Home | History | Annotate | Download | only in security

Lines Matching full:apis

239 development framework, set of APIs, or language in order to enforce security.
303 built-in Android Email application uses the APIs to improve Exchange support.
309 In addition to use in applications included with the Android system, these APIs
364 access features not presented to applications by Android APIs.
436 ##The Android Permission Model: Accessing Protected APIs
444 capabilities are restricted by an intentional lack of APIs to the sensitive
448 sensitive APIs are intended for use by trusted applications and protected
451 These protected APIs include:
461 of the protected APIs on the device, an application must define the
487 installed while requesting access to protected APIs is shown in *Figure 2*.
603 ##Cost-Sensitive APIs
606 the network. The Android platform has placed cost sensitive APIs in the list of
607 protected APIs controlled by the OS. The user will have to grant explicit
608 permission to third-party applications requesting use of cost sensitive APIs.
609 These APIs include:
623 (RIL). The RIL provides no high level APIs for these commands.
627 Android has placed APIs that provide access to user data into the set of
628 protected APIs. With normal usage, Android devices will also accumulate user
634 APIs](images/image03.png)
637 APIs*