Policy-based WRT Security Access to device APIs
|
|
- Briana Berniece Johns
- 5 years ago
- Views:
Transcription
1 Policy-based WRT Security Access to device APIs 1
2 Problem space Allow access to device services from Web content executing in WRT Incrementally increasing requirements: Installed widgets Arbitrary web pages Untrusted content Trusted content Single installed policy per device Policy per runtime New device services Assumptions and Constraints Web engine core is a given We are addressing sandbox limitations separately Web engine, service API implementations, launchers are trusted For Nokia this is currently addressed by Symbian platform security Executing content may have no usable trust attributes Moving towards support of signed content 2
3 Three Approaches Security implicit in service implementation: Operations require user interaction via usual and customary UI (e.g. show camera viewfinder and require physical shutter press) Untrusted content access via user prompting: Usability is not great: e.g., user granted blanket access by accident and wants to revoke it. Trusted content access without prompting: Signed code, trusted origin 3
4 Solution Policy-based access control engine Model borrows elements from MIDP Policy format is XACML-like Role for standards Policy format (tweak XACML) Capability semantics, which are not defined by policy model We will open-source our solution 4
5 Policies Policy-based model provides the flexibility to meet our changiing set of requirements: Get the policy model right to start Implement what we can/need to Appropriate policies vary: Depend on quality of Web engine (e.g. the sandboxing model), belief about the reliablity of trust attributes, API access model, etc. Trust Policy Map code attributes to trust domains Code attributes extensible/attribute handlers Access Control Policy Map trust domains to capabilities Must support both user-queried and non-queried access Conditional capabilities 5
6 Usage Sample 1. Web Content Web Content Launcher Trust Manager WRT Trust Domain Trust Policy , 6. Sec Mgr Session Device Service Access Policy 6. Access Manager 6
7 Sample Sequence 1. Get content attributes 2. Request trust domain from trust manager Trust policy maps code attributes to trust domain 3. Launch content with trust domain associated 4. Instantiate device service API Get required capabilities from service 5. Create session with access manager Embodies trust domain + access policy Access policies maps trust domain to capabilities 6. Request access decision for required capabilities 7. Access service operation 7
8 Trust Policy <trustpolicy> <defaultdomain name = "Untrusted"/> <domain name="nokiaservice"> <origin url = " </domain> <domain name="nokiapublic"> <origin url = " </domain> </trustpolicy> 8
9 Access Policy <accesspolicy> <domain name="untrusted"> <!-- always granted capabilities for this domain --> <capability name="userdatagroup"/> <capability name="networkgroup"/> <!-- user-grantable capabilities for this domain --> <user> <defaultscope type="session" /> <scope type="oneshot" /> <scope type="permanent" /> <capability name="deviceresourcesgroup"/> <capability name="location"/> </user> </domain> </accesspolicy> 9
10 Security Manager Components Sessions Sessions Sessions Instantiates Creates Uses Persisted Sessions Sessions Sessions Access Manager Trust Manager Uses Uses Access Policies Access Policies Access Policies Access Trust Policies Policies Access Policies Property Trust Handlers Mappers 10
Policy Based Device Access Security Position Paper to Device Access Policy Working Group
1 (8) Policy Based Device Access Security Position Paper to Device Access Policy Working Group 2 (8) 1. INTRODUCTION Nokia has implemented a policy-based device access security model for its Web runtime
More informationWidget security model based on MIDP and Web Application based on a security model with TLS/SSL and XMLDsig
Widget security model based on MIDP and Web Application based on a security model with TLS/SSL and XMLDsig Claes Nilsson Technology Area Group Leader Web Browsing Marcus Liwell Technology Area Group Leader
More informationOld, New, Borrowed, Blue: A Perspective on the Evolution of Mobile Platform Security Architectures
Old, New, Borrowed, Blue: A Perspective on the Evolution of Mobile Platform Security Architectures N. Asokan ACM CODASPY 11 Joint work with Kari Kostiainen, Elena Reshetova, Jan-Erik Ekberg Feb 22, 2011
More informationUser Manual. Contents. Conrad Koppitz August 18, I Client 1. II Server 5. 1 Requirements 2
Conrad Koppitz August 18, 2010 Contents I Client 1 1 Requirements 2 2 Installation 2 2.1 Deployment.............................. 2 2.1.1 Bluetooth........................... 2 2.1.2 Data Cable..........................
More informationSecurity model for embedded systems using Smack *
Security model for embedded systems using Smack * Simple but secure * Simplified Mandatory Access Control Kernel - José Bollo - Context José Bollo Eurogiciel Intel Tizen Smack Linux Smack for embeddeds
More informationFirefox OS App Days. Overview and High Level Architecture. Author: José M. Cantera Last update: March 2013 TELEFÓNICA I+D
Firefox OS App Days Overview and High Level Architecture Author: José M. Cantera (@jmcantera) Last update: March 2013 TELEFÓNICA I+D 1 Introduction What is Firefox OS? A new mobile open OS fully based
More informationProposed User Experience for Handling Multiple Identity Providers in Network Identity Manager 2.0
Proposed User Experience for Handling Multiple Identity Providers in Network Identity Manager 2.0 The current architecture of Network Identity Manager is designed around a single identity provider and
More informationIT S APP BUILDING SEASON HOW ANDROID MARSHMALLOW AFFECTS YOU
IT S APP BUILDING SEASON HOW ANDROID MARSHMALLOW AFFECTS YOU WEBINAR LOGISTICS Today s webinar is being recorded You will be emailed a link to catch up or share with colleagues We welcome you re feedback
More informationMobile Platform Security Architectures A perspective on their evolution
Mobile Platform Security Architectures A perspective on their evolution N. Asokan CARDIS 2012 Graz, Austria November 29, 2012 1 NA, KKo, JEE, Nokia Resarch Center 2011-2012 Introduction Recent interest
More informationAEM Mobile: Setting up Google as an Identity Provider
AEM Mobile: Setting up Google as an Identity Provider Requirement: Prerequisite knowledge Understanding of AEM Mobile Required Products AEM Mobile Google Account Generating the client ID and secret To
More informationClick Studios. Passwordstate. Remote Session Launcher. Installation Instructions
Passwordstate Remote Session Launcher Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise
More informationOptional AnyConnect Configuration and Management
Optional AnyConnect Configuration and Management Modifying and Deleting Connection Entries, page 1 Configuring Certificates, page 2 Specifying Application Preferences, page 5 Using AnyConnect Widgets,
More informationFront End Programming
Front End Programming Mendel Rosenblum Brief history of Web Applications Initially: static HTML files only. Common Gateway Interface (CGI) Certain URLs map to executable programs that generate web page
More informationLecture 3 MOBILE PLATFORM SECURITY
Lecture 3 MOBILE PLATFORM SECURITY You will be learning: What techniques are used in mobile software platform security? What techniques are used in mobile hardware platform security? Is there a common
More informationSoftware Release Communication 02/07/2014. Topics covered. Solutions You Can Count On
Topics covered Vea Web... 2 User Access Changes... 4 Dashboard Sharing... 7 Component Upgrade... 8 System Manager Geocode Function... 9 Installer Changes... 11 VEA WEB The initial version of Vea Web, included
More informationMinne menet, Mobiili-Java?
Minne menet, Mobiili-Java? Java Platform, Micro Edition Status and Future Directions Antero Taivalsaari Sun Microsystems, Inc. December 2005 Growth Continues (2005 vs. 2003) 1 Billion Installed Base as
More informationIntroduction to Cisco UCS Central
Introducing Cisco UCS Central, page 1 Introducing Cisco UCS Central Cisco UCS Central provides scalable management solution for growing Cisco UCS environment. Cisco UCS Central simplifies the management
More informationSoftware Architecture
Software Architecture Does software architecture global design?, architect designer? Overview What is it, why bother? Architecture Design Viewpoints and view models Architectural styles Architecture asssessment
More informationBadgerNet Client Version 2.9.1
BadgerNet Client Version 2.9.1 Revision History 1.0 PGB 01 Nov 2014 Scope of changes 1.1 NDM 21 Nov 2014 Proposed method of implementation 1.2 PGB 19 Dec 2014 Release notes added 1.3 PGB 27 Feb 2015 Added
More informationHOW TO CONFIGURE AND USE A TRAUMACAD PLUG-IN WITH PHILIPS ISITE
HOW TO CONFIGURE AND USE A TRAUMACAD PLUG-IN WITH PHILIPS ISITE This document describes the process of configuring the TraumaCad plug-in inside isite Enterprise or Radiology which allows a user to export
More informationSecure Your First BlackBerry Dynamics App
Hong Kong 2018 Hong Kong 2018 Secure Your First BlackBerry Dynamics App EK Choi, Enterprise Solutions Manager Build Integration Dynamics runtime is for secure mobile and desktop applications Exposes capabilities
More informationSpringCM Release Notes. January 2018
SpringCM Release Notes January 2018 Contents Announcements... 3 Global Navigation header coming in 2018... 3 Redefining the Admin and User Experiences... 4 Workflows... 4 E-Signature Changes... 4 Enhancements...
More informationI, J, K. Eclipse, 156
Index A, B Android PhoneGap app, 158 deploying and running, 172 New Eclipse project, 158 Activity dialog, 162 application properties, 160 AVD, 170 configuration, 167 Launcher Icon dialog, 161 PhoneGap
More informationInferring Required Permissions
for Statically Composed Programs Tero Hasu Anya Helene Bagge Magne Haveraaen {tero,anya,magne}@ii.uib.no Bergen Language Design Laboratory University of Bergen smartphones a security risk for users privacy
More informationSmartphone Platform Security
Smartphone Platform Security What can we learn from Symbian? Craig Heath Independent Security Consultant 15 Jan 2015 Franklin Heath Ltd Discussion Points Was Symbian OS platform security a success? Did
More informationInotera Memories Inc. SSLVPN For Personal User Manual
Inotera Memories Inc. SSLVPN For Personal User Manual Add SSL-VPN Website in Trusted sites Run Internet Explorer, click Tools Internet Options Security Trusted sites Sites Add below sites: https://inovpn.inotera.com
More informationJava Security. Compiler. Compiler. Hardware. Interpreter. The virtual machine principle: Abstract Machine Code. Source Code
Java Security The virtual machine principle: Source Code Compiler Abstract Machine Code Abstract Machine Code Compiler Concrete Machine Code Input Hardware Input Interpreter Output 236 Java programs: definitions
More informationPASSPORTAL PLUGIN DOCUMENTATION
Contents Requirements... 2 Install or Update Passportal Plugin Solution Center... 3 Configuring Passportal Plugin... 5 Client mapping... 6 User Class Configuration... 7 About the Screens... 8 Passportal
More informationTable of contents. Pure ASP Upload 3 Manual DMXzone
Table of contents Table of contents... 1 About Pure ASP Upload 3... 2 Features in Detail... 3 The Basics: Uploading Files with Pure ASP Upload 3... 14 Advanced: Using Pure ASP Upload 3 with Insert Record...
More informationSoftware Architecture With ColdFusion: Design Patterns and Beyond Topics Outline Prepared by Simon Horwith for CFUnderground 6
Software Architecture With ColdFusion: Design Patterns and Beyond Topics Outline Prepared by Simon Horwith for CFUnderground 6 Some Terms: Architecture the manner in which the components of a computer
More informationUser Interface. Technology Domain Roadmap & Strategy. 22 February 2010 Scott Weiss, UI Technology Manager
User Interface Technology Domain Roadmap & Strategy S^3 S^4 22 February 2010 Scott Weiss, UI Technology Manager scottweiss@symbian.org User Interface - Overview Definition The User Interface Domain offers
More informationPerceptive Interact for Salesforce Enterprise
Perceptive Interact for Salesforce Enterprise Installation and Setup Guide Version: 3.x.x Written by: Documentation Team, R&D Date: January 2019 Copyright 2015-2019 Hyland Software, Inc. and its affiliates.
More informationTRAINING GUIDE. Lucity GIS. Web Administration
TRAINING GUIDE Lucity GIS Web Administration Lucity GIS Web Administration Contents Portal Config and SSO... 2 Registering with Portal... 2 Behind the Scenes... 4 Resetting Portal Integration... 5 Single
More informationRuntime monitoring for next generation Java ME platform
Runtime monitoring for next generation Java ME platform Gabriele Costa, Fabio Martinelli, Paolo Mori, Christian Schaefer, Thomas Walter To cite this version: Gabriele Costa, Fabio Martinelli, Paolo Mori,
More informationApple Inc. Apple ios 11 Safari on iphone and ipad Common Criteria Configuration Guide. November Version 1.2
Apple Inc. Apple ios 11 Safari on iphone and ipad Common Criteria Configuration Guide November 2018 Version 1.2 1 Contents 1 Introduction... 4 1.1 Target of Evaluation... 4 1.2 Document Purpose and Scope...
More informationManaging Documents In Your ios Apps
Session #WWDC18 Managing Documents In Your ios Apps 216 Brandon Tennant, Software Engineer Thomas Deniau, Software Engineer Rony Fadel, Software Engineer 2018 Apple Inc. All rights reserved. Redistribution
More informationSalesforce Mobile App URL Schemes
Salesforce Mobile App URL Schemes Version 2, 2 @salesforcedocs Last updated: November 2, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
More informationC1: Define Security Requirements
OWASP Top 10 Proactive Controls IEEE Top 10 Software Security Design Flaws OWASP Top 10 Vulnerabilities Mitigated OWASP Mobile Top 10 Vulnerabilities Mitigated C1: Define Security Requirements A security
More informationVolante NACHA ISO20022 Validator AMI User Guide
Volante NACHA ISO20022 Validator AMI User Guide 1. About Volante NACHA ISO20022 Validator AMI User Guide This document is referenced in the REST Services Deployment Guide. This outlines the available REST
More informationADF Mobile Code Corner
ADF Mobile Code Corner m03. Abstract: Dependent lists is a common functional requirement for web, desktop and also mobile applications. You can build dependent lists from dependent, nested, and from independent,
More informationWebVM Security policy for device API access
WebVM Security policy for device API access December 2008 WebVM in a nutshell a browser plugin provides a way for JavaScript programmers to get access to device APIs supports both websites and widgets
More informationTizen Web Runtime. Ming Jin, Samsung Electronics. (May 8, 2012)
Tizen Web Runtime Ming Jin, Samsung Electronics (May 8, 2012) Contents What is Web Application & Web Runtime Tizen Web Application Packaging & Configuration Network Access Tizen Web Runtime Installer Core
More informationUMHS Financial Systems Workspace & Smart View Templates
Level 1 Password https://findatamgr.dsc.umich.edu/workspace/index.jsp What If I have a blank Homepage? Utilize the Use Current Page button to set the Home Page. Why do I not see the Preview User Point
More informationReview of Mobile Web Application Frameworks
Review of Mobile Web Application Frameworks Article Number: 909 Rating: Unrated Last Updated: Mon, May 9, 2011 at 10:57 AM If you are serious about getting your website or web application mobile-friendly,
More informationRequirements from the Application Software Extended Package for Web Browsers
Requirements from the Application Software Extended Package for Web Browsers Version: 2.0 2015-06-16 National Information Assurance Partnership Revision History Version Date Comment v 2.0 2015-06-16 Application
More informationTizen-Meta as Security and Connectivity Layers For Yocto Project
Tizen-Meta as Security and Connectivity Layers For Yocto Project () dominig.arfoll@fridu.net October 2014 Tizen-Meta What is Tizen How to build Tizen with Yocto tools Which Connectivity is available with
More informationJava Enterprise Edition
Java Enterprise Edition The Big Problem Enterprise Architecture: Critical, large-scale systems Performance Millions of requests per day Concurrency Thousands of users Transactions Large amounts of data
More informationCTC Fails to Start on Windows XP with Cisco Security Agent
CTC Fails to Start on Windows XP with Cisco Security Agent Document ID: 64669 Contents Introduction Prerequisites Requirements Components Used Conventions Problem Solution Related Information Introduction
More informationDeveloping Mobile Applications
Developing Mobile Applications J2ME Java 2 Micro Edition 1 Virtual machines portable apps virtual machine native apps operating system hardware 2 Java - important issues Symbolic language not a random
More informationZephyr Cloud for HipChat
June 25 Zephyr Cloud for HipChat Z e p h y r, 7 7 0 7 G a t e w a y B l v d S t e 1 0 0, N e w a r k, C A 9 4 5 6 0, U S A 1 - Overview How this guide will help Zephyr Cloud for HipChat guide will guide
More informationRead the following information carefully, before you begin an upgrade.
Read the following information carefully, before you begin an upgrade. Review Supported Upgrade Paths, page 1 Review Time Taken for Upgrade, page 1 Review Available Cisco APIC-EM Ports, page 2 Securing
More informationA Top-Down Visual Approach to GUI development
A Top-Down Visual Approach to GUI development ROSANNA CASSINO, GENNY TORTORA, MAURIZIO TUCCI, GIULIANA VITIELLO Dipartimento di Matematica e Informatica Università di Salerno Via Ponte don Melillo 84084
More informationJSR 248: Taking Java Platform, Micro Edition (Java ME) to the Next Level
JSR 248: Taking Java Platform, Micro Edition (Java ME) to the Next Level Kay Glahn Consultant Mobile Service Architecture, Vodafone http://www.vodafone.com Erkki Rysä Technologist Nokia Corporation http://www.nokia.com
More informationUse Cases for Argonaut Project -- DRAFT Page
Use Cases for Argonaut Project -- DRAFT Page 1 Use Cases for Argonaut Project DRAFT V0.3 March 03, 2015 Use Cases for Argonaut Project -- DRAFT Page 2 Introduction The Argonaut Project seeks to rapidly
More informationSharepoint 2010 How Manually Update Web Analytics Workflows Timer Job
Sharepoint 2010 How Manually Update Web Analytics Workflows Timer Job The SharePoint 2010 Timer service (SPTimerv4) runs timer jobs. list depending on installed service pack version and cumulative updates
More informationCYBER RISK CONSULTING. Smartphone Security Issues
CYBER RISK CONSULTING Blackhat Briefings Europe 2004 Smartphone Security Issues May 2004 Luc DELPHA Maliha RASHID 1. Introduction Why smartphones? Functionalities Operating Systems Supported Connectivity
More informationMYOB Exo Business. Release Notes
MYOB Exo Business Release Notes 2019.1 Contents Introduction 1 What s New in this Release?... 1 Installation 2 Pre Install Requirements... 2 Other Requirements... 2 Installing MYOB Exo Business... 2 Post
More informationRequirements and Issues of V**s for Mobile Terminals
Requirements and Issues of V**s for Mobile Terminals Workshop on the Future of Virtual Execution Environments Armonk, NY, USA 15-17.09.2004 Kari Systä Nokia Research Center 1 NOKIA Presentation_Name.PPT
More informationBlackboard Collaborate Launcher for Mac OS X
Blackboard Collaborate Launcher for Mac OS X What Is the Blackboard Collaborate Launcher? The Blackboard Collaborate Launcher is a software application for Mac OS X 10.8.4 and higher. The Launcher provides
More informationIndex LICENSED PRODUCT NOT FOR RESALE
Index LICENSED PRODUCT NOT FOR RESALE A Absolute positioning, 100 102 with multi-columns, 101 Accelerometer, 263 Access data, 225 227 Adding elements, 209 211 to display, 210 Animated boxes creation using
More informationWho am I? Wireless Online Game Development for Mobile Device. What games can you make after this course? Are you take the right course?
Who am I? Wireless Online Game Development for Mobile Device Lo Chi Wing, Peter Lesson 1 Email: Peter@Peter-Lo.com I123-1-A@Peter Lo 2007 1 I123-1-A@Peter Lo 2007 2 Are you take the right course? This
More informationOWASP 5/07/09. The OWASP Foundation OWASP Static Analysis (SA) Track Session 1: Intro to Static Analysis
Static Analysis (SA) Track Session 1: Intro to Static Analysis Eric Dalci Cigital edalci at cigital dot com 5/07/09 Copyright The Foundation Permission is granted to copy, distribute and/or modify this
More informationChris Ainsley. Clean configuration - The foundation of clean code
Chris Ainsley Clean configuration - The foundation of clean code Best time to discover a configuration issue? Runtime Deployment App initialization Build-time Interactively Agenda Current Approaches Issues
More informationReal Application Security Administration
Oracle Database Real Application Security Administration Console (RASADM) User s Guide 12c Release 2 (12.2) E85615-01 June 2017 Real Application Security Administration Oracle Database Real Application
More informationMobile Application Development. Introduction. Dr. Christelle Scharff Pace University, USA
Mobile Application Development Introduction Dr. Christelle Scharff cscharff@pace.edu Pace University, USA Objectives Getting an overview of the mobile phone market, its possibilities and weaknesses Providing
More informationCS378 -Mobile Computing. Intents
CS378 -Mobile Computing Intents Intents Allow us to use applications and components that are part of Android System and allow other applications to use the components of the applications we create Examples
More informationOPC UA Configuration Manager Help 2010 Kepware Technologies
OPC UA Configuration Manager Help 2010 Kepware Technologies 1 OPC UA Configuration Manager Help Table of Contents 1 Getting Started... 2 Help Contents... 2 Overview... 2 Server Settings... 2 2 OPC UA Configuration...
More informationAndroid PC Splash Brothers Design Specifications
Android PC Splash Brothers Design Specifications Contributors: Zach Bair Taronish Daruwalla Joshua Duong Anthony Nguyen 1. Technology background The Android x86 project has been in existence since 2011.
More informationIntel Unite Solution Intel Unite Plugin for WebEx*
Intel Unite Solution Intel Unite Plugin for WebEx* Version 1.0 Legal Notices and Disclaimers All information provided here is subject to change without notice. Contact your Intel representative to obtain
More informationOpenTouch Conversation One 2.2 Contents
OpenTouch Conversation One 2.2 Contents OpenTouch Conversation One 2.2... 1 1. Startup of OpenTouch Conversation One... 2 1. Select your call device or forward your calls... 2 2. Set manually your presence
More informationSecuring OPC UA Client Connections. OPC UA Certificate handling with the OPC Data Client Development Toolkit s EasyOPCUA Client Objects
Securing OPC UA Client Connections OPC UA Certificate handling with the OPC Data Client Development Toolkit s EasyOPCUA Client Objects Page 2 of 16 Table of Contents INTRODUCTION 3 THE SAMPLE CODE AND
More informationAndroid framework. How to use it and extend it
Android framework How to use it and extend it Android has got in the past three years an explosive growth: it has reached in Q1 2011 the goal of 100M of Activations world wide with a number of daily activations
More informationA Generic Adaptive Method for Corruption Mitigation in Trial Monitoring System with Restful Authorization. India)
American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-4, Issue-10, pp-18-22 www.ajer.org Research Paper Open Access A Generic Adaptive Method for Corruption Mitigation
More informationTable of Contents. Introduction... xxi
Introduction... xxi Chapter 1: Getting Started with Web Applications in Java... 1 Introduction to Web Applications... 2 Benefits of Web Applications... 5 Technologies used in Web Applications... 5 Describing
More informationWeb Application Expectations
Effective Ruby on Rails Development Using CodeGear s Ruby IDE Shelby Sanders Principal Engineer CodeGear Copyright 2007 CodeGear. All Rights Reserved. 2007/6/14 Web Application Expectations Dynamic Static
More informationEnterprise Java Unit 1-Chapter 2 Prof. Sujata Rizal Java EE 6 Architecture, Server and Containers
1. Introduction Applications are developed to support their business operations. They take data as input; process the data based on business rules and provides data or information as output. Based on this,
More informationAndroid Essentials with Java
Android Essentials with Java Before You Program o Exercise in algorithm generation Getting Started o Using IntelliJ CE Using Variables and Values o Store data in typed variables Static Methods o Write
More informationThe Future of Real-Time in Spark
The Future of Real-Time in Spark Reynold Xin @rxin Spark Summit, New York, Feb 18, 2016 Why Real-Time? Making decisions faster is valuable. Preventing credit card fraud Monitoring industrial machinery
More informationReview. Designing Interactive Systems II. Review. Base Window System. Apps UITK BWS GEL. 4-Layer Model Graphics and Event Library BWS GEL
Window Manager Base Window System Graphics & Event Library Hardware more abstract, application-/user- Applications User Interface Toolkit Review Designing Interactive Systems II 4-Layer Model Graphics
More informationApplication Fundamentals
Application Fundamentals CS 2046 Mobile Application Development Fall 2010 Announcements CMS is up If you did not get an email regarding this, see me after class or send me an email. Still working on room
More informationSalesforce1 Mobile Security White Paper. Revised: April 2014
Salesforce1 Mobile Security White Paper Revised: April 2014 Table of Contents Introduction Salesforce1 Architecture Overview Authorization and Permissions Communication Security Authentication OAuth Pairing
More informationOracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive Provisioning and Reconciliation
Oracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive Provisioning and Reconciliation atul.goyal@oracle.com Principal Product Manager, Oracle Identity Governance Provisioning Oracle Confidential
More informationOracle Identity Governance 11g R2: Develop Identity Provisioning
Oracle University Contact Us: 20 (0)2 35350254 Oracle Identity Governance 11g R2: Develop Identity Provisioning Duration: 5 Days What you will learn In this intensive course, you'll learn about Oracle
More informationOracle Database. Installation and Configuration of Real Application Security Administration (RASADM) Prerequisites
Oracle Database Real Application Security Administration 12c Release 1 (12.1) E61899-04 May 2015 Oracle Database Real Application Security Administration (RASADM) lets you create Real Application Security
More informationAGENDA. DEX450: Programmatic Development Using Apex and Visualforce. Day One
Day One 15 minutes Introductions 60 minutes Welcome to AW Computing Watch Me 1-1 (5 min): Explore the Certification App Join Me 1-2 (5 min): Prepare Your Training Org Join Me 1-3 (5 min): Create a Sandbox
More informationMICHIEL ROOK DATABASE MIGRATIONS WITHOUT DOWN TIME
MICHIEL ROOK DATABASE MIGRATIONS WITHOUT DOWN TIME @michieltcs Developer, consultant, trainer, speaker @michieltcs ABOUT DATABASE MIGRATIONS ABOUT SCHEMA MIGRATIONS SQL UP @michieltcs UP DOWN @michieltcs
More informationAndroid System Architecture. Android Application Fundamentals. Applications in Android. Apps in the Android OS. Program Model 8/31/2015
Android System Architecture Android Application Fundamentals Applications in Android All source code, resources, and data are compiled into a single archive file. The file uses the.apk suffix and is used
More informationLightweight J2EE Framework
Lightweight J2EE Framework Struts, spring, hibernate Software System Design Zhu Hongjun Session 5: Hibernate DAO Transaction Management and Concurrency Hibernate Querying Batch Processing Data Filtering
More informationWordPress 4.9, "Tipton": Major Customizer Improvements, Code Error Checking, and More!
WordPress 4.9, "Tipton": Major Customizer Improvements, Code Error Checking, and More! Version 4.9 of WordPress, named Tipton in honor of jazz musician and band leader Billy Tipton, is available for download
More informationChapter 17 - Component-based software engineering. Chapter 17 So-ware reuse
Chapter 17 - Component-based software engineering 1 Topics covered ² Components and component models ² CBSE processes ² Component composition 2 Component-based development ² Component-based software engineering
More informationIowa Cycling Project: Testing & Evaluation Plan
IOWA STATE UNIVERSITY Iowa Cycling Project: Testing & Evaluation Plan [Type the document subtitle] Charles Dunbar, Ben Kallal, Ankit Patel, Peter Purcell, Kody Reynolds [Pick the date] [Type the abstract
More informationThis is a known issue (SVA-700) that will be resolved in a future release IMPORTANT NOTE CONCERNING A VBASE RESTORE ISSUE
SureView Analytics 6.1.1 Release Notes ================================= --------- IMPORTANT NOTE REGARDING DOCUMENTATION --------- The Installation guides, Quick Start Guide, and Help for this release
More informationSoftware Development for Mobile Devices
Software Development for Mobile Devices Operating System Diversity Many Operating Systems Google Android Apple ios Microsoft Windows Phone Nokia Symbian Linux RIM BlackBerry OS HP/Palm WebOS BREW Differences
More informationSelftestengine.P questuons P IBM FileNet P8 System Implementation Technical Mastery Test v1
Selftestengine.P2070-055.38 questuons Number: P2070-055 Passing Score: 800 Time Limit: 120 min File Version: 5.2 P2070-055 IBM FileNet P8 System Implementation Technical Mastery Test v1 A questions are
More informationExtend EBS Using Applications Express
Extend EBS Using Applications Express John Peters JRPJR, Inc. Abstract Few people know about Oracle Applications Express (APEX) an actual free Oracle Tool included with your Oracle DB Licenses. How many
More informationConnection Guide for Internal EC Users
Connection Guide for Internal EC Users How can I access the session? In order to access the session please follow the instructions on how to connect from page 2 of this document. Test your session! Please
More informationGetting the Most from Eclipse
Getting the Most from Eclipse Darin Swanson IBM Rational Portland, Oregon Darin_Swanson@us.ibm.com March 17, 2005 What is Eclipse An extensible tools platform Out-of-box function and quality to attract
More informationsetup.exe file must be run locally. The setup.exe file was easy to find, in the LumiraTeamServer subfolder.
Lumira Edge Install As a moderately experienced user of SAP Lumira Desktop, I am knowledgeable in the utility and functionality that it provides. It is ideal for manipulating, editing, and formatting data
More informationVMware AirWatch Chrome OS Platform Guide Managing Chrome OS Devices with AirWatch
VMware AirWatch Chrome OS Platform Guide Managing Chrome OS Devices with AirWatch AirWatch v9.3 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationSecurity and privacy in your embedded systems
Security and privacy in your embedded systems Strong isolation of applications using Smack and Cynara José Bollo security at IoT.bzh jose.bollo@iot.bzh IoT.bzh Specialized on Embedded & IoT Contributing
More information