Does anyone know the answer to the following question?
A company wants to ensure that all software executing on a corporate server has been authorized to do so by a central control point. Which of the following can be implemented to enable such control?
- Digital signatures
- Role-based access control
- Session keys
- Non-repudiation