August 2003
Intermediate to advanced
496 pages
11h 59m
English
Traditionally, security models have been purely logon-oriented and process-centric. This approach on its own is not sufficiently flexible for dealing with the new component-oriented world of mobile code. Code Access Security (CAS) deals with this new challenge by layering a flexible component-oriented security model over the user-based security model provided by the operating system.
Chapter 7 introduced the first part of the .NET security story, but we focused only on user-based security techniques. In this chapter we continue our study of .NET security programming by investigating its other major aspect, known as CAS. In contrast to user-based security, CAS allows you to restrict actions based on certain ...
Read now
Unlock full access