This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Mobile Code Security
November/December 1998 (vol. 2 no. 6)
pp. 30-34

Sandboxes, code signing, firewalls, and proof-carrying code are all techniques that address the inherent security risks of mobile code. This survey summarizes the relative merits of each.

Citation:
Aviel D. Rubin, Daniel E. Geer, Jr., "Mobile Code Security," IEEE Internet Computing, vol. 2, no. 6, pp. 30-34, Nov.-Dec. 1998, doi:10.1109/4236.735984
Usage of this product signifies your acceptance of the Terms of Use.