The Community for Technology Leaders
Green Image
Issue No. 06 - November/December (1998 vol. 2)
ISSN: 1089-7801
pp: 30-34
ABSTRACT
<p>Sandboxes, code signing, firewalls, and proof-carrying code are all techniques that address the inherent security risks of mobile code. This survey summarizes the relative merits of each.</p>
INDEX TERMS
CITATION
Aviel D. Rubin, Daniel E. Geer, Jr., "Mobile Code Security", IEEE Internet Computing, vol. 2, no. , pp. 30-34, November/December 1998, doi:10.1109/4236.735984
85 ms
(Ver )