Skip to main content

Code Access Security

  • Chapter
.NET Security
  • 86 Accesses

Abstract

In this chapter, I’ll introduce you to Code Access Security (CAS) as well as how permissions and evidence factor into the picture. This will include discussions on what policy levels are, how evidence affects assemblies loaded into application domains, and how the evidence they submit affects the permissions they are granted. Then I’ll cover permissions and how they work in .NET. Finally, I’ll demonstrate how you can create your own custom permissions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Jason Bock, Pete Stromquist, Tom Fischer, and Nathan Smith

About this chapter

Cite this chapter

Bock, J., Stromquist, P., Fischer, T., Smith, N. (2002). Code Access Security. In: .NET Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-0846-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-1-4302-0846-4_4

  • Publisher Name: Apress, Berkeley, CA

  • Print ISBN: 978-1-59059-053-9

  • Online ISBN: 978-1-4302-0846-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics