User Tools

Site Tools


subsystem:security:tizen3-lessons-learnt

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
subsystem:security:tizen3-lessons-learnt [2015/10/13 10:32]
jose
subsystem:security:tizen3-lessons-learnt [2015/10/13 11:45] (current)
jose
Line 6: Line 6:
   * respect the privacy of the users   * respect the privacy of the users
  
-To achieve that goal, Tizen 3 implements a model based on privilege and distributor ​signatures. The document [[http://​iot.bzh/​download/​public/​tizen-security-lessons-learnt-initial.pdf|Lessons learnt from Tizen 3 security model]] tries to summarize the accumulated knowledge about this model.+To achieve that goal, Tizen 3 implements a model based on authorisations named "privilege" ​and on package  ​signatures ​made by distributors. 
 + 
 +The document [[http://​iot.bzh/​download/​public/​tizen-security-lessons-learnt-initial.pdf|Lessons learnt from Tizen 3 security model]] tries to summarize the accumulated knowledge about this model
 + 
 +This document also contains in appendices a short description of the model of security of Tizen 3.
  
  
subsystem/security/tizen3-lessons-learnt.1444732327.txt.gz · Last modified: 2015/10/13 10:32 by jose