摘要 |
<p>A mechanism for safely executing software which is appropriate for software distribution. At site (312) of a transmitter side, an execution file (332) and a data file (334) processed by the execution file are encapsulated. Two remaining files (336, 338) do not exist physically at a pot (320) of the transmitter site. An archive file (320) is transmitted to the receiver site (314). At the receiver site (314), according to the rule of the security policy (340), a program (332) can map the file (336, 338) substantially not existing in the port to the file (354) of the local file system and file (356) of another pot (350) and perform processing by using the file (334) in the pot and the mapped files (354, 356).</p> |