create new accounts.But sev-eral approaches do show promise.One possibility is to use“proof-of-work”for allocation,and use Spam-I-am’s DQM to enforce quotas.Yet another approach would be some form of trust network rooted at the central server.A third would involve some government agency—a user could pick up their key in person,while renewing their driver’s license or passport.Another is to require payment, whose value depends on the statistics and economics of spam.This section explores this last possibility—our goal is to determine a suitable price for email that would cut spam by a factor of ten.The Radicati Group estimated that in November2003, 57billion emails were sent daily[15];at the same time, Brightmail estimated that56%of all email was spam[5]. That means that there were about32billion spam mes-sages daily(it is likely that the number is larger today). The same survey estimated that spammers took in roughly US$10million/day in email revenue,or roughly0.03 cents per message.This number is consistent with pub-lished estimates of rates charged by spammers[11,4]. We now make an unjustified assumption.Given the ease with which spammers can send bulk email today,they must already be receiving as much income as marketers are willing to pay them,regardless of the quantity of email sent—if there were more demand,it could easily be met. We therefore take$10million/day as an upper bound on spammers’total“budget”available to spend sending email (this estimate is generous,since it assumes that spammers have no operating costs).If we charge for quotas at a rate of$3for1000messages,then spammers on that bud-get can afford to purchase at most3billion messages per day—a factor of10reduction in current rates.We remark that the two authors sent less than13,000messages each in the past year,which would have cost them less than$40. Should this per-email charge seem high,proof of pay-ment to some other institution could be used.A promis-ing possibility is donation to a known-legitimate charitable organization of the sender’s choice.With this approach, email no longer“costs extra.”6.OTHER ISSUES6.1Stamp reuseMost legitimate users send email in their“social net-work”of friends,colleagues,and acquaintances,and every once in a while to someone new.In contrast,a spammer benefits from new recipients reading his messages.These observations suggest that the ability to reuse stamps in conversations that have already been established between a sender and receiver could reduce the number of stamps needed by most users,reducing their costs.The quota then becomes the number of distinct recipients that a sender can contact.(The two authors each sent messages to less than 2,000distinct recipients in the past year.)To allow stamp reuse,each recipient simply needs to remember which senders(certificates)initially contact itwith a valid stamp,and continue to accept email from those senders with those(cancelled)stamps.We continue to require the stamp,but we use it only for identification to prevent sender spoofing.We also need to prevent replay attacks,for which standard techniques suffice.One way in which a spammer might subvert stamp reuse is tofirst send legitimate-looking email to a recipient,get his stamp“whitelisted,”and then send spam using that stamp.Similarly,when a sender’s machine is compro-mised,recipients that have approved the sender’s stamp can become targets for large quantities of spam.To solve this problem,a recipient’s spamfilter should cancel a stamp if there is even a small suspicion of spam.In ad-dition,the sender should check if a previous stamp can be reused before sending a message with the stamp.6.2Mailing listsMailing lists pose problems because using a different stamp for each recipient may be too expensive,especially for large lists.When mailing lists are managed or moder-ated,DQM provides sender verification that can be used to pass through email from the mailing list.For large,un-moderated mailing lists with no control over who can send, our approach does not alleviate the problem.A single mes-sage within the sender’s quota can reach a huge number of recipients.Such lists are a boon to spammers.6.3Mail forwardingSome users may wish to forward their mail to one or more other addresses.Since thefirst check for a stamp’s freshness would also cancel the stamp,the subsequent hops may wrongly consider a legitimate message to be spam.An easy solution is for each hop to forward the mes-sage with authentication,so the subsequent hops know that the stamp has already been validated.Another possibility is to use a“fresh”stamp for each hop.With stamp reuse, this approach uses few additional stamps.7.CONCLUSIONQuotas can prevent the large-scale abuse of resources in a distributed system.With quotas,the system designer wishing to prevent resource abuse has two issues to re-solve:how to allocate quotas,and how to enforce them. In the context of email,the primary resource being abused is recipient time,for which the quota should control the number of emails sent per sender.This paper outlined a scheme for scalable,privacy-preserving distributed quota enforcement,and suggested ways in which email quotas could be allocated.Our approach could reduce spam by at least one order of magnitude,for a modest annual payment per user.The general approach is also likely to be useful in controlling spam in other systems,such as instant mes-saging and Short Message Service(SMS).One consequence of adopting Spam-I-am is that users can be much more aggressive about their email spamfil-ters,because it prevents legitimate messages that are mis-takenly caught by spamfilters from going unread.Spam-I-am’s DQM is a useful service in large dis-tributed system where a plentiful,but not infinite,resource needs to be protected from excessive consumption by self-ish individuals or applications.Some examples include disk storage in afile or backup system and computational cycles in a peer-to-peer system or computational economy. AcknowledgmentsWe thank David Andersen,Susan Hohenberger,David Mazi´e res,Ronald Rivest,Stuart Schechter,Mythili Vu-tukuru,Michael Walfish,and the HotNets reviewers for their comments.This work was supported by the NSF un-der Cooperative Agreement No.ANI-0225660.8.REFERENCES[1]A BADI,M.,B IRRELL,A.,B URROWS,M.,D ABEK,F.,ANDW OBBER,T.Bankable postage for network services.In Proc.Advances in Computing Science(Mumbai,India,December2003).[2]B ACK,A.Hashcash./adam/hashcash/. [3]Bonded Sender Program./info_center.jsp.[4]B OUTIN,P.Interview with a world(April2004).[5]Brightmail,inc.:Spam percentages and spam categories./spamstats.html.[6]Camram./.[7]C ASTRO,M.,D RUSCHEL,P.,G ANESH,A.,R OWSTRON,A.,AND W ALLACH,D.S.Secure routing for structured peer-to-peer overlay networks.In Proc.5th USENIX OSDI Conf.(Boston,Massachusetts,December2002).[8]D WORK,C.,G OLDBERG,A.,AND N AOR,M.Onmemory-bound functions forfighting spam.In Proc.CRYPTOConf.(2003),pp.426–444.[9]D WORK,C.,AND N AOR,M.Pricing via processing or combattingjunk mail.In Proc.CRYPTO Conf.(1992),pp.139–147.[10]Electronic Cash.http://www.tcs.hut.fi/˜helger/crypto/link/protocols/ecash.html.[11]G OODMAN,J.,AND R OUNTHWAITE,R.Stopping OutgoingSpam.In Proc.ACM Conf.on Electronic Commerce(EC)(NewYork,NY,May2004).[12]Habeas Sender Warranted Email./.[13]Project IRIS./.[14]K RISHNAMURTHY,B.,AND B LACKMOND,E.SHRED:SpamHarassment Reduction via Economic Disincentives./˜bala/papers/shred-ext.ps,2004.[15]L AURIE,B.,AND C LAYTON,R.“Proof-of-Work”Proves Not toWork./proofwork.pdf, May2004.[16]OpenDHT./.[17]The Penny Black Project.http://research.microsoft.com/research/sv/PennyBlack/.[18]R AYMOND,P.R.System and method for discouragingcommunications considered undesirable by Patent6,697,462,February2004.[19]SpamAssassin./.[20]Sender Policy Framework./.[21]VON A HN,L.,B LUM,M.,H OPPER,N.J.,AND L ANGFORD,J.CAPTCHA:Using Hard AI Problems for Security.In Proc.EUROCRYPT(Warsaw,Poland,May2003).。