[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] abstract cipher function classes, ElGamal algorithm abstract classes ElGamal algorithm hashing algorithms XTEA access modifiers, C# and Visual Basic access tokens, Windows security activation records AddFullTrustAssembly method AddNamedPermissionSet method Adler32 algorithm administration, shared assemblies and al.exe algorithm classes, cryptographic key creation algorithms [See also cipher functions] asymmetric security of asymmetric encryption ELGamal abstract cipher function class definition abstract class definition BigInteger class decryption class definition encryption and decryption functions encryption class definition implementation class definition key generation protocol ElGamal, testing encryption .NET Framework, symmetric encryption RSA encrypted data creation key length signing algorithm, XMLDSIG symmetric cipher modes instantiating Key and IV properties KeySize and BlockSize properties symmetric algorithms, cryptographic keys XTEA (Extended Tiny Encryption Algorithm) 2nd abstract class definition ICryptoTramsform interface implementation class definition XTEAMAnagedDecryptor class XTEAMAnagedEncryptor class AllowPartiallyTrustedCallers attribute Anakrino/Exemplar decompiler anonymous access, IIS authentication APIs (application programming interfaces), Windows Crypto API AppDomain class, evidence application domain policy level application domains application isolation and assembly loading, evidence assembly management and CAS and CLR and configuration evidence evidence assigning identity and isolated storage isolated storage and overview Publisher evidence restricted resources, trust levels and runtime security and security policy and application isolation applications domains and .NET Framework Application log (ELS) application proxies, COM+ application resources (assemblies) application roles (COM+), populating application types (COM+), specifying ApplicationAccessControl attribute (COM+) ApplicationDirectory class applications COM+ installing management COM+ types deployment execution monitoring secure applications [See secure applications] security testing architect (roles) ASP.NET authentication Forms authentication IIS impersonation and Passport authentication protected page turning off Windows authorization file authorization URL authorization CAS and CLR and configuration files <location\\> element logon page security-related elements impersonation security, overview Web.config file worker processes <processModel\\> element assemblies application domain and application domain policies, programming considerations Author assembly, trust AuthorMembershipCondition example compiling GAC and creating multi-file single file declarative security statements, Permissions View tool decompiling delayed signing support evidence assigning assigning to embedding in assemblies permissions viewing fully trusted deleting from list .NET Framework Configuration tool and programming considerations fully trusted assemblies GAC (Global Assembly Cache) installing into uninstalling from identity, evidence and installing isolated storage and loading, evidence minimum permission requests multi-file, distributing optional permission requests overview permissions policy resolution private compared to shared publisher certificates refusing requests scope attributes shared strong named, serviced components (COM+) and strong names creating specifying key pairs verifying version and culture metadata type-safe code Assembly class, evidence assembly evidence 2nd Assembly Linker tool assembly manifest AssemblyCulture attribute AssemblyDelaySign attribute assemblyEvidence argument, Evidence class AssemblyKeyFile attribute 2nd AssemblyKeyName attribute AssemblyVersion attribute Assert operations, security demands and assigning asymmetric algorithms signature function verification function asymmetric encryption 2nd algorithm security decrypting data digital signatures ElGamal algorithm encrypted data creation data padding keys, creating AsymmetricAlgorithm class 2nd digital signatures key-related properties properties and methods AsymmetricExchangeDeformatter class AsymmetricExchangeFormatter class AsymmetricSignatureDeformatter class AsymmetricSignatureFormatter class attribute classes defining attributes ApplicationAccessControl (COM+) assembly scope code group, policy resolution ComponentAccessControl (COM+) declarative security statements SecureMethod (COM+) security policy code groups SecurityRole (COM+) AttributeUsage attribute authentication ASP.NET Forms authentication impersonation and Passport authentication turning off Windows COM+ process-access security (PAS) cryptography IIS anonymous access basic authentication client certificate authentication digest authentication impersonation and integrated Windows authentication mode configuration RBS and Authentication Methods window, Internet Service Manager Author assembly, trust Author evidence class 2nd authority, RBS authorization ASP.NET file authorization URL authorization RBS and <authorization\\> element |