You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Current »

  • Technical proposals - further refinement
    • 1
    • 2
    • 3
  • Decision point:  Which design to use (develop), or at least prioritize
  • ....Decide how the application layer should be fusing the connection - direct socket connection or bound through android service.

  •  Security design 
    • Vectors of attack
    • Access control and permissions
    • How to verify permissions
    • Build connection VSS to Android permissions model
    • External service approach = different authentication method and access control groups
    • VSS layers can be used to put signals into access control groups

    • Different users could have different permissions?  Or is this only controlled based on application identity?
      • For example audio zones...  Some users should not be able to control the audio.
        • But can this simply be built into the application?
  • Use cases and general requirements
    • E.g. How fine grained must the permissions model be?
  •  


  • No labels