Programming .Net Security

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

abstract cipher function classes, ElGamal algorithm 

abstract classes

    ElGamal algorithm 

    hashing algorithms 

    XTEA 

access modifiers, C# and Visual Basic 

access tokens, Windows security 

activation records 

AddFullTrustAssembly method 

AddNamedPermissionSet method 

Adler32 algorithm 

administration, shared assemblies and 

al.exe 

algorithm classes, cryptographic key creation 

algorithms  [See also cipher functions]

    asymmetric

        security of 

    asymmetric encryption 

    ELGamal 

        abstract cipher function class definition 

        abstract class definition 

        BigInteger class 

        decryption class definition 

        encryption and decryption functions 

        encryption class definition 

        implementation class definition 

        key generation protocol 

    ElGamal, testing 

    encryption 

    .NET Framework, symmetric encryption 

    RSA 

        encrypted data creation 

        key length 

    signing algorithm, XMLDSIG 

    symmetric

        cipher modes 

        instantiating 

        Key and IV properties 

        KeySize and BlockSize properties 

    symmetric algorithms, cryptographic keys 

    XTEA (Extended Tiny Encryption Algorithm)  2nd 

        abstract class definition 

        ICryptoTramsform interface 

        implementation class definition 

    XTEAMAnagedDecryptor class 

    XTEAMAnagedEncryptor class 

AllowPartiallyTrustedCallers attribute 

Anakrino/Exemplar decompiler 

anonymous access, IIS authentication 

APIs (application programming interfaces), Windows Crypto API 

AppDomain class, evidence 

application domain policy level 

application domains

    application isolation and 

    assembly loading, evidence 

    assembly management and 

    CAS and 

    CLR and 

    configuration 

    evidence 

    evidence assigning 

    identity and 

    isolated storage 

    isolated storage and 

    overview 

    Publisher evidence 

    restricted resources, trust levels and 

    runtime security and 

    security policy and 

application isolation

    applications domains and 

    .NET Framework 

Application log (ELS) 

application proxies, COM+ 

application resources (assemblies) 

application roles (COM+), populating 

application types (COM+), specifying 

ApplicationAccessControl attribute (COM+) 

ApplicationDirectory class 

applications

    COM+

        installing 

        management 

    COM+ types 

    deployment 

    execution 

    monitoring 

    secure applications  [See secure applications]

    security testing 

architect (roles) 

ASP.NET

    authentication 

        Forms authentication 

        IIS 

        impersonation and 

        Passport authentication 

        protected page 

        turning off 

        Windows 

    authorization

        file authorization 

        URL authorization 

    CAS and 

    CLR and 

    configuration

        files 

        <location\\> element 

        logon page 

        security-related elements 

    impersonation 

    security, overview 

    Web.config file 

    worker processes 

        <processModel\\> element 

assemblies

    application domain and 

    application domain policies, programming considerations 

    Author assembly, trust 

    AuthorMembershipCondition example 

    compiling 

        GAC and 

    creating 

        multi-file 

        single file 

    declarative security statements, Permissions View tool 

    decompiling 

    delayed signing support 

    evidence

        assigning 

        assigning to 

        embedding in assemblies 

        permissions 

        viewing 

    fully trusted 

        deleting from list 

        .NET Framework Configuration tool and 

        programming considerations 

    fully trusted assemblies 

    GAC (Global Assembly Cache) 

        installing into 

        uninstalling from 

    identity, evidence and 

    installing 

    isolated storage and 

    loading, evidence 

    minimum permission requests 

    multi-file, distributing 

    optional permission requests 

    overview 

    permissions 

    policy resolution 

    private compared to shared 

    publisher certificates 

    refusing requests 

    scope attributes 

    shared 

    strong named, serviced components (COM+) and 

    strong names 

        creating 

        specifying key pairs 

        verifying 

        version and culture metadata 

    type-safe code 

Assembly class, evidence 

assembly evidence  2nd 

Assembly Linker tool 

assembly manifest 

AssemblyCulture attribute 

AssemblyDelaySign attribute 

assemblyEvidence argument, Evidence class 

AssemblyKeyFile attribute  2nd 

AssemblyKeyName attribute 

AssemblyVersion attribute 

Assert operations, security demands and 

assigning 

asymmetric algorithms

    signature function 

    verification function 

asymmetric encryption  2nd 

    algorithm security 

    decrypting data 

    digital signatures 

    ElGamal algorithm 

    encrypted data creation 

        data padding 

    keys, creating 

AsymmetricAlgorithm class  2nd 

    digital signatures 

    key-related properties 

    properties and methods 

AsymmetricExchangeDeformatter class 

AsymmetricExchangeFormatter class 

AsymmetricSignatureDeformatter class 

AsymmetricSignatureFormatter class 

attribute classes

    defining 

attributes

    ApplicationAccessControl (COM+) 

    assembly scope 

    code group, policy resolution 

    ComponentAccessControl (COM+) 

    declarative security statements 

    SecureMethod (COM+) 

    security policy code groups 

    SecurityRole (COM+) 

AttributeUsage attribute 

authentication 

    ASP.NET 

        Forms authentication 

        impersonation and 

        Passport authentication 

        turning off 

        Windows 

    COM+ process-access security (PAS) 

    cryptography 

    IIS

        anonymous access 

        basic authentication 

        client certificate authentication 

        digest authentication 

        impersonation and 

        integrated Windows authentication 

        mode configuration 

    RBS and 

Authentication Methods window, Internet Service Manager 

Author assembly, trust 

Author evidence class  2nd 

authority, RBS 

authorization 

    ASP.NET

        file authorization 

        URL authorization 

    RBS and 

<authorization\\> element 

Категории