[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
ParseHashCodeString method
parsing, hash codes
PAS (process-access security), COM+ authentication
impersonation
Passport authentication
permission attribute classes
permission classes CAS statements
programming
class functionality
SecurityPermission class
serialization
permission demands
Demand statement
InheritanceDemand statement
LinkDemand statement
permission objects, named permission sets
permission requests minimum
optional
refusing
types
permission sets creating
named programming considerations
security policies
security policy code groups
Permission Settings dialog box
permissions
application domain policies, programming considerations
CAS and
ControlEvidence
creating custom
assembly scope attributes
attribute class definitions
dll creation
enforcing security
example
example class definition
example enumeration
IPermission interface
ISecurityEncodable interface
IUnrestrictedPermission interface
grant set
granting
identity permissions, custom evidence
isolated storage
named permission sets
.NET Framework Configuration tool and
creating manually
PrincipalPermission class, RBS demands
requesting
security policies and
types code-access
identity
overview
Permissions View tool, CAS
Permissions View tool, declarative security statements and
PermissionSet class
PermissionSetAttribute class
PermissionState enumeration
2nd
PermitOnly operations, security demands and
Permview.exe
persistence, cryptographic keys
PKCS #! signature-formatting protocol
PKCS #1 Helper class
PKCS #7 padding
PKCS (Public Key Cryptography Standard)
plaintext, encrypting
policies
application domain, programming considerations
assemblies, fully trusted
AuthorMembershipCondition assembly
AuthorMembershipCondition example class
implementing
code groups
configuration
2nd
custom membership condition classes
levels
assembly trust and
manually editing
named permission sets
policy administration
policy evaluation, Caspol.exe and
policy files
enterprise policy level
fully trusted assemblies
machine policy code groups
named permission sets
policy levels
Caspol.exe and
code groups
Code-Access Security Policy tool and
named permission sets and
targeting
policy resolution
2nd
3rd
code group attributes
granting permissions
policy statements code groups, programming considerations
programming
PolicyHierarchy method
PolicyLevel class members
programming considerations
code group tree management
fully trusted assemblies
named permission sets
PolicyStatementAttribute enumeration
prime numbers, key generation and
principal policy, IPrincipal interface
PrincipalPermission class constructors
imperative RBS demands
RBS demands and
PrincipalPolicy enumeration
principals, .NET RBS
private assemblies
private keys
importance of
ProcessData method
ProcessDataBlock method
ProcessFinalDataBlock method
<processModel\\> element, ASP.NET worker processes
userName attribute
programmer (roles)
programming application types (COM+), specifying
AuthorMembershipCondition example assembly
AuthorMembershipCondition example class
implementing
CAS permissions assembly scope attributes
attribute class definitions
custom
dll creation
enforcing security
example custom class
example custom class definition
example custom class enumeration
IPermission interface
ISecurityEncodable interface
IUnrestrictedPermission interface
code groups
2nd
membership conditions
policy statements
COM+ ApplicationAccessControl attribute
ComponentAccessControl attribute
SecureMethod attribute
SecurityRole attribute
custom membership conditions
DefectTracker interface
digital signatures
ElGamal algorithm abstract cipher function class definition
abstract class definition
decryption class definition
encryption class definition
implementation class definition
ELS custom event logs
monitoring event logs
querying
reading event logs
registering event sources
writing events
hash codes generating
generating from streamed data
hashing algorithms, instantiating
implementation classes, hashing algorithms
keyed hashing algorithms
block cypher hash codes
creating keyed hash codes
HMAC standard
instantiating
.NET Framework
multi-file assemblies, writing in different languages
permission classes
class functionality
SecurityPermission class
permission demands
Demand statement
InheritanceDemand statement
LinkDemand statement
permission sets
PolicyLevel class
code group tree management
fully trusted assemblies
named permission sets
SecurityManager class
serviced components (COM+), creating
store directories
SymmetircAlgorithm class, instantiating
XTEA abstract classes
ICryptoTransform interface
implementation classes
XTEAManagedDecryptor class
XTEAManagedEncryptor class
project architect (roles)
properties ApplicationAccessControl attribute (COM+)
AsymmetricAlgorithm class
C#/Visual Basic syntax
CodeGroup class
EventLog class
EventLogEntryCollection class
Evidence property
HashAlgorithm class
ICryptoTransform interface
LoadAndList
RSA class
RSACryptoServiceProvider class
SecurityManager class
SecurityPermissionAttribute class
SecurityRole attribute
symmetric algorithms Key and IV
KeySize and BlockSize
SymmetricAlgorithm class
protected page, ASP.NET applications
protocols ElGamal key generation
key generation asymmetric encryption
RSA algorithm
public key cryptography
public key encryption
[See asymmetric encryption] public key token
public keys
assembly strong names
asymmetric encryption
delayed signing and
viewing
publisher certificates
Publisher class
Publisher evidence, application domains, assigning to
|