Controlling which processes have access to the untrusted programme and which processes and data the programme has access to is one technique to restrict the impact of an untrusted application.Explain how confinement relates to the preceding case's programme that computes the number of integers 1 to 10.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here