Blackberry ENTERPRISE SOLUTION SECURITY - SECURITY FOR DEVICES WITH BLUETOOTH WIRELESS TECHNOLOGY - TECHNICAL Uživatelská příručka Strana 9

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 189
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 8
Specifying the resources that applications can access on a device....................................................................................162
Using application control policy rules to control the resources that applications can access on a smartphone.............162
How code signing controls the resources that applications can access on a smartphone............................................ 166
Permitting an application to encode data on a smartphone...............................................................................................167
Removing applications that a user installed when a user deletes all smartphone data........................................................167
Removing add-on applications from a device....................................................................................................................168
Controlling which applications can access NFC features on a device.................................................................................168
Controlling which applications can access the secure element on a device........................................................................169
20 RIM Cryptographic API................................................................................................................. 170
Cryptographic algorithms and cryptographic codes that the RIM Cryptographic API supports............................................170
Symmetric block algorithms that the RIM Cryptographic API supports........................................................................170
Stream encryption algorithms that the RIM Cryptographic API supports..................................................................... 171
Asymmetric encryption algorithms that the RIM Cryptographic API supports..............................................................171
Key agreement scheme algorithms that the RIM Cryptographic API supports............................................................. 171
Signature scheme algorithms that the RIM Cryptographic API supports......................................................................172
Key generation algorithms that the RIM Cryptographic API supports...........................................................................172
Message authentication codes that the RIM Cryptographic API supports....................................................................173
Message digest codes that the RIM Cryptographic API supports.................................................................................173
TLS and WTLS protocols that the RIM Cryptographic API supports ................................................................................... 173
Cipher suites for the key establishment algorithm that the RIM Cryptographic API supports ....................................... 174
Symmetric algorithms that the RIM Cryptographic API supports ................................................................................ 174
Hash algorithms that the RIM Cryptographic API supports .........................................................................................175
Limitations of RIM Cryptographic API support for cipher suites for the key establishment algorithm .................................. 175
21
Related resources.........................................................................................................................176
22 Glossary....................................................................................................................................... 179
23 Legal notice .................................................................................................................................187
Zobrazit stránku 8
1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 188 189

Komentáře k této Příručce

Žádné komentáře