Signing of mobile code is a suggested approach for addressing the vulnerability of hostile code. Outline what a code signing scheme would have to do.
What will be an ideal response?
The signature confirms who the sender is. Ideally, the signature could also confirm what the code is, what itis expected to (or allowed to) do, and what minimal set of privileges it requires.
Computer Science & Information Technology
You might also like to view...
To move the insertion point to the right of the text in the cell, you use the ________ key
Fill in the blank(s) with correct word
Computer Science & Information Technology
To enter text from another document into a content control, you must display the Insert File dialog box by clicking the ________ in the Text group on Insert tab
A) Insert Object button B) Text Content control arrow C) Object button arrow D) Insert Text button
Computer Science & Information Technology