Editing Maemo security
Warning: You are not logged in.
Your IP address will be recorded in this page's edit history.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 17: | Line 17: | ||
==Is there a diagram showing the security framework and components?== | ==Is there a diagram showing the security framework and components?== | ||
- | See [http://www.slideshare.net/peterschneider/maemo-6-platform-security slide] #2, #5 and #9 of Elena Reshetova's [[Maemo Summit 2009/Day 3#Maemo_Platform_Security:_Principles_and_Concepts | Maemo Summit presentation]] | + | See [http://www.slideshare.net/peterschneider/maemo-6-platform-security slide] #2, #5 and #9 of Elena Reshetova's [http://goo.gl/Dg36c youtube] [http://goo.gl/16GT5 idm] [[Maemo Summit 2009/Day 3#Maemo_Platform_Security:_Principles_and_Concepts | Maemo Summit presentation]] |
Elena Reshetova: The presentation was [http://www.slideshare.net/peterschneider/maemo-6-platform-security uploaded], and currently it is the only information, which I can share. | Elena Reshetova: The presentation was [http://www.slideshare.net/peterschneider/maemo-6-platform-security uploaded], and currently it is the only information, which I can share. |
Learn more about Contributing to the wiki.