Changes

Jump to: navigation, search

Apps/Security

163 bytes added, 21:09, 22 March 2012
Requirements
(''comment: this is a reasonable summary, and should be left in the summary section :)'')
== Requirements ==  (''This section describing requirements was developed/written separately from the 4 security areas outlined above. both areas must be consistent and integrated'') 
===Core Principles===
#User control: Users control what application permissions an application has at all times (pre, during and post installation).
#The user can choose to override store permissions (either granting or revoking privileges), but the store permissions should be safe for the user, and represent the minimum permissions the application needs to run.
#The store can also entrust other stores with the power to grant permissions (possibly a subset of permissions, or not privileged permissions)
 
 
=== Enforcement of permissions on device ===
177
edits

Navigation menu