[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
C# syntax, converting to Visual Basic syntax
call stack
2nd
[See also stack walk] CanTransformMultipleBlocks property
CAS (code-access security) application domains and
ASP.NET and
classes
code-access permissions
Code-Access Security Policy tool
enforcing
evidence
extensions, assembly trust and
isolated storage and
.NET Framework Configuration tool
overview
permissions
assembly scope attributes
attribute class definitions
creating custom
dll creation
enforcing security
example custom class
example custom class definition
example custom class enumeration
IPermission interface
ISecurityEncodable interface
IUnrestrictedPermission interface
overview
Permissions View tool
security policy
statements imperative security
overview
turning on/off
user policy level
Windows security and
case sensitivity, C#
Caspol.exe
2nd
CAS, turning on/off
execution permission checks, turning on/off
forcing securing changes
isolated storage security
policy evaluation
policy level administration
code groups
fully trusted assemblies
named permission sets
target code group
resetting policies
catalogue (COM+), viewing
CBC (Cipher Block Chaning) cipher mode
Certificate Creation tool
certificates publisher
X509, creating
CFB (Cipher Feedback) cipher mode
Check method
IMembershipCondition interface
CheckExecutionRights property
child code groups (security policies)
Children property, CodeGroup objects
Cipher Block Chaining (CBC) cipher mode
Cipher Feedback (CFB) cipher mode
cipher functions
2nd
[See also algorithms] block padding
CFB (Cipher Feedback)
cipher block chaining
ECB
XTEA
cipher modes
CFB (Cipher Feedback)
Cipher Block Chaining (CBC)
ECB (Electronic Codebook)
symmetric algorithms, configuring
ciphertext
class hierarchies (quick-reference)
class libraries, trust levels
classes AsymmetricAlgorithm
AsymmetricExchangeDeformatter
AsymmetricExchangeFormatter
AsymmetricSignatureDeformatter
AsymmetricSignatureFormatter
attribute, defining
AuthorMembershipCondition example
C#/Visual Basic syntax
code-access permission
custom membership condition
defining
ElGamalOAEKeyExchangeFormatter
ElGamalOAEPKeyExchangeDeformatter
ElGamalPKCS1SignatureFormatter
ElGamalSignature
Evidence
evidence implementation
standard evidence classes
Hash class
identity permission
IMembershipCondition interface and
namespace quick reference and
.NET Framework, COM+ and
permission attribute
permission statements
permissions, programming considerations
RandomNumberGenerator
SecurityElement
signature formatter classes, digital signatures
SignedXML
Site class
StrongName
Url
XMLDSIG
Zone
classesPublisher
client certificate authentication, IIS
CloseDefect method
CLR (Common Language Runtime) application domains
2nd
configuration
evidence
identity
security policy and
application execution and
ASP.NET applications
runtime
evidence application domains
assemblies
identities, application domains
Internet Explorer and
non-type-safe code
operating system, shell command execution
security policy, application domains and
type-safe code
verification, application deployment and
Code Access Security Policy tool
code groups
attributes, policy resolution
Caspol.exe and
Code-Access Security Policy tool and
creating
2nd
3rd
creating manually
importing, from file selects
membership conditions, programming
named permission sets and
policy levels
policy statements, programming
code-access security
[See CAS] Code-Access Security Policy tool
2nd
code-access security, turning on/off
execution permission checks, turning on/off
forcing security changes
2nd
policy level administration
code groups
fully trusted assemblies
named permission sets
target code group
resetting policies
CodeAccessPermission class interfaces
methods
removing stack walk overrides
CodeAccessSecurityAttribute class
CodeGroup class
methods and properties
COM+
application management
application roles, populating
application types
specifying
applications, installing
attributes ApplicationAccessControl
ComponentAccessControl
SecureMethod
SecurityRole
catalogue, viewing
component management
configuration
Maeshaller role
PAS (process-access security) authentication
impersonation
RBS (role-based security)
compatibility with .NET role-based security
roles, scope
serviced components, creating
command line, Code-Access Security Policy tool
compiling assemblies
creating
GAC and
2nd
decompiling
assemblies
protecting against
Component Services explorer (COM+)
ComponentAccessControl attribute (COM+)
ComputeHash method
streamed data
ComputeSignature method
confidentiality cryptography
symmetric encryption
configuration application domains
ASP.NET files
<location\\> element
logon page
security-related configuration elements
COM+
forms authentication
IIS authentication modes
security policy
2nd
SecurityPermissionAttribute class, properties
shared assemblies and
symmetric algorithms cipher modes
Key and IV properties
KeySize and BlockSize properties
WindowsPrincipal class
configured classes (COM+)
ControlDomainPolicy permission
ControlEvidence permission
System.Security.SecurityException
ControlPolicy permission
Copy method
IPermission interface
cracker (roles)
Create method hashing algorithms
SymmetricAlgorithm class
CreateDecryptor method
CreateDirectory method
CreateEncryptor method
2nd
CreateEventSource method, registering event sources
CreateFromUrl factory method
CreateKeyExchange method
CreateKeyPair method
CreateNewDefect method
CreatePermission method
CreateSignature method
credentials, RBS and
cryptanalysis
Crypto API (Windows)
cryptographic hash code
cryptographic key pairs
cryptographic keys complexity
CreateKeyExchange method
creating algorithm classes and
key-derivation protocol
random number generator and
ElGamal encryption functions
ElGamalOAEPKeyExchangeFormatter class
key exchanges, encryption
overview
persistence
session keys
encryption
symmetric algorithms
symmetric key exchange
Cryptographic Service Provider (CSP)
cryptography
2nd
attacks on, types of
authentication
birthday attacks
brute force attacks
confidentiality
hash functions
hashing algorithms
creating
hash code lengths
message size limits
integrity
key management
message collisions
software weaknesses
Cryptography.DSA class CreateSignature method
VerifySignature method
CryptoStream class
XTEA (Extended Tiny Encryption Algorithm)
CSP (Cryptographic Service Provider)
CurrentPrincipal property, IPrincipal interface
custom event logs, creating
custom evidence Author assembly
constructors
creating
identity permissions
immutability
Object.ToString method
serializing
uses
custom runtime hosts
|