Issue No. 06 - November/December (1998 vol. 2)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/4236.735984
<p>Sandboxes, code signing, firewalls, and proof-carrying code are all techniques that address the inherent security risks of mobile code. This survey summarizes the relative merits of each.</p>
A. D. Rubin and D. E. Geer, Jr., "Mobile Code Security," in IEEE Internet Computing, vol. 2, no. , pp. 30-34, 1998.