This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
subsystem:security:tizen3-lessons-learnt [2015/10/13 10:32] jose |
subsystem:security:tizen3-lessons-learnt [2015/10/13 11:45] (current) jose |
||
---|---|---|---|
Line 6: | Line 6: | ||
* respect the privacy of the users | * respect the privacy of the users | ||
- | To achieve that goal, Tizen 3 implements a model based on privilege and distributor signatures. The document [[http://iot.bzh/download/public/tizen-security-lessons-learnt-initial.pdf|Lessons learnt from Tizen 3 security model]] tries to summarize the accumulated knowledge about this model. | + | To achieve that goal, Tizen 3 implements a model based on authorisations named "privilege" and on package signatures made by distributors. |
+ | |||
+ | The document [[http://iot.bzh/download/public/tizen-security-lessons-learnt-initial.pdf|Lessons learnt from Tizen 3 security model]] tries to summarize the accumulated knowledge about this model. | ||
+ | |||
+ | This document also contains in appendices a short description of the model of security of Tizen 3. | ||