This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
subsystem:security:tizen3-lessons-learnt [2015/10/13 10:04] jose created |
subsystem:security:tizen3-lessons-learnt [2015/10/13 11:45] (current) jose |
||
---|---|---|---|
Line 1: | Line 1: | ||
===== Lessons learnt from Tizen 3 security model ===== | ===== Lessons learnt from Tizen 3 security model ===== | ||
- | http://iot.bzh/download/public/tizen-security-lessons-learnt-initial.pdf | + | One of the major topic of an open system is the ability to install new applications. The applications installed must: |
+ | |||
+ | * do what they claim, not more | ||
+ | * respect the privacy of the users | ||
+ | |||
+ | To achieve that goal, Tizen 3 implements a model based on authorisations named "privilege" and on package signatures made by distributors. | ||
+ | |||
+ | The document [[http://iot.bzh/download/public/tizen-security-lessons-learnt-initial.pdf|Lessons learnt from Tizen 3 security model]] tries to summarize the accumulated knowledge about this model. | ||
+ | |||
+ | This document also contains in appendices a short description of the model of security of Tizen 3. | ||
+ |