官术网_书友最值得收藏!

Chapter 3. Permissions

Permissions are the focus of this chapter. They are an integral part of an Android application and almost all application developers and users will encounter them at one time or the other. As we discussed in Chapter 1, Android Security Model – the Big Picture, install time application review is the most important security gate. This step is an all or nothing decision by the user; a user either accepts all the listed permissions or declines to download the app. So, as a user of an Android phone, it is important to understand permissions to make prudent decisions about which application to install. Permissions form the basis for securing components and protecting user data.

This chapter begins with an introduction of an existing permission in the Android system. We discuss the four permission protection levels namely Normal, Dangerous, Signature, and SignatureOrSystem. Then, we will discuss about how to secure an application and its components using permissions. Next, we learn how to extend the permission model by adding user defined permissions. This section will discuss permission groups, permission trees, and the syntax to create a new permission in the manifest file.

主站蜘蛛池模板: 永新县| 原阳县| 行唐县| 宝兴县| 黄大仙区| 宜都市| 达孜县| 岑巩县| 高要市| 北海市| 临湘市| 郓城县| 和龙市| 搜索| 尉犁县| 乌什县| 乌拉特中旗| 仪征市| 南郑县| 汶上县| 和顺县| 丹巴县| 晋城| 银川市| 广东省| 达孜县| 阳曲县| 太康县| 连南| 荣成市| 陆川县| 德清县| 香格里拉县| 花垣县| 大化| 明星| 黑龙江省| 梁山县| 资中县| 育儿| 南投市|