[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
random number generator, cryptographic key creation
RandomNumberGenerator class
RBS (role-based security) authentication
authority
authorization
COM+
credentials
demands
declarative statements
imperative demands
PrincipalPermission class
generic implementation
identities
IIdentity interface
2nd
IPrincipal interface
2nd
CurrentPrincipal property
IPrincipal object
PrincipalPolicy enumeration
overview
roles
Windows implementation
impersonating Windows users
WindowsIdentity class
WindowsPrincipal class
Windows security comparison
RC2 algorithm
reading files, isolated storage
references, XML documents, XMLDSIG signatures and
RegistryPermission object
Remove method, isolated storage
RemoveFullTrustAssembly method
RemoveNamedPermissionSet method
reports, analysis
RequestMinimum statement
RequestOptional statement
RequestRefuse statement
requests permission, types
requiring trust
Resolve method, CodeGroup class
ResolveMatchingCodeGroups method
ResolvePolicy method
ResolvePolicyGroup method
restricted resources
trust
restricted resources, application domains external resources
functional resources
subversion resources
trust levels and
Rijndael algorithm
roaming-profiles, isolated storage and
role-based permissions
role-based security
2nd
[See RBS] overview
trust levels and
roles architect
business sponsor
cracker
programmer
RBS and
security tester
system administrator
user
roles (COM+), scope
RSA
RSA algorithm
decrypting data
encrypted data creation
encrypted data creation, data padding
key generation protocol
key length
keys, implementing
signature function
RSA class properties and methods
RSACryptoServiceProvider class
encrypting and decrypting data
instantiating
keys, implementing
properties and methods
RSAParameters structure
RSAParameters structure members
runtime custom runtime hosts
security, application domains and
runtime security native code
overview
unverifiable code
|