[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] ParseHashCodeString method parsing, hash codes PAS (process-access security), COM+ authentication impersonation Passport authentication permission attribute classes permission classes CAS statements programming class functionality SecurityPermission class serialization permission demands Demand statement InheritanceDemand statement LinkDemand statement permission objects, named permission sets permission requests minimum optional refusing types permission sets creating named programming considerations security policies security policy code groups Permission Settings dialog box permissions application domain policies, programming considerations CAS and ControlEvidence creating custom assembly scope attributes attribute class definitions dll creation enforcing security example example class definition example enumeration IPermission interface ISecurityEncodable interface IUnrestrictedPermission interface grant set granting identity permissions, custom evidence isolated storage named permission sets .NET Framework Configuration tool and creating manually PrincipalPermission class, RBS demands requesting security policies and types code-access identity overview Permissions View tool, CAS Permissions View tool, declarative security statements and PermissionSet class PermissionSetAttribute class PermissionState enumeration 2nd PermitOnly operations, security demands and Permview.exe persistence, cryptographic keys PKCS #! signature-formatting protocol PKCS #1 Helper class PKCS #7 padding PKCS (Public Key Cryptography Standard) plaintext, encrypting policies application domain, programming considerations assemblies, fully trusted AuthorMembershipCondition assembly AuthorMembershipCondition example class implementing code groups configuration 2nd custom membership condition classes levels assembly trust and manually editing named permission sets policy administration policy evaluation, Caspol.exe and policy files enterprise policy level fully trusted assemblies machine policy code groups named permission sets policy levels Caspol.exe and code groups Code-Access Security Policy tool and named permission sets and targeting policy resolution 2nd 3rd code group attributes granting permissions policy statements code groups, programming considerations programming PolicyHierarchy method PolicyLevel class members programming considerations code group tree management fully trusted assemblies named permission sets PolicyStatementAttribute enumeration prime numbers, key generation and principal policy, IPrincipal interface PrincipalPermission class constructors imperative RBS demands RBS demands and PrincipalPolicy enumeration principals, .NET RBS private assemblies private keys importance of ProcessData method ProcessDataBlock method ProcessFinalDataBlock method <processModel\\> element, ASP.NET worker processes userName attribute programmer (roles) programming application types (COM+), specifying AuthorMembershipCondition example assembly AuthorMembershipCondition example class implementing CAS permissions assembly scope attributes attribute class definitions custom dll creation enforcing security example custom class example custom class definition example custom class enumeration IPermission interface ISecurityEncodable interface IUnrestrictedPermission interface code groups 2nd membership conditions policy statements COM+ ApplicationAccessControl attribute ComponentAccessControl attribute SecureMethod attribute SecurityRole attribute custom membership conditions DefectTracker interface digital signatures ElGamal algorithm abstract cipher function class definition abstract class definition decryption class definition encryption class definition implementation class definition ELS custom event logs monitoring event logs querying reading event logs registering event sources writing events hash codes generating generating from streamed data hashing algorithms, instantiating implementation classes, hashing algorithms keyed hashing algorithms block cypher hash codes creating keyed hash codes HMAC standard instantiating .NET Framework multi-file assemblies, writing in different languages permission classes class functionality SecurityPermission class permission demands Demand statement InheritanceDemand statement LinkDemand statement permission sets PolicyLevel class code group tree management fully trusted assemblies named permission sets SecurityManager class serviced components (COM+), creating store directories SymmetircAlgorithm class, instantiating XTEA abstract classes ICryptoTransform interface implementation classes XTEAManagedDecryptor class XTEAManagedEncryptor class project architect (roles) properties ApplicationAccessControl attribute (COM+) AsymmetricAlgorithm class C#/Visual Basic syntax CodeGroup class EventLog class EventLogEntryCollection class Evidence property HashAlgorithm class ICryptoTransform interface LoadAndList RSA class RSACryptoServiceProvider class SecurityManager class SecurityPermissionAttribute class SecurityRole attribute symmetric algorithms Key and IV KeySize and BlockSize SymmetricAlgorithm class protected page, ASP.NET applications protocols ElGamal key generation key generation asymmetric encryption RSA algorithm public key cryptography public key encryption [See asymmetric encryption] public key token public keys assembly strong names asymmetric encryption delayed signing and viewing publisher certificates Publisher class Publisher evidence, application domains, assigning to |