freepeople性欧美熟妇, 色戒完整版无删减158分钟hd, 无码精品国产vα在线观看DVD, 丰满少妇伦精品无码专区在线观看,艾栗栗与纹身男宾馆3p50分钟,国产AV片在线观看,黑人与美女高潮,18岁女RAPPERDISSSUBS,国产手机在机看影片

正文內(nèi)容

第13章移動(dòng)代碼安全(編輯修改稿)

2025-03-02 11:58 本頁(yè)面
 

【文章內(nèi)容簡(jiǎn)介】 ck, either statically ,for instance to ensure that operands of an instuction are of the correct type , or dynamically , for example to locate any access to a protected resource. ProofCarrying Code ? A predefined security policy is defined in terms of a logic. ? Host first asks to be sent a proof that the code respects the policy before he actually agrees to run it. ? The code producer sends the program and an acpanying proof ? After receiving the code ,host can check the program with the guidance of the proof. ProofCarrying Code ProofCarrying Code ? On key question which affects the usefulness of this approach is that of: ? What program properties are expressible and provable in the LF logic used to publish the security policy and encode the proof. ? PCC sacrifices platformindependence for performance. Protection of a mobile code from a malicious host ? The problem of protection from a malicious host has been studied only recently , and is intrinsically more difficult because the environment gets a total control over the mobile code (otherwise , host protection would not be possible!) ? Classified along 2 criteria, 1) data versus code protection , and 2) integrity –or confidentialitybased. Malicious Host Solutions to the malicious host problem sho
點(diǎn)擊復(fù)制文檔內(nèi)容
教學(xué)課件相關(guān)推薦
文庫(kù)吧 www.dybbs8.com
備案圖片鄂ICP備17016276號(hào)-1