[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
SavePolicy method
scope, COM+ roles
secret data, isolated storage and
secret key encryption
[See symmetric encryption] secrets
application design
secure applications definition
deployment
design
failure
development
execution
monitoring
restricted resources
secrets
security testing
trust levels
2nd
Secure Hash Algorithm (SHA)
SecureMethod attribute
SecureMethod attribute (COM+)
security cryptographic key pairs
end-to-end
need for
runtime security, application domains and
shared assemblies
security demands CAS and
imperative security statements
principles of operation
stack walks
Assert operations
Deny operations
overriding
PermitOnly operations
reverting overrides
Security log (ELS)
security policy
[See policies] application domains and
CAS and
CLR, application domains
levels
policy levels
policy resolution and
security tester
security testing, applications
SecurityAction enumeration
2nd
SecurityElement class
SecurityEnabled property
SecurityException, Assert operations and
SecurityManager class programming considerations
SecurityPermission class implementing
SecurityPermissionAttribute class configuration properties
SecurityPermissionFlag enumeration
SecurityProTracker (COM+), populating application roles
SecurityProTracker class
SecurityRole attribute (COM+)
SecurityRole attribute, properties
seed data, symmetric encryption
seed values, hashing algorithms
Serializable attribute
serialization custom membership condition classes
evidence
permission classes
server applications, COM+
serviced components
creating
ServicedComponent class
services, resource restrictions
session keys, crytopgraphy
session keys, encryption
SetAppDomainPolicy method
SetEveryoneAccess property
SetThreadPrincipal method
SHA (Secure Hash Algorithm)
SHA1CryptoServiceProvider algorithm
shallow copies, collection objects
shared assemblies
sharing data, isolated storage and
side-channel attacks
Sign method
signature formatter classes
signature function digital signatures and
RSA protocol
SignatureAlgorithm property
Signcodex scheme
SignData method
signed documents, altering
SignedXML class, XMLDSIG
SignHash method
signing authorities, delayed signing support for assemblies
single-file assemblies
creating
delayed signing and
Site class
sn.exe
Software Publisher's Certificate (SPC)
software, resource restrictions
SPC (Software Publisher's Certificate)
stack frames
stack walks
imperative security statements
overriding
2nd
Assert operations
Deny operations
PermitOnly operations
reverting
standard evidence classes
statement terminator (C#)
statements, CAS declarative security
imperative security
overview
storage, isolated storage
stores deleting
directories, creating
isolated storage
Strong Name tool
strong names assemblies
creating
specifying key pair
version and culture data
delayed signing and
multi-file assemblies, creating
verifying
strong-named assemblies, serviced components (COM+)
StrongName class
constructors
StrongNameMembershipCondition objects
structs, namespace quick reference and
structures, C#/Visual Basic syntax
subversion resources, application domains
symmetric algorithms configuring cipher modes
Key and IV properties
KeySize and BlockSize properties
cryptographic keys and
instantiating
symmetric encryption
2nd
block padding
cipher modes
encrypted data, creating
initialization vector
key lengths
.NET Framework algorithms
symmetric key exchange, cryptographic keys
SymmetricAlgorithm class
encrypting and decrypting data
methods and properties
system administrator (roles)
system administrator, application deployment and
System log (ELS)
System.Security.Policy namespace, evidence classes
System.String argument, Site class constructor
|