Symbian3/SDK/Source/GUID-EEC50FC0-46D5-4ED7-AD95-67430D5EC651.dita
changeset 13 48780e181b38
parent 7 51a74ef9ed63
equal deleted inserted replaced
12:80ef3a206772 13:48780e181b38
     7     Nokia Corporation - initial contribution.
     7     Nokia Corporation - initial contribution.
     8 Contributors: 
     8 Contributors: 
     9 -->
     9 -->
    10 <!DOCTYPE concept
    10 <!DOCTYPE concept
    11   PUBLIC "-//OASIS//DTD DITA Concept//EN" "concept.dtd">
    11   PUBLIC "-//OASIS//DTD DITA Concept//EN" "concept.dtd">
    12 <concept id="GUID-EEC50FC0-46D5-4ED7-AD95-67430D5EC651" xml:lang="en"><title>Application
    12 <concept id="GUID-EEC50FC0-46D5-4ED7-AD95-67430D5EC651" xml:lang="en"><title>Application security</title><prolog><metadata><keywords/></metadata></prolog><conbody>
    13 security</title><prolog><metadata><keywords/></metadata></prolog><conbody>
    13 <p>Native C++ applications have broad access to the mobile device
    14 <p>Native C++ applications have broad access to the mobile device functionality.
    14 functionality. They can access, for example, network and mobile device
    15 They can access, for example, network and mobile device interfaces, storage
    15 interfaces, storage memory and messaging framework. This provides
    16 memory and messaging framework. This provides many features for application
    16 many features for application developers to use, but can be exploited
    17 developers to use, but can be exploited in the wrong hands.</p>
    17 in the wrong hands.</p>
    18 <p>The Symbian <xref href="GUID-4BFEDD79-9502-526A-BA7B-97550A6F0601.dita">platform
    18 <p>The Symbian <xref href="GUID-4BFEDD79-9502-526A-BA7B-97550A6F0601.dita">platform security</xref> architecture allows an application server
    19 security</xref> architecture allows an application server to determine whether
    19 to determine whether installed software using the server can be trusted.
    20 installed software using the server can be trusted. This section covers the
    20 This section covers the most critical components in the security system,
    21 most critical components in the security system, the components that first
    21 the components that first encounter problems and form the front line
    22 encounter problems and form the front line of defense when a system is attacked.</p>
    22 of defense when a system is attacked.</p>
    23 <p>The following aspects of application security are covered in this section:</p>
    23 <p>The following aspects of application security are covered in
       
    24 this section:</p>
    24 </conbody></concept>
    25 </conbody></concept>