Signing of mobile code is a suggested approach for addressing the vulnerability of hostile code. Outline what a code signing scheme would have to do.

What will be an ideal response?


The signature confirms who the sender is. Ideally, the signature could also confirm what the code is, what itis expected to (or allowed to) do, and what minimal set of privileges it requires.

Computer Science & Information Technology

You might also like to view...

Which record is used to identify a host or hosts that offer a specific type of service?

a. MX record b. SRV record c. PTR record d. TXT record

Computer Science & Information Technology

Storage-class specifier ________ is a recommendation to the compiler to store a variable in one of the computer’s registers.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When you click any text on a bibliography or works cited page, a content control tab, titled ________, appears at the top of the selected list of citations

A) Update Bibliography B) Citations C) Update Citations and Bibliography D) Citations and Bibliography Page

Computer Science & Information Technology

What are some of the e-mail protocols that may be used within an organization?

What will be an ideal response?

Computer Science & Information Technology