Signing of mobile code is a suggested approach for addressing the vulnerability of hostile code. Outline what a code signing scheme would have to do

What will be an ideal response?


The
signature
confirms
who
the
sender
is.
Ideally,
the
signature
could
also
confirm
what
the
code
is,
what
it
is
expected
to
(or
allowed
to)
do,
and
what
minimal
set
of
privileges
it
requires.

Computer Science & Information Technology

You might also like to view...

What is meant by over and under sampling?

What will be an ideal response?

Computer Science & Information Technology

Category 1, Category 2, and Category 3 displays along the bottom of a chart as ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Describe the character encoding schemes.

What will be an ideal response?

Computer Science & Information Technology

Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.

a. true b. false

Computer Science & Information Technology