Confirmed users
717
edits
mNo edit summary |
mNo edit summary |
||
| Line 17: | Line 17: | ||
How should apps with "special" privileges be managed (identified, discovered, installed, updated)? Do they require a different security model? | How should apps with "special" privileges be managed (identified, discovered, installed, updated)? Do they require a different security model? | ||
What restrictions should exist for code and content importing for apps? | What restrictions should exist for code and content importing for apps (remote to local, cross-domain)? | ||
Which types of applications need to be signed? (if so how, and what will be signed?) | Which types of applications need to be signed? (if so how, and what will be signed?) | ||