-
1 code access security
"A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform." -
2 full trust
"A code access security (CAS) state assigned to managed assemblies. The level of trust granted to an application or Web service affects its ability to use system resources while executing. Assemblies that have full trust can access any resource that is subject to operating system security, and all privileged operations are supported." -
3 common language runtime
"The engine at the core of managed code execution. The runtime supplies managed code with services such as cross-language integration, code access security, object lifetime management, and debugging and profiling support." -
4 CLR
"The engine at the core of managed code execution. The runtime supplies managed code with services such as cross-language integration, code access security, object lifetime management, and debugging and profiling support." -
5 runtime
"The engine at the core of managed code execution. The runtime supplies managed code with services such as cross-language integration, code access security, object lifetime management, and debugging and profiling support." -
6 solution package
"A compressed file that can be deployed to a server farm or a site. It can contain assemblies, resource files, site and feature definitions, templates, code access security policies, and Web Parts." -
7 transparency
"A security model that helps developers write and deploy secure libraries and applications by isolating code depending on privilege. Level 1 transparency was introduced in the.NET Framework version 2.0. It enables developers to annotate code to declare which types and members can perform security elevations and other trusted actions (security-critical) and which cannot (security-transparent). Level 2 transparency, which was introduced in the.NET Framework 4, refines this model. It adds a third group of code, security-safe-critical code, which are types or members that access secure resources and can be safely used by partially-trusted code in the.NET Framework." -
8 interactive dialog box
"A dialog box that requires a response from the user. Intermediary devices such as a security host require such a dialog box as an added layer of security between the client and the remote access server. In such dialog boxes, the user types an access code or a user name and password on the remote access terminal screen." -
9 granted permissions
"The permissions, determined by security policy, that code will be given, allowing it access to resources and giving it identity. The granted permissions are determined by both the requested permissions and what is allowed by the security policy configuration."
См. также в других словарях:
Code Access Security — (CAS), in the Microsoft .NET framework, is Microsoft s solution to prevent untrusted code from performing privileged actions. When the CLR loads an assembly it will obtain evidence for the assembly and use this to identify the code group that the … Wikipedia
Code Access Security — (CAS) ist das Sicherheitsmodell in Microsofts .NET Framework und stellt Microsofts Lösung dar, nicht privilegierten und nicht vertrauten Code an der Ausführung sicherheitskritischer Aktionen zu hindern. Wird eine Assembly durch die Common… … Deutsch Wikipedia
Code Access Security — Code Access Security механизм защиты, позволяющий ограничивать доступ коду к ресурсам компьютера. Используется в среде .NET Framework. Используется для определения разрешений и установки прав доступа к различным системным ресурсам,… … Википедия
Security engineering — is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. It is similar to… … Wikipedia
code — [kəʊd ǁ koʊd] noun 1. [countable] LAW a complete set of written rules or laws: • Each state in the US has a different criminal and civil code. ˈbuilding code [countable] LAW a set of rules that states what features a new building, bridge etc… … Financial and business terms
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Security guard — Private factory guard Occupation Activity sectors Security Description A security guard (or security officer) is a person who is paid to protect pro … Wikipedia
Code injection — is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by an attacker to introduce (or inject ) code into a computer program to change the course of execution. The results of a code injection… … Wikipedia
Managed Code — NET Framework Basisdaten Entwickler: Microsoft Aktuelle Version … Deutsch Wikipedia
Unmanaged Code — NET Framework Basisdaten Entwickler: Microsoft Aktuelle Version … Deutsch Wikipedia
Code signing — is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed by use of a cryptographic hash. Code signing can provide several valuable … Wikipedia