|
Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z] partially specified references to assemblies 2nd partially trusted code performance issues permissions application domain custom default rules for defined 2nd demands of list of predefined PermissionSet objects policy tree creation relation to evidence and policy runtime enforcement of stack walks 2nd 3rd validation verification policy tree creation policy, CAS. [See CAS policy] Portable Executable (PE) headers primary interfaces processes application domains within associating with application domain managers blocking with host protection manager graceful vs. rude exiting of guidelines for partitioning into application domains host protection of isolation property of lifetimes threading of productivity application extensibility programming model enforcement ProvideAssembly method ProvideModule method public keys assembly specification extracting publisher policy assemblies |
|