How CAS Is Used

CAS provides a very useful security model, which is quite distinct from, but complementary to, user-based security.[14] Let's look at some of the ways that CAS can be used to solve security problems that are not effectively handled with user-based security techniques alone.

[14] Unlike CAS, user-based security does not seem to be referred to in the literature by an acronym.

Flexible Security

CAS provides a flexible security layer over user-based security that allows for varying degrees of trust. This is somewhat similar to the Internet Explorer concept of security zones but is much more configurable and extensible. CAS minimizes the amount of code that must be fully trusted, and it takes into account the fact that trust is not ...

Get .NET Security and Cryptography now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.