The Community for Technology Leaders
Green Image
Issue No. 06 - November/December (1998 vol. 2)
ISSN: 1089-7801
pp: 30-34
ABSTRACT
<p>Sandboxes, code signing, firewalls, and proof-carrying code are all techniques that address the inherent security risks of mobile code. This survey summarizes the relative merits of each.</p>
INDEX TERMS
CITATION

A. D. Rubin and D. E. Geer, Jr., "Mobile Code Security," in IEEE Internet Computing, vol. 2, no. , pp. 30-34, 1998.
doi:10.1109/4236.735984
86 ms
(Ver 3.3 (11022016))