Abstract
In this chapter, I’ll introduce you to Code Access Security (CAS) as well as how permissions and evidence factor into the picture. This will include discussions on what policy levels are, how evidence affects assemblies loaded into application domains, and how the evidence they submit affects the permissions they are granted. Then I’ll cover permissions and how they work in .NET. Finally, I’ll demonstrate how you can create your own custom permissions.
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2002 Jason Bock, Pete Stromquist, Tom Fischer, and Nathan Smith
About this chapter
Cite this chapter
Bock, J., Stromquist, P., Fischer, T., Smith, N. (2002). Code Access Security. In: .NET Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-0846-4_4
Download citation
DOI: https://doi.org/10.1007/978-1-4302-0846-4_4
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-59059-053-9
Online ISBN: 978-1-4302-0846-4
eBook Packages: Springer Book Archive