摘要 |
Controlling access to secure resources (316) of a data processing system (300) is provided. An input-to-output mapping (336, 600) of an application (306) installed on the data processing system (300) is generated that determines whether a secure resource (316) in the data processing system (300) is shared with an external entity (326, 328) associated with the application (316) and under what specified conditions (334, 700) (802). It is determined whether the specified conditions exist during runtime of the application (806). |