Security Measures by the NET

Released on: July 11, 2008, 2:42 am

Press Release Author: Christine Layug

Industry: Internet & Online

Press Release Summary: Code Access Security is based on evidence that is associated
with a specific assembly. Typically the evidence is the source of the assembly.

Press Release Body: The .NET Framework can provide its programmers with its own
security mechanism with two general features: the Validation and Verification and
CAS or more commonly known as the Code Access Security.
Code Access Security (CAS), in the Microsoft .NET framework, is Microsoft\'s solution
to prevent untrusted code from performing privileged actions. When the CLR loads an
assembly it will obtain evidence for the assembly and use this to identify the code
group that the assembly belongs to. Learn more of this with the href=http://www.astonishdesigns.com>austin .net consultant.
A code group contains a permission set. Code that performs a privileged action will
perform a code access demand which will cause the CLR to walk up the call stack and
examine the permission set granted to the assembly of each method in the call stack.
The code groups and permission sets are determined by the administrator of the
machine who defines the security policy.
Code groups associate a piece of evidence with a named permission set. The
administrator uses the .NET Configuration Tool to specify a particular type of
evidence (for example, Site) and a particular value for that evidence (for example,
www.mysite.com) and then identifies the permission set that the code group will be
granted. Visit the austin .net consultant
to know more about this.
Evidence can be any information associated with an assembly. The default evidences
that are used by .NET code access security are: Application directory (The directory
in which an assembly resides), Publisher (The assembly\'s publisher\'s digital
signature), URL (the complete URL where the library was downloaded from), Site (The
hostname of the URL), Zone (the defined security zones), Hash (a cryptographic hash
of the assembly, which identifies a specific version), and Strong Name (the X.509
certificate uniquely identifying a publisher). Learn more of this with the austin
.net consultant.
A developer can use custom evidence, or also called assembly evidence, but this
requires writing a security assembly and in version 1.1 of .NET this facility does
not work. Evidence based on a hash of the assembly is easily obtained in code. For
more information regarding .NET Framework security, then visit the href=http://www.astonishdesigns.com>austin .net consultant for more details.


Web Site: http://www.astonishdesigns.com

Contact Details: Astonish Designs, Ltd.
2700 Bee Caves Rd. #120
Austin TX, 78746

(832) 476-0503

  • Printer Friendly Format
  • Back to previous page...
  • Back to home page...
  • Submit your press releases...
  •