O'Reilly logo

Pro Android 3 by Sayed Y. Hashimi, Dave MacLean, Satya Komatineni

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Exploring Security and Permissions

In this chapter, we are going to talk about Android's application-security model, which is a fundamental part of the Android platform. In Android, security spans all phases of the application life cycle—from design-time policy considerations to runtime boundary checks. You'll learn Android's security architecture and understand how to design secure applications.

Let's get started with the Android security model.

Understanding the Android Security Model

In this first section, we're going to cover security during the deployment and execution of the application. With respect to deployment, Android applications have to be signed with a digital certificate in order for you to install them onto a device. With ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required