A resource is obtained from a resource provider (RP) for a resource
requester (RR) operating on a computing device. The RR has an identity
descriptor (id) associated therewith, where the id including
security-related information specifying an environment in which the RR
operates. A code identity (code-ID) is calculated corresponding to and
based on the loaded RR and loaded id. The RP verifies that the calculated
code-ID in a request for the resource matches one of one or more valid
code-IDs for the identified RR to conclude that the RR and id can be
trusted, and the RP responds to the forwarded request by providing the
requested resource to the RR.