Signing of mobile code is a suggested approach for addressing the vulnerability of hostile code. Outline what a code signing scheme would have to do.

What will be an ideal response?

The signature confirms who the sender is. Ideally, the signature could also confirm what the code is, what itis expected to (or allowed to) do, and what minimal set of privileges it requires.

Computer Science & Information Technology

You might also like to view...

To move the insertion point to the right of the text in the cell, you use the ________ key

Fill in the blank(s) with correct word

Computer Science & Information Technology

To enter text from another document into a content control, you must display the Insert File dialog box by clicking the ________ in the Text group on Insert tab

A) Insert Object button B) Text Content control arrow C) Object button arrow D) Insert Text button

Computer Science & Information Technology