[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
abstract cipher function classes, ElGamal algorithm
abstract classes ElGamal algorithm
hashing algorithms
XTEA
access modifiers, C# and Visual Basic
access tokens, Windows security
activation records
AddFullTrustAssembly method
AddNamedPermissionSet method
Adler32 algorithm
administration, shared assemblies and
al.exe
algorithm classes, cryptographic key creation
algorithms
[See also cipher functions] asymmetric security of
asymmetric encryption
ELGamal
abstract cipher function class definition
abstract class definition
BigInteger class
decryption class definition
encryption and decryption functions
encryption class definition
implementation class definition
key generation protocol
ElGamal, testing
encryption
.NET Framework, symmetric encryption
RSA
encrypted data creation
key length
signing algorithm, XMLDSIG
symmetric cipher modes
instantiating
Key and IV properties
KeySize and BlockSize properties
symmetric algorithms, cryptographic keys
XTEA (Extended Tiny Encryption Algorithm)
2nd
abstract class definition
ICryptoTramsform interface
implementation class definition
XTEAMAnagedDecryptor class
XTEAMAnagedEncryptor class
AllowPartiallyTrustedCallers attribute
Anakrino/Exemplar decompiler
anonymous access, IIS authentication
APIs (application programming interfaces), Windows Crypto API
AppDomain class, evidence
application domain policy level
application domains application isolation and
assembly loading, evidence
assembly management and
CAS and
CLR and
configuration
evidence
evidence assigning
identity and
isolated storage
isolated storage and
overview
Publisher evidence
restricted resources, trust levels and
runtime security and
security policy and
application isolation applications domains and
.NET Framework
Application log (ELS)
application proxies, COM+
application resources (assemblies)
application roles (COM+), populating
application types (COM+), specifying
ApplicationAccessControl attribute (COM+)
ApplicationDirectory class
applications COM+ installing
management
COM+ types
deployment
execution
monitoring
secure applications
[See secure applications] security testing
architect (roles)
ASP.NET authentication
Forms authentication
IIS
impersonation and
Passport authentication
protected page
turning off
Windows
authorization file authorization
URL authorization
CAS and
CLR and
configuration files
<location\\> element
logon page
security-related elements
impersonation
security, overview
Web.config file
worker processes
<processModel\\> element
assemblies application domain and
application domain policies, programming considerations
Author assembly, trust
AuthorMembershipCondition example
compiling
GAC and
creating
multi-file
single file
declarative security statements, Permissions View tool
decompiling
delayed signing support
evidence assigning
assigning to
embedding in assemblies
permissions
viewing
fully trusted
deleting from list
.NET Framework Configuration tool and
programming considerations
fully trusted assemblies
GAC (Global Assembly Cache)
installing into
uninstalling from
identity, evidence and
installing
isolated storage and
loading, evidence
minimum permission requests
multi-file, distributing
optional permission requests
overview
permissions
policy resolution
private compared to shared
publisher certificates
refusing requests
scope attributes
shared
strong named, serviced components (COM+) and
strong names
creating
specifying key pairs
verifying
version and culture metadata
type-safe code
Assembly class, evidence
assembly evidence
2nd
Assembly Linker tool
assembly manifest
AssemblyCulture attribute
AssemblyDelaySign attribute
assemblyEvidence argument, Evidence class
AssemblyKeyFile attribute
2nd
AssemblyKeyName attribute
AssemblyVersion attribute
Assert operations, security demands and
assigning
asymmetric algorithms signature function
verification function
asymmetric encryption
2nd
algorithm security
decrypting data
digital signatures
ElGamal algorithm
encrypted data creation
data padding
keys, creating
AsymmetricAlgorithm class
2nd
digital signatures
key-related properties
properties and methods
AsymmetricExchangeDeformatter class
AsymmetricExchangeFormatter class
AsymmetricSignatureDeformatter class
AsymmetricSignatureFormatter class
attribute classes defining
attributes ApplicationAccessControl (COM+)
assembly scope
code group, policy resolution
ComponentAccessControl (COM+)
declarative security statements
SecureMethod (COM+)
security policy code groups
SecurityRole (COM+)
AttributeUsage attribute
authentication
ASP.NET
Forms authentication
impersonation and
Passport authentication
turning off
Windows
COM+ process-access security (PAS)
cryptography
IIS anonymous access
basic authentication
client certificate authentication
digest authentication
impersonation and
integrated Windows authentication
mode configuration
RBS and
Authentication Methods window, Internet Service Manager
Author assembly, trust
Author evidence class
2nd
authority, RBS
authorization
ASP.NET file authorization
URL authorization
RBS and
<authorization\\> element
|