Contact Tizen developers to identify: - custom and implemented capabilities - current sources of policy and criteria for security decision making
Contact Tizen developers to identify: