Chapter 7. Permissions

In this chapter, we explain permissions and discuss their role in the implementation of CAS. We describe the mechanisms that the runtime uses to enforce code-level security, and explain how you can use permissions to manipulate these mechanisms. We examine the functionality common to all permissions, and demonstrate the use of key permission classes provided in the .NET class library. Finally, we show you how to extend CAS by implementing your own custom permissions.



Programming. NET Security
Programming .Net Security
ISBN: 0596004427
EAN: 2147483647
Year: 2005
Pages: 346

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net