7 Nokia Corporation - initial contribution. |
7 Nokia Corporation - initial contribution. |
8 Contributors: |
8 Contributors: |
9 --> |
9 --> |
10 <!DOCTYPE concept |
10 <!DOCTYPE concept |
11 PUBLIC "-//OASIS//DTD DITA Concept//EN" "concept.dtd"> |
11 PUBLIC "-//OASIS//DTD DITA Concept//EN" "concept.dtd"> |
12 <concept id="GUID-EEC50FC0-46D5-4ED7-AD95-67430D5EC651" xml:lang="en"><title>Application security</title><prolog><metadata><keywords/></metadata></prolog><conbody> |
12 <concept id="GUID-EEC50FC0-46D5-4ED7-AD95-67430D5EC651" xml:lang="en"><title>Application |
13 <p>Native C++ applications have broad access to the mobile device functionality. They can access, for example, network and mobile device interfaces, storage memory and messaging framework. This provides many features for application developers to use, but can be exploited in the wrong hands.</p> |
13 security</title><prolog><metadata><keywords/></metadata></prolog><conbody> |
14 <p>The Symbian OS v9 <xref href="jar:GUID-35228542-8C95-4849-A73F-2B4F082F0C44.jar!/sdk/doc_source/guide/platsecsdk/index.html" format="application/java-archive">platform security</xref> architecture allows an application server to determine whether installed software using the server can be trusted. This section covers the most critical components in the security system, the components that first encounter problems and form the front line of defense when a system is attacked.</p> |
14 <p>Native C++ applications have broad access to the mobile device functionality. |
|
15 They can access, for example, network and mobile device interfaces, storage |
|
16 memory and messaging framework. This provides many features for application |
|
17 developers to use, but can be exploited in the wrong hands.</p> |
|
18 <p>The Symbian <xref href="GUID-4BFEDD79-9502-526A-BA7B-97550A6F0601.dita">platform |
|
19 security</xref> architecture allows an application server to determine whether |
|
20 installed software using the server can be trusted. This section covers the |
|
21 most critical components in the security system, the components that first |
|
22 encounter problems and form the front line of defense when a system is attacked.</p> |
15 <p>The following aspects of application security are covered in this section:</p> |
23 <p>The following aspects of application security are covered in this section:</p> |
16 <ul> |
|
17 <li><p><xref href="GUID-50BE8F1A-513A-433C-B045-66658FC226D7.dita">Client/server communication</xref></p></li> |
|
18 <li><p><xref href="GUID-C23196E8-FDD3-4A10-9DA2-DA83A2AD49D9.dita">Applications with an user interface</xref></p></li> |
|
19 <li><p><xref href="GUID-2E986A81-F094-4F1D-9ECB-6A325CFA5BB4.dita">Plug-ins</xref></p></li> |
|
20 <li><p><xref href="GUID-1293DE8C-E803-4ADF-9FA8-862519337331.dita">Software installer</xref></p></li> |
|
21 <li><p><xref href="GUID-8255A186-C1AC-44DA-844C-1FEA029C73BC.dita">Publish and Subscribe</xref></p></li> |
|
22 <li><p><xref href="GUID-261ADCEC-C8C8-46E3-A7DC-804AC868C233.dita">Descriptors</xref></p></li> |
|
23 </ul> |
|
24 </conbody></concept> |
24 </conbody></concept> |