You are viewing an old version of this page. View the current version.
Compare with Current
View Page History
Version 1
Current »
- Technical proposals - further refinement
- Decision point: Which design to use (develop), or at least prioritize
- ....Decide how the application layer should be fusing the connection - direct socket connection or bound through android service.
- Security design
- Vectors of attack
- Access control and permissions
- How to verify permissions
- Build connection VSS to Android permissions model
- External service approach = different authentication method and access control groups
- VSS layers can be used to put signals into access control groups
- Different users could have different permissions? Or is this only controlled based on application identity?
- For example audio zones... Some users should not be able to control the audio.
- But can this simply be built into the application?
- Use cases and general requirements
- E.g. How fine grained must the permissions model be?
-