Signing of mobile code is a suggested approach for addressing the vulnerability of hostile code. Outline what a code signing scheme would have to do

What will be an ideal response?

The
signature
confirms
who
the
sender
is.
Ideally,
the
signature
could
also
confirm
what
the
code
is,
what
it
is
expected
to
(or
allowed
to)
do,
and
what
minimal
set
of
privileges
it
requires.

Computer Science & Information Technology

You might also like to view...

Which of the following is not a “rule” of mobile application design?

a. Don't interfere with device telephony and messaging services. b. Don't use any graphics other than Nine-Patch Stretchable Graphics. c. Don't tamper with the device hardware or software. d. Don't cause problems on operator networks.

Computer Science & Information Technology

Which technology has two modes of operation: transport and tunnel?

A. Secure Hypertext Transfer Protocol B. Secure Shell C. IP Security Protocol D. Secure Sockets Layer

Computer Science & Information Technology