Chapter 12. Security Through the Lifetime of a Managed Process: Fitting It All Together

By Brian A. LaMacchia

IN THIS CHAPTER

This chapter concludes our discussion of Code Access Security fundamentals by showing how the features described in Chapters 4 through 11 interact when managed code is loaded and run within the Common Language Runtime. In the previous chapters, we have looked at various security features of the Runtime—verification, policy evaluation, and permission enforcement—in isolation. Now, we focus on how these individual pieces of the security system come together and interact to provide a secure environment for executing semitrusted ...

Get .NET Framework Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.