Policy-based WRT Security Access to device APIs

Size: px
Start display at page:

Download "Policy-based WRT Security Access to device APIs"

Transcription

1 Policy-based WRT Security Access to device APIs 1

2 Problem space Allow access to device services from Web content executing in WRT Incrementally increasing requirements: Installed widgets Arbitrary web pages Untrusted content Trusted content Single installed policy per device Policy per runtime New device services Assumptions and Constraints Web engine core is a given We are addressing sandbox limitations separately Web engine, service API implementations, launchers are trusted For Nokia this is currently addressed by Symbian platform security Executing content may have no usable trust attributes Moving towards support of signed content 2

3 Three Approaches Security implicit in service implementation: Operations require user interaction via usual and customary UI (e.g. show camera viewfinder and require physical shutter press) Untrusted content access via user prompting: Usability is not great: e.g., user granted blanket access by accident and wants to revoke it. Trusted content access without prompting: Signed code, trusted origin 3

4 Solution Policy-based access control engine Model borrows elements from MIDP Policy format is XACML-like Role for standards Policy format (tweak XACML) Capability semantics, which are not defined by policy model We will open-source our solution 4

5 Policies Policy-based model provides the flexibility to meet our changiing set of requirements: Get the policy model right to start Implement what we can/need to Appropriate policies vary: Depend on quality of Web engine (e.g. the sandboxing model), belief about the reliablity of trust attributes, API access model, etc. Trust Policy Map code attributes to trust domains Code attributes extensible/attribute handlers Access Control Policy Map trust domains to capabilities Must support both user-queried and non-queried access Conditional capabilities 5

6 Usage Sample 1. Web Content Web Content Launcher Trust Manager WRT Trust Domain Trust Policy , 6. Sec Mgr Session Device Service Access Policy 6. Access Manager 6

7 Sample Sequence 1. Get content attributes 2. Request trust domain from trust manager Trust policy maps code attributes to trust domain 3. Launch content with trust domain associated 4. Instantiate device service API Get required capabilities from service 5. Create session with access manager Embodies trust domain + access policy Access policies maps trust domain to capabilities 6. Request access decision for required capabilities 7. Access service operation 7

8 Trust Policy <trustpolicy> <defaultdomain name = "Untrusted"/> <domain name="nokiaservice"> <origin url = " </domain> <domain name="nokiapublic"> <origin url = " </domain> </trustpolicy> 8

9 Access Policy <accesspolicy> <domain name="untrusted"> <!-- always granted capabilities for this domain --> <capability name="userdatagroup"/> <capability name="networkgroup"/> <!-- user-grantable capabilities for this domain --> <user> <defaultscope type="session" /> <scope type="oneshot" /> <scope type="permanent" /> <capability name="deviceresourcesgroup"/> <capability name="location"/> </user> </domain> </accesspolicy> 9

10 Security Manager Components Sessions Sessions Sessions Instantiates Creates Uses Persisted Sessions Sessions Sessions Access Manager Trust Manager Uses Uses Access Policies Access Policies Access Policies Access Trust Policies Policies Access Policies Property Trust Handlers Mappers 10

Policy Based Device Access Security Position Paper to Device Access Policy Working Group

Policy Based Device Access Security Position Paper to Device Access Policy Working Group 1 (8) Policy Based Device Access Security Position Paper to Device Access Policy Working Group 2 (8) 1. INTRODUCTION Nokia has implemented a policy-based device access security model for its Web runtime

More information

Widget security model based on MIDP and Web Application based on a security model with TLS/SSL and XMLDsig

Widget security model based on MIDP and Web Application based on a security model with TLS/SSL and XMLDsig Widget security model based on MIDP and Web Application based on a security model with TLS/SSL and XMLDsig Claes Nilsson Technology Area Group Leader Web Browsing Marcus Liwell Technology Area Group Leader

More information

Old, New, Borrowed, Blue: A Perspective on the Evolution of Mobile Platform Security Architectures

Old, New, Borrowed, Blue: A Perspective on the Evolution of Mobile Platform Security Architectures Old, New, Borrowed, Blue: A Perspective on the Evolution of Mobile Platform Security Architectures N. Asokan ACM CODASPY 11 Joint work with Kari Kostiainen, Elena Reshetova, Jan-Erik Ekberg Feb 22, 2011

More information

User Manual. Contents. Conrad Koppitz August 18, I Client 1. II Server 5. 1 Requirements 2

User Manual. Contents. Conrad Koppitz August 18, I Client 1. II Server 5. 1 Requirements 2 Conrad Koppitz August 18, 2010 Contents I Client 1 1 Requirements 2 2 Installation 2 2.1 Deployment.............................. 2 2.1.1 Bluetooth........................... 2 2.1.2 Data Cable..........................

More information

Security model for embedded systems using Smack *

Security model for embedded systems using Smack * Security model for embedded systems using Smack * Simple but secure * Simplified Mandatory Access Control Kernel - José Bollo - Context José Bollo Eurogiciel Intel Tizen Smack Linux Smack for embeddeds

More information

Firefox OS App Days. Overview and High Level Architecture. Author: José M. Cantera Last update: March 2013 TELEFÓNICA I+D

Firefox OS App Days. Overview and High Level Architecture. Author: José M. Cantera Last update: March 2013 TELEFÓNICA I+D Firefox OS App Days Overview and High Level Architecture Author: José M. Cantera (@jmcantera) Last update: March 2013 TELEFÓNICA I+D 1 Introduction What is Firefox OS? A new mobile open OS fully based

More information

Proposed User Experience for Handling Multiple Identity Providers in Network Identity Manager 2.0

Proposed User Experience for Handling Multiple Identity Providers in Network Identity Manager 2.0 Proposed User Experience for Handling Multiple Identity Providers in Network Identity Manager 2.0 The current architecture of Network Identity Manager is designed around a single identity provider and

More information

IT S APP BUILDING SEASON HOW ANDROID MARSHMALLOW AFFECTS YOU

IT S APP BUILDING SEASON HOW ANDROID MARSHMALLOW AFFECTS YOU IT S APP BUILDING SEASON HOW ANDROID MARSHMALLOW AFFECTS YOU WEBINAR LOGISTICS Today s webinar is being recorded You will be emailed a link to catch up or share with colleagues We welcome you re feedback

More information

Mobile Platform Security Architectures A perspective on their evolution

Mobile Platform Security Architectures A perspective on their evolution Mobile Platform Security Architectures A perspective on their evolution N. Asokan CARDIS 2012 Graz, Austria November 29, 2012 1 NA, KKo, JEE, Nokia Resarch Center 2011-2012 Introduction Recent interest

More information

AEM Mobile: Setting up Google as an Identity Provider

AEM Mobile: Setting up Google as an Identity Provider AEM Mobile: Setting up Google as an Identity Provider Requirement: Prerequisite knowledge Understanding of AEM Mobile Required Products AEM Mobile Google Account Generating the client ID and secret To

More information

Click Studios. Passwordstate. Remote Session Launcher. Installation Instructions

Click Studios. Passwordstate. Remote Session Launcher. Installation Instructions Passwordstate Remote Session Launcher Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise

More information

Optional AnyConnect Configuration and Management

Optional AnyConnect Configuration and Management Optional AnyConnect Configuration and Management Modifying and Deleting Connection Entries, page 1 Configuring Certificates, page 2 Specifying Application Preferences, page 5 Using AnyConnect Widgets,

More information

Front End Programming

Front End Programming Front End Programming Mendel Rosenblum Brief history of Web Applications Initially: static HTML files only. Common Gateway Interface (CGI) Certain URLs map to executable programs that generate web page

More information

Lecture 3 MOBILE PLATFORM SECURITY

Lecture 3 MOBILE PLATFORM SECURITY Lecture 3 MOBILE PLATFORM SECURITY You will be learning: What techniques are used in mobile software platform security? What techniques are used in mobile hardware platform security? Is there a common

More information

Software Release Communication 02/07/2014. Topics covered. Solutions You Can Count On

Software Release Communication 02/07/2014. Topics covered. Solutions You Can Count On Topics covered Vea Web... 2 User Access Changes... 4 Dashboard Sharing... 7 Component Upgrade... 8 System Manager Geocode Function... 9 Installer Changes... 11 VEA WEB The initial version of Vea Web, included

More information

Minne menet, Mobiili-Java?

Minne menet, Mobiili-Java? Minne menet, Mobiili-Java? Java Platform, Micro Edition Status and Future Directions Antero Taivalsaari Sun Microsystems, Inc. December 2005 Growth Continues (2005 vs. 2003) 1 Billion Installed Base as

More information

Introduction to Cisco UCS Central

Introduction to Cisco UCS Central Introducing Cisco UCS Central, page 1 Introducing Cisco UCS Central Cisco UCS Central provides scalable management solution for growing Cisco UCS environment. Cisco UCS Central simplifies the management

More information

Software Architecture

Software Architecture Software Architecture Does software architecture global design?, architect designer? Overview What is it, why bother? Architecture Design Viewpoints and view models Architectural styles Architecture asssessment

More information

BadgerNet Client Version 2.9.1

BadgerNet Client Version 2.9.1 BadgerNet Client Version 2.9.1 Revision History 1.0 PGB 01 Nov 2014 Scope of changes 1.1 NDM 21 Nov 2014 Proposed method of implementation 1.2 PGB 19 Dec 2014 Release notes added 1.3 PGB 27 Feb 2015 Added

More information

HOW TO CONFIGURE AND USE A TRAUMACAD PLUG-IN WITH PHILIPS ISITE

HOW TO CONFIGURE AND USE A TRAUMACAD PLUG-IN WITH PHILIPS ISITE HOW TO CONFIGURE AND USE A TRAUMACAD PLUG-IN WITH PHILIPS ISITE This document describes the process of configuring the TraumaCad plug-in inside isite Enterprise or Radiology which allows a user to export

More information

Secure Your First BlackBerry Dynamics App

Secure Your First BlackBerry Dynamics App Hong Kong 2018 Hong Kong 2018 Secure Your First BlackBerry Dynamics App EK Choi, Enterprise Solutions Manager Build Integration Dynamics runtime is for secure mobile and desktop applications Exposes capabilities

More information

SpringCM Release Notes. January 2018

SpringCM Release Notes. January 2018 SpringCM Release Notes January 2018 Contents Announcements... 3 Global Navigation header coming in 2018... 3 Redefining the Admin and User Experiences... 4 Workflows... 4 E-Signature Changes... 4 Enhancements...

More information

I, J, K. Eclipse, 156

I, J, K. Eclipse, 156 Index A, B Android PhoneGap app, 158 deploying and running, 172 New Eclipse project, 158 Activity dialog, 162 application properties, 160 AVD, 170 configuration, 167 Launcher Icon dialog, 161 PhoneGap

More information

Inferring Required Permissions

Inferring Required Permissions for Statically Composed Programs Tero Hasu Anya Helene Bagge Magne Haveraaen {tero,anya,magne}@ii.uib.no Bergen Language Design Laboratory University of Bergen smartphones a security risk for users privacy

More information

Smartphone Platform Security

Smartphone Platform Security Smartphone Platform Security What can we learn from Symbian? Craig Heath Independent Security Consultant 15 Jan 2015 Franklin Heath Ltd Discussion Points Was Symbian OS platform security a success? Did

More information

Inotera Memories Inc. SSLVPN For Personal User Manual

Inotera Memories Inc. SSLVPN For Personal User Manual Inotera Memories Inc. SSLVPN For Personal User Manual Add SSL-VPN Website in Trusted sites Run Internet Explorer, click Tools Internet Options Security Trusted sites Sites Add below sites: https://inovpn.inotera.com

More information

Java Security. Compiler. Compiler. Hardware. Interpreter. The virtual machine principle: Abstract Machine Code. Source Code

Java Security. Compiler. Compiler. Hardware. Interpreter. The virtual machine principle: Abstract Machine Code. Source Code Java Security The virtual machine principle: Source Code Compiler Abstract Machine Code Abstract Machine Code Compiler Concrete Machine Code Input Hardware Input Interpreter Output 236 Java programs: definitions

More information

PASSPORTAL PLUGIN DOCUMENTATION

PASSPORTAL PLUGIN DOCUMENTATION Contents Requirements... 2 Install or Update Passportal Plugin Solution Center... 3 Configuring Passportal Plugin... 5 Client mapping... 6 User Class Configuration... 7 About the Screens... 8 Passportal

More information

Table of contents. Pure ASP Upload 3 Manual DMXzone

Table of contents. Pure ASP Upload 3 Manual DMXzone Table of contents Table of contents... 1 About Pure ASP Upload 3... 2 Features in Detail... 3 The Basics: Uploading Files with Pure ASP Upload 3... 14 Advanced: Using Pure ASP Upload 3 with Insert Record...

More information

Software Architecture With ColdFusion: Design Patterns and Beyond Topics Outline Prepared by Simon Horwith for CFUnderground 6

Software Architecture With ColdFusion: Design Patterns and Beyond Topics Outline Prepared by Simon Horwith for CFUnderground 6 Software Architecture With ColdFusion: Design Patterns and Beyond Topics Outline Prepared by Simon Horwith for CFUnderground 6 Some Terms: Architecture the manner in which the components of a computer

More information

User Interface. Technology Domain Roadmap & Strategy. 22 February 2010 Scott Weiss, UI Technology Manager

User Interface. Technology Domain Roadmap & Strategy. 22 February 2010 Scott Weiss, UI Technology Manager User Interface Technology Domain Roadmap & Strategy S^3 S^4 22 February 2010 Scott Weiss, UI Technology Manager scottweiss@symbian.org User Interface - Overview Definition The User Interface Domain offers

More information

Perceptive Interact for Salesforce Enterprise

Perceptive Interact for Salesforce Enterprise Perceptive Interact for Salesforce Enterprise Installation and Setup Guide Version: 3.x.x Written by: Documentation Team, R&D Date: January 2019 Copyright 2015-2019 Hyland Software, Inc. and its affiliates.

More information

TRAINING GUIDE. Lucity GIS. Web Administration

TRAINING GUIDE. Lucity GIS. Web Administration TRAINING GUIDE Lucity GIS Web Administration Lucity GIS Web Administration Contents Portal Config and SSO... 2 Registering with Portal... 2 Behind the Scenes... 4 Resetting Portal Integration... 5 Single

More information

Runtime monitoring for next generation Java ME platform

Runtime monitoring for next generation Java ME platform Runtime monitoring for next generation Java ME platform Gabriele Costa, Fabio Martinelli, Paolo Mori, Christian Schaefer, Thomas Walter To cite this version: Gabriele Costa, Fabio Martinelli, Paolo Mori,

More information

Apple Inc. Apple ios 11 Safari on iphone and ipad Common Criteria Configuration Guide. November Version 1.2

Apple Inc. Apple ios 11 Safari on iphone and ipad Common Criteria Configuration Guide. November Version 1.2 Apple Inc. Apple ios 11 Safari on iphone and ipad Common Criteria Configuration Guide November 2018 Version 1.2 1 Contents 1 Introduction... 4 1.1 Target of Evaluation... 4 1.2 Document Purpose and Scope...

More information

Managing Documents In Your ios Apps

Managing Documents In Your ios Apps Session #WWDC18 Managing Documents In Your ios Apps 216 Brandon Tennant, Software Engineer Thomas Deniau, Software Engineer Rony Fadel, Software Engineer 2018 Apple Inc. All rights reserved. Redistribution

More information

Salesforce Mobile App URL Schemes

Salesforce Mobile App URL Schemes Salesforce Mobile App URL Schemes Version 2, 2 @salesforcedocs Last updated: November 2, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,

More information

C1: Define Security Requirements

C1: Define Security Requirements OWASP Top 10 Proactive Controls IEEE Top 10 Software Security Design Flaws OWASP Top 10 Vulnerabilities Mitigated OWASP Mobile Top 10 Vulnerabilities Mitigated C1: Define Security Requirements A security

More information

Volante NACHA ISO20022 Validator AMI User Guide

Volante NACHA ISO20022 Validator AMI User Guide Volante NACHA ISO20022 Validator AMI User Guide 1. About Volante NACHA ISO20022 Validator AMI User Guide This document is referenced in the REST Services Deployment Guide. This outlines the available REST

More information

ADF Mobile Code Corner

ADF Mobile Code Corner ADF Mobile Code Corner m03. Abstract: Dependent lists is a common functional requirement for web, desktop and also mobile applications. You can build dependent lists from dependent, nested, and from independent,

More information

WebVM Security policy for device API access

WebVM Security policy for device API access WebVM Security policy for device API access December 2008 WebVM in a nutshell a browser plugin provides a way for JavaScript programmers to get access to device APIs supports both websites and widgets

More information

Tizen Web Runtime. Ming Jin, Samsung Electronics. (May 8, 2012)

Tizen Web Runtime. Ming Jin, Samsung Electronics. (May 8, 2012) Tizen Web Runtime Ming Jin, Samsung Electronics (May 8, 2012) Contents What is Web Application & Web Runtime Tizen Web Application Packaging & Configuration Network Access Tizen Web Runtime Installer Core

More information

UMHS Financial Systems Workspace & Smart View Templates

UMHS Financial Systems Workspace & Smart View Templates Level 1 Password https://findatamgr.dsc.umich.edu/workspace/index.jsp What If I have a blank Homepage? Utilize the Use Current Page button to set the Home Page. Why do I not see the Preview User Point

More information

Review of Mobile Web Application Frameworks

Review of Mobile Web Application Frameworks Review of Mobile Web Application Frameworks Article Number: 909 Rating: Unrated Last Updated: Mon, May 9, 2011 at 10:57 AM If you are serious about getting your website or web application mobile-friendly,

More information

Requirements from the Application Software Extended Package for Web Browsers

Requirements from the Application Software Extended Package for Web Browsers Requirements from the Application Software Extended Package for Web Browsers Version: 2.0 2015-06-16 National Information Assurance Partnership Revision History Version Date Comment v 2.0 2015-06-16 Application

More information

Tizen-Meta as Security and Connectivity Layers For Yocto Project

Tizen-Meta as Security and Connectivity Layers For Yocto Project Tizen-Meta as Security and Connectivity Layers For Yocto Project () dominig.arfoll@fridu.net October 2014 Tizen-Meta What is Tizen How to build Tizen with Yocto tools Which Connectivity is available with

More information

Java Enterprise Edition

Java Enterprise Edition Java Enterprise Edition The Big Problem Enterprise Architecture: Critical, large-scale systems Performance Millions of requests per day Concurrency Thousands of users Transactions Large amounts of data

More information

CTC Fails to Start on Windows XP with Cisco Security Agent

CTC Fails to Start on Windows XP with Cisco Security Agent CTC Fails to Start on Windows XP with Cisco Security Agent Document ID: 64669 Contents Introduction Prerequisites Requirements Components Used Conventions Problem Solution Related Information Introduction

More information

Developing Mobile Applications

Developing Mobile Applications Developing Mobile Applications J2ME Java 2 Micro Edition 1 Virtual machines portable apps virtual machine native apps operating system hardware 2 Java - important issues Symbolic language not a random

More information

Zephyr Cloud for HipChat

Zephyr Cloud for HipChat June 25 Zephyr Cloud for HipChat Z e p h y r, 7 7 0 7 G a t e w a y B l v d S t e 1 0 0, N e w a r k, C A 9 4 5 6 0, U S A 1 - Overview How this guide will help Zephyr Cloud for HipChat guide will guide

More information

Read the following information carefully, before you begin an upgrade.

Read the following information carefully, before you begin an upgrade. Read the following information carefully, before you begin an upgrade. Review Supported Upgrade Paths, page 1 Review Time Taken for Upgrade, page 1 Review Available Cisco APIC-EM Ports, page 2 Securing

More information

A Top-Down Visual Approach to GUI development

A Top-Down Visual Approach to GUI development A Top-Down Visual Approach to GUI development ROSANNA CASSINO, GENNY TORTORA, MAURIZIO TUCCI, GIULIANA VITIELLO Dipartimento di Matematica e Informatica Università di Salerno Via Ponte don Melillo 84084

More information

JSR 248: Taking Java Platform, Micro Edition (Java ME) to the Next Level

JSR 248: Taking Java Platform, Micro Edition (Java ME) to the Next Level JSR 248: Taking Java Platform, Micro Edition (Java ME) to the Next Level Kay Glahn Consultant Mobile Service Architecture, Vodafone http://www.vodafone.com Erkki Rysä Technologist Nokia Corporation http://www.nokia.com

More information

Use Cases for Argonaut Project -- DRAFT Page

Use Cases for Argonaut Project -- DRAFT Page Use Cases for Argonaut Project -- DRAFT Page 1 Use Cases for Argonaut Project DRAFT V0.3 March 03, 2015 Use Cases for Argonaut Project -- DRAFT Page 2 Introduction The Argonaut Project seeks to rapidly

More information

Sharepoint 2010 How Manually Update Web Analytics Workflows Timer Job

Sharepoint 2010 How Manually Update Web Analytics Workflows Timer Job Sharepoint 2010 How Manually Update Web Analytics Workflows Timer Job The SharePoint 2010 Timer service (SPTimerv4) runs timer jobs. list depending on installed service pack version and cumulative updates

More information

CYBER RISK CONSULTING. Smartphone Security Issues

CYBER RISK CONSULTING. Smartphone Security Issues CYBER RISK CONSULTING Blackhat Briefings Europe 2004 Smartphone Security Issues May 2004 Luc DELPHA Maliha RASHID 1. Introduction Why smartphones? Functionalities Operating Systems Supported Connectivity

More information

MYOB Exo Business. Release Notes

MYOB Exo Business. Release Notes MYOB Exo Business Release Notes 2019.1 Contents Introduction 1 What s New in this Release?... 1 Installation 2 Pre Install Requirements... 2 Other Requirements... 2 Installing MYOB Exo Business... 2 Post

More information

Requirements and Issues of V**s for Mobile Terminals

Requirements and Issues of V**s for Mobile Terminals Requirements and Issues of V**s for Mobile Terminals Workshop on the Future of Virtual Execution Environments Armonk, NY, USA 15-17.09.2004 Kari Systä Nokia Research Center 1 NOKIA Presentation_Name.PPT

More information

Blackboard Collaborate Launcher for Mac OS X

Blackboard Collaborate Launcher for Mac OS X Blackboard Collaborate Launcher for Mac OS X What Is the Blackboard Collaborate Launcher? The Blackboard Collaborate Launcher is a software application for Mac OS X 10.8.4 and higher. The Launcher provides

More information

Index LICENSED PRODUCT NOT FOR RESALE

Index LICENSED PRODUCT NOT FOR RESALE Index LICENSED PRODUCT NOT FOR RESALE A Absolute positioning, 100 102 with multi-columns, 101 Accelerometer, 263 Access data, 225 227 Adding elements, 209 211 to display, 210 Animated boxes creation using

More information

Who am I? Wireless Online Game Development for Mobile Device. What games can you make after this course? Are you take the right course?

Who am I? Wireless Online Game Development for Mobile Device. What games can you make after this course? Are you take the right course? Who am I? Wireless Online Game Development for Mobile Device Lo Chi Wing, Peter Lesson 1 Email: Peter@Peter-Lo.com I123-1-A@Peter Lo 2007 1 I123-1-A@Peter Lo 2007 2 Are you take the right course? This

More information

OWASP 5/07/09. The OWASP Foundation OWASP Static Analysis (SA) Track Session 1: Intro to Static Analysis

OWASP 5/07/09. The OWASP Foundation  OWASP Static Analysis (SA) Track Session 1: Intro to Static Analysis Static Analysis (SA) Track Session 1: Intro to Static Analysis Eric Dalci Cigital edalci at cigital dot com 5/07/09 Copyright The Foundation Permission is granted to copy, distribute and/or modify this

More information

Chris Ainsley. Clean configuration - The foundation of clean code

Chris Ainsley. Clean configuration - The foundation of clean code Chris Ainsley Clean configuration - The foundation of clean code Best time to discover a configuration issue? Runtime Deployment App initialization Build-time Interactively Agenda Current Approaches Issues

More information

Real Application Security Administration

Real Application Security Administration Oracle Database Real Application Security Administration Console (RASADM) User s Guide 12c Release 2 (12.2) E85615-01 June 2017 Real Application Security Administration Oracle Database Real Application

More information

Mobile Application Development. Introduction. Dr. Christelle Scharff Pace University, USA

Mobile Application Development. Introduction. Dr. Christelle Scharff Pace University, USA Mobile Application Development Introduction Dr. Christelle Scharff cscharff@pace.edu Pace University, USA Objectives Getting an overview of the mobile phone market, its possibilities and weaknesses Providing

More information

CS378 -Mobile Computing. Intents

CS378 -Mobile Computing. Intents CS378 -Mobile Computing Intents Intents Allow us to use applications and components that are part of Android System and allow other applications to use the components of the applications we create Examples

More information

OPC UA Configuration Manager Help 2010 Kepware Technologies

OPC UA Configuration Manager Help 2010 Kepware Technologies OPC UA Configuration Manager Help 2010 Kepware Technologies 1 OPC UA Configuration Manager Help Table of Contents 1 Getting Started... 2 Help Contents... 2 Overview... 2 Server Settings... 2 2 OPC UA Configuration...

More information

Android PC Splash Brothers Design Specifications

Android PC Splash Brothers Design Specifications Android PC Splash Brothers Design Specifications Contributors: Zach Bair Taronish Daruwalla Joshua Duong Anthony Nguyen 1. Technology background The Android x86 project has been in existence since 2011.

More information

Intel Unite Solution Intel Unite Plugin for WebEx*

Intel Unite Solution Intel Unite Plugin for WebEx* Intel Unite Solution Intel Unite Plugin for WebEx* Version 1.0 Legal Notices and Disclaimers All information provided here is subject to change without notice. Contact your Intel representative to obtain

More information

OpenTouch Conversation One 2.2 Contents

OpenTouch Conversation One 2.2 Contents OpenTouch Conversation One 2.2 Contents OpenTouch Conversation One 2.2... 1 1. Startup of OpenTouch Conversation One... 2 1. Select your call device or forward your calls... 2 2. Set manually your presence

More information

Securing OPC UA Client Connections. OPC UA Certificate handling with the OPC Data Client Development Toolkit s EasyOPCUA Client Objects

Securing OPC UA Client Connections. OPC UA Certificate handling with the OPC Data Client Development Toolkit s EasyOPCUA Client Objects Securing OPC UA Client Connections OPC UA Certificate handling with the OPC Data Client Development Toolkit s EasyOPCUA Client Objects Page 2 of 16 Table of Contents INTRODUCTION 3 THE SAMPLE CODE AND

More information

Android framework. How to use it and extend it

Android framework. How to use it and extend it Android framework How to use it and extend it Android has got in the past three years an explosive growth: it has reached in Q1 2011 the goal of 100M of Activations world wide with a number of daily activations

More information

A Generic Adaptive Method for Corruption Mitigation in Trial Monitoring System with Restful Authorization. India)

A Generic Adaptive Method for Corruption Mitigation in Trial Monitoring System with Restful Authorization. India) American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-4, Issue-10, pp-18-22 www.ajer.org Research Paper Open Access A Generic Adaptive Method for Corruption Mitigation

More information

Table of Contents. Introduction... xxi

Table of Contents. Introduction... xxi Introduction... xxi Chapter 1: Getting Started with Web Applications in Java... 1 Introduction to Web Applications... 2 Benefits of Web Applications... 5 Technologies used in Web Applications... 5 Describing

More information

Web Application Expectations

Web Application Expectations Effective Ruby on Rails Development Using CodeGear s Ruby IDE Shelby Sanders Principal Engineer CodeGear Copyright 2007 CodeGear. All Rights Reserved. 2007/6/14 Web Application Expectations Dynamic Static

More information

Enterprise Java Unit 1-Chapter 2 Prof. Sujata Rizal Java EE 6 Architecture, Server and Containers

Enterprise Java Unit 1-Chapter 2 Prof. Sujata Rizal Java EE 6 Architecture, Server and Containers 1. Introduction Applications are developed to support their business operations. They take data as input; process the data based on business rules and provides data or information as output. Based on this,

More information

Android Essentials with Java

Android Essentials with Java Android Essentials with Java Before You Program o Exercise in algorithm generation Getting Started o Using IntelliJ CE Using Variables and Values o Store data in typed variables Static Methods o Write

More information

The Future of Real-Time in Spark

The Future of Real-Time in Spark The Future of Real-Time in Spark Reynold Xin @rxin Spark Summit, New York, Feb 18, 2016 Why Real-Time? Making decisions faster is valuable. Preventing credit card fraud Monitoring industrial machinery

More information

Review. Designing Interactive Systems II. Review. Base Window System. Apps UITK BWS GEL. 4-Layer Model Graphics and Event Library BWS GEL

Review. Designing Interactive Systems II. Review. Base Window System. Apps UITK BWS GEL. 4-Layer Model Graphics and Event Library BWS GEL Window Manager Base Window System Graphics & Event Library Hardware more abstract, application-/user- Applications User Interface Toolkit Review Designing Interactive Systems II 4-Layer Model Graphics

More information

Application Fundamentals

Application Fundamentals Application Fundamentals CS 2046 Mobile Application Development Fall 2010 Announcements CMS is up If you did not get an email regarding this, see me after class or send me an email. Still working on room

More information

Salesforce1 Mobile Security White Paper. Revised: April 2014

Salesforce1 Mobile Security White Paper. Revised: April 2014 Salesforce1 Mobile Security White Paper Revised: April 2014 Table of Contents Introduction Salesforce1 Architecture Overview Authorization and Permissions Communication Security Authentication OAuth Pairing

More information

Oracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive Provisioning and Reconciliation

Oracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive Provisioning and Reconciliation Oracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive Provisioning and Reconciliation atul.goyal@oracle.com Principal Product Manager, Oracle Identity Governance Provisioning Oracle Confidential

More information

Oracle Identity Governance 11g R2: Develop Identity Provisioning

Oracle Identity Governance 11g R2: Develop Identity Provisioning Oracle University Contact Us: 20 (0)2 35350254 Oracle Identity Governance 11g R2: Develop Identity Provisioning Duration: 5 Days What you will learn In this intensive course, you'll learn about Oracle

More information

Oracle Database. Installation and Configuration of Real Application Security Administration (RASADM) Prerequisites

Oracle Database. Installation and Configuration of Real Application Security Administration (RASADM) Prerequisites Oracle Database Real Application Security Administration 12c Release 1 (12.1) E61899-04 May 2015 Oracle Database Real Application Security Administration (RASADM) lets you create Real Application Security

More information

AGENDA. DEX450: Programmatic Development Using Apex and Visualforce. Day One

AGENDA. DEX450: Programmatic Development Using Apex and Visualforce. Day One Day One 15 minutes Introductions 60 minutes Welcome to AW Computing Watch Me 1-1 (5 min): Explore the Certification App Join Me 1-2 (5 min): Prepare Your Training Org Join Me 1-3 (5 min): Create a Sandbox

More information

MICHIEL ROOK DATABASE MIGRATIONS WITHOUT DOWN TIME

MICHIEL ROOK DATABASE MIGRATIONS WITHOUT DOWN TIME MICHIEL ROOK DATABASE MIGRATIONS WITHOUT DOWN TIME @michieltcs Developer, consultant, trainer, speaker @michieltcs ABOUT DATABASE MIGRATIONS ABOUT SCHEMA MIGRATIONS SQL UP @michieltcs UP DOWN @michieltcs

More information

Android System Architecture. Android Application Fundamentals. Applications in Android. Apps in the Android OS. Program Model 8/31/2015

Android System Architecture. Android Application Fundamentals. Applications in Android. Apps in the Android OS. Program Model 8/31/2015 Android System Architecture Android Application Fundamentals Applications in Android All source code, resources, and data are compiled into a single archive file. The file uses the.apk suffix and is used

More information

Lightweight J2EE Framework

Lightweight J2EE Framework Lightweight J2EE Framework Struts, spring, hibernate Software System Design Zhu Hongjun Session 5: Hibernate DAO Transaction Management and Concurrency Hibernate Querying Batch Processing Data Filtering

More information

WordPress 4.9, "Tipton": Major Customizer Improvements, Code Error Checking, and More!

WordPress 4.9, Tipton: Major Customizer Improvements, Code Error Checking, and More! WordPress 4.9, "Tipton": Major Customizer Improvements, Code Error Checking, and More! Version 4.9 of WordPress, named Tipton in honor of jazz musician and band leader Billy Tipton, is available for download

More information

Chapter 17 - Component-based software engineering. Chapter 17 So-ware reuse

Chapter 17 - Component-based software engineering. Chapter 17 So-ware reuse Chapter 17 - Component-based software engineering 1 Topics covered ² Components and component models ² CBSE processes ² Component composition 2 Component-based development ² Component-based software engineering

More information

Iowa Cycling Project: Testing & Evaluation Plan

Iowa Cycling Project: Testing & Evaluation Plan IOWA STATE UNIVERSITY Iowa Cycling Project: Testing & Evaluation Plan [Type the document subtitle] Charles Dunbar, Ben Kallal, Ankit Patel, Peter Purcell, Kody Reynolds [Pick the date] [Type the abstract

More information

This is a known issue (SVA-700) that will be resolved in a future release IMPORTANT NOTE CONCERNING A VBASE RESTORE ISSUE

This is a known issue (SVA-700) that will be resolved in a future release IMPORTANT NOTE CONCERNING A VBASE RESTORE ISSUE SureView Analytics 6.1.1 Release Notes ================================= --------- IMPORTANT NOTE REGARDING DOCUMENTATION --------- The Installation guides, Quick Start Guide, and Help for this release

More information

Software Development for Mobile Devices

Software Development for Mobile Devices Software Development for Mobile Devices Operating System Diversity Many Operating Systems Google Android Apple ios Microsoft Windows Phone Nokia Symbian Linux RIM BlackBerry OS HP/Palm WebOS BREW Differences

More information

Selftestengine.P questuons P IBM FileNet P8 System Implementation Technical Mastery Test v1

Selftestengine.P questuons P IBM FileNet P8 System Implementation Technical Mastery Test v1 Selftestengine.P2070-055.38 questuons Number: P2070-055 Passing Score: 800 Time Limit: 120 min File Version: 5.2 P2070-055 IBM FileNet P8 System Implementation Technical Mastery Test v1 A questions are

More information

Extend EBS Using Applications Express

Extend EBS Using Applications Express Extend EBS Using Applications Express John Peters JRPJR, Inc. Abstract Few people know about Oracle Applications Express (APEX) an actual free Oracle Tool included with your Oracle DB Licenses. How many

More information

Connection Guide for Internal EC Users

Connection Guide for Internal EC Users Connection Guide for Internal EC Users How can I access the session? In order to access the session please follow the instructions on how to connect from page 2 of this document. Test your session! Please

More information

Getting the Most from Eclipse

Getting the Most from Eclipse Getting the Most from Eclipse Darin Swanson IBM Rational Portland, Oregon Darin_Swanson@us.ibm.com March 17, 2005 What is Eclipse An extensible tools platform Out-of-box function and quality to attract

More information

setup.exe file must be run locally. The setup.exe file was easy to find, in the LumiraTeamServer subfolder.

setup.exe file must be run locally. The setup.exe file was easy to find, in the LumiraTeamServer subfolder. Lumira Edge Install As a moderately experienced user of SAP Lumira Desktop, I am knowledgeable in the utility and functionality that it provides. It is ideal for manipulating, editing, and formatting data

More information

VMware AirWatch Chrome OS Platform Guide Managing Chrome OS Devices with AirWatch

VMware AirWatch Chrome OS Platform Guide Managing Chrome OS Devices with AirWatch VMware AirWatch Chrome OS Platform Guide Managing Chrome OS Devices with AirWatch AirWatch v9.3 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Security and privacy in your embedded systems

Security and privacy in your embedded systems Security and privacy in your embedded systems Strong isolation of applications using Smack and Cynara José Bollo security at IoT.bzh jose.bollo@iot.bzh IoT.bzh Specialized on Embedded & IoT Contributing

More information