[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] SavePolicy method scope, COM+ roles secret data, isolated storage and secret key encryption [See symmetric encryption] secrets application design secure applications definition deployment design failure development execution monitoring restricted resources secrets security testing trust levels 2nd Secure Hash Algorithm (SHA) SecureMethod attribute SecureMethod attribute (COM+) security cryptographic key pairs end-to-end need for runtime security, application domains and shared assemblies security demands CAS and imperative security statements principles of operation stack walks Assert operations Deny operations overriding PermitOnly operations reverting overrides Security log (ELS) security policy [See policies] application domains and CAS and CLR, application domains levels policy levels policy resolution and security tester security testing, applications SecurityAction enumeration 2nd SecurityElement class SecurityEnabled property SecurityException, Assert operations and SecurityManager class programming considerations SecurityPermission class implementing SecurityPermissionAttribute class configuration properties SecurityPermissionFlag enumeration SecurityProTracker (COM+), populating application roles SecurityProTracker class SecurityRole attribute (COM+) SecurityRole attribute, properties seed data, symmetric encryption seed values, hashing algorithms Serializable attribute serialization custom membership condition classes evidence permission classes server applications, COM+ serviced components creating ServicedComponent class services, resource restrictions session keys, crytopgraphy session keys, encryption SetAppDomainPolicy method SetEveryoneAccess property SetThreadPrincipal method SHA (Secure Hash Algorithm) SHA1CryptoServiceProvider algorithm shallow copies, collection objects shared assemblies sharing data, isolated storage and side-channel attacks Sign method signature formatter classes signature function digital signatures and RSA protocol SignatureAlgorithm property Signcodex scheme SignData method signed documents, altering SignedXML class, XMLDSIG SignHash method signing authorities, delayed signing support for assemblies single-file assemblies creating delayed signing and Site class sn.exe Software Publisher's Certificate (SPC) software, resource restrictions SPC (Software Publisher's Certificate) stack frames stack walks imperative security statements overriding 2nd Assert operations Deny operations PermitOnly operations reverting standard evidence classes statement terminator (C#) statements, CAS declarative security imperative security overview storage, isolated storage stores deleting directories, creating isolated storage Strong Name tool strong names assemblies creating specifying key pair version and culture data delayed signing and multi-file assemblies, creating verifying strong-named assemblies, serviced components (COM+) StrongName class constructors StrongNameMembershipCondition objects structs, namespace quick reference and structures, C#/Visual Basic syntax subversion resources, application domains symmetric algorithms configuring cipher modes Key and IV properties KeySize and BlockSize properties cryptographic keys and instantiating symmetric encryption 2nd block padding cipher modes encrypted data, creating initialization vector key lengths .NET Framework algorithms symmetric key exchange, cryptographic keys SymmetricAlgorithm class encrypting and decrypting data methods and properties system administrator (roles) system administrator, application deployment and System log (ELS) System.Security.Policy namespace, evidence classes System.String argument, Site class constructor |