A company wants to ensure that all software executing on a corporate server have been authorized to do so by a central control point. Which of the following can be
implemented to enable such a control?
A.
Digital signatures
B.
Mandatory access control
C.
Session keys
D.
Non repudiation