[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] random number generator, cryptographic key creation RandomNumberGenerator class RBS (role-based security) authentication authority authorization COM+ credentials demands declarative statements imperative demands PrincipalPermission class generic implementation identities IIdentity interface 2nd IPrincipal interface 2nd CurrentPrincipal property IPrincipal object PrincipalPolicy enumeration overview roles Windows implementation impersonating Windows users WindowsIdentity class WindowsPrincipal class Windows security comparison RC2 algorithm reading files, isolated storage references, XML documents, XMLDSIG signatures and RegistryPermission object Remove method, isolated storage RemoveFullTrustAssembly method RemoveNamedPermissionSet method reports, analysis RequestMinimum statement RequestOptional statement RequestRefuse statement requests permission, types requiring trust Resolve method, CodeGroup class ResolveMatchingCodeGroups method ResolvePolicy method ResolvePolicyGroup method restricted resources trust restricted resources, application domains external resources functional resources subversion resources trust levels and Rijndael algorithm roaming-profiles, isolated storage and role-based permissions role-based security 2nd [See RBS] overview trust levels and roles architect business sponsor cracker programmer RBS and security tester system administrator user roles (COM+), scope RSA RSA algorithm decrypting data encrypted data creation encrypted data creation, data padding key generation protocol key length keys, implementing signature function RSA class properties and methods RSACryptoServiceProvider class encrypting and decrypting data instantiating keys, implementing properties and methods RSAParameters structure RSAParameters structure members runtime custom runtime hosts security, application domains and runtime security native code overview unverifiable code |