The Community for Technology Leaders
RSS Icon
Issue No.06 - November/December (1998 vol.2)
pp: 30-34
<p>Sandboxes, code signing, firewalls, and proof-carrying code are all techniques that address the inherent security risks of mobile code. This survey summarizes the relative merits of each.</p>
Aviel D. Rubin, Daniel E. Geer, Jr., "Mobile Code Security", IEEE Internet Computing, vol.2, no. 6, pp. 30-34, November/December 1998, doi:10.1109/4236.735984
21 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool