Signing of mobile code is a suggested approach for addressing the vulnerability of hostile code. Outline what a code signing scheme would have to do
What will be an ideal response?
The
signature
confirms
who
the
sender
is.
Ideally,
the
signature
could
also
confirm
what
the
code
is,
what
it
is
expected
to
(or
allowed
to)
do,
and
what
minimal
set
of
privileges
it
requires.
Computer Science & Information Technology
You might also like to view...
What is meant by over and under sampling?
What will be an ideal response?
Computer Science & Information Technology
Category 1, Category 2, and Category 3 displays along the bottom of a chart as ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
Describe the character encoding schemes.
What will be an ideal response?
Computer Science & Information Technology
Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.
a. true b. false
Computer Science & Information Technology