7 Nokia Corporation - initial contribution. |
7 Nokia Corporation - initial contribution. |
8 Contributors: |
8 Contributors: |
9 --> |
9 --> |
10 <!DOCTYPE concept |
10 <!DOCTYPE concept |
11 PUBLIC "-//OASIS//DTD DITA Concept//EN" "concept.dtd"> |
11 PUBLIC "-//OASIS//DTD DITA Concept//EN" "concept.dtd"> |
12 <concept id="GUID-EEC50FC0-46D5-4ED7-AD95-67430D5EC651" xml:lang="en"><title>Application |
12 <concept id="GUID-EEC50FC0-46D5-4ED7-AD95-67430D5EC651" xml:lang="en"><title>Application security</title><prolog><metadata><keywords/></metadata></prolog><conbody> |
13 security</title><prolog><metadata><keywords/></metadata></prolog><conbody> |
13 <p>Native C++ applications have broad access to the mobile device |
14 <p>Native C++ applications have broad access to the mobile device functionality. |
14 functionality. They can access, for example, network and mobile device |
15 They can access, for example, network and mobile device interfaces, storage |
15 interfaces, storage memory and messaging framework. This provides |
16 memory and messaging framework. This provides many features for application |
16 many features for application developers to use, but can be exploited |
17 developers to use, but can be exploited in the wrong hands.</p> |
17 in the wrong hands.</p> |
18 <p>The Symbian <xref href="GUID-4BFEDD79-9502-526A-BA7B-97550A6F0601.dita">platform |
18 <p>The Symbian <xref href="GUID-4BFEDD79-9502-526A-BA7B-97550A6F0601.dita">platform security</xref> architecture allows an application server |
19 security</xref> architecture allows an application server to determine whether |
19 to determine whether installed software using the server can be trusted. |
20 installed software using the server can be trusted. This section covers the |
20 This section covers the most critical components in the security system, |
21 most critical components in the security system, the components that first |
21 the components that first encounter problems and form the front line |
22 encounter problems and form the front line of defense when a system is attacked.</p> |
22 of defense when a system is attacked.</p> |
23 <p>The following aspects of application security are covered in this section:</p> |
23 <p>The following aspects of application security are covered in |
|
24 this section:</p> |
24 </conbody></concept> |
25 </conbody></concept> |