User Tools

Site Tools


subsystem:security:tizen3-lessons-learnt

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
subsystem:security:tizen3-lessons-learnt [2015/10/13 11:43]
jose
subsystem:security:tizen3-lessons-learnt [2015/10/13 11:45] (current)
jose
Line 6: Line 6:
   * respect the privacy of the users   * respect the privacy of the users
  
-To achieve that goal, Tizen 3 implements a model based on authorisations named "​privilege"​ and on package ​ signatures made by distributors. The document [[http://​iot.bzh/​download/​public/​tizen-security-lessons-learnt-initial.pdf|Lessons learnt from Tizen 3 security model]] tries to summarize the accumulated knowledge about this model.+To achieve that goal, Tizen 3 implements a model based on authorisations named "​privilege"​ and on package ​ signatures made by distributors.
  
 +The document [[http://​iot.bzh/​download/​public/​tizen-security-lessons-learnt-initial.pdf|Lessons learnt from Tizen 3 security model]] tries to summarize the accumulated knowledge about this model.
  
 +This document also contains in appendices a short description of the model of security of Tizen 3.
  
  
subsystem/security/tizen3-lessons-learnt.1444736589.txt.gz ยท Last modified: 2015/10/13 11:43 by jose