Lines Matching full:applications
26 <h2 id="elements-of-applications">Elements of Applications</h2>
29 applications are most often written in the Java programming language and run in
30 the Dalvik virtual machine. However, applications can also be written in native
31 code. Applications are installed from a single file with the .apk file
66 <p>All applications on Android run in an Application Sandbox, described earlier in this document.
76 sensitive APIs are intended for use by trusted applications and protected
98 of the permissions granted to the application, and applications that are
103 <p>Within the device settings, users are able to view permissions for applications
113 Applications may declare their own permissions for other applications to use.
116 user is to be informed of applications requiring the permission, or who is
121 intents, that are not available to third-party applications, but that may be
122 used by applications pre-installed by the OEM. These permissions use the
124 <h2 id="how-users-understand-third-party-applications">How Users Understand Third-Party Applications</h2>
126 third-party applications and inform the user of the capabilities those
127 applications have. Prior to installation of any application, the user is shown
135 the application to other alternative applications.</p>
137 permission at the start of each session or while applications are in use. The
138 vision of Android is to have users switching seamlessly between applications at
154 information about applications easily accessible to a wide range of users. For
172 <strong>Figure 1.</strong> Display of permissions for applications
204 that other applications have exposed via a ContentProvider, and an application
216 permission to third-party applications requesting use of cost sensitive APIs.
232 information (contacts) on the SIM card memory. Applications also cannot access
238 data within third-party applications installed by users. Applications that
240 protect the data from third-party applications.</p>
254 <p>Any applications which collect personal information will, by default, have that
256 make the data available to other applications though IPC, the application
261 applications to interact with the surrounding environment, such as camera,
272 disable location based services for all applications on the user's device.</p>
277 <p>By default applications do not have access to operating system logs,
314 signed by the developer. Applications that attempt to install without being
323 id is associated with which application; different applications run under
332 <p>Applications can be signed by a third-party (OEM, operator, alternative market)
335 Applications do not have to be signed by a central authority. Android currently
337 <p>Applications are also able to declare security permissions at the Signature
338 protection level, restricting access only to applications signed with the same
341 feature</a> where two or more applications signed with same developer key can
345 enable ?Verify Apps" and have applications evaluated by an application verifier
351 applications manage rights-protected content according to the license
359 <p>A DRM framework API, which is exposed to applications through the Android
360 application framework and runs through the Dalvik VM for standard applications.</p>