Home | History | Annotate | Download | only in overview

Lines Matching full:applications

28   facility to enable secure communication between applications running in
33 application from harming other applications, the Android system, or the device
69 (including the traditional Linux configuration), where multiple applications
72 between applications and the system at the process level through standard Linux
73 facilities, such as user and group IDs that are assigned to applications. By
74 default, applications cannot interact with each other and applications have
82 native code and to operating system applications. All of the software above the
84 framework, application runtime, and all applications, run within the Application
91 lead to corruption in other applications housed in the same memory space,
93 applications and their resources are sandboxed at the OS level, a memory
102 libraries, application runtime, application framework, and applications. This
104 third-party applications may be launched manually by the device owner but are
110 applications, files created by one application cannot be read or altered by
136 <p> Android provides a set of cryptographic APIs for use by applications. These
142 class to allow applications to use the system credential storage for private
146 applications run with root permissions. Android does not prevent a user or
149 applications and all application data. Users that change the permissions on an
150 Android device to grant root access to applications increase the security
151 exposure to malicious applications and potential application flaws. </p>
156 root access for purposes of debugging applications and system components or to
157 access features not presented to applications by Android APIs. </p>
165 data from root users. Applications can add a layer of data protection using
212 <p>In addition to use in applications included with the Android system, these APIs