The security policy we apply to applets is … modify during its execution [or more generally, some invariant which the contents satisfy.] … The first motivation for this policy is to … it. … each file or network connection can be viewed …
Google-1Google-2