O'Reilly logo

.NET Framework Security by Kevin T. Price, Rudi Martin, Matthew Lyons, Sebastian Lange, Brian A. LaMacchia

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Evidence Explained

Evidence provides the basic building blocks for how code access security can work on .NET Framework code. An example of evidence about code is its SHA1 hash value.

This value is a cryptographically strong piece of information that is unique for different pieces of code. Thus, it is useful in providing identification.

TIP

For more information on cryptographic hash values, see Chapter 30, “Using Cryptography with the .NET Framework: The Basics.”

There are two key points to remember about evidence:

  • Evidence applies to executing code itself, not the user who is executing the code.

  • Evidence is applied to the granularity of assemblies and application domains.

TIP

Application domains will be mentioned several times in this book. They ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required