O'Reilly logo

Silverlight 5 in Action by Pete Brown

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. The security model and elevated trust

 

This chapter covers
  • Code classifications and the transparency model
  • User initiation and consent
  • Elevated trust out-of-browser
  • Special considerations for elevated trust inbrowser
  • Elevated trust mode detection

 

The .NET desktop application code security model is centered on the concept of code-access security (CAS). This model, although extremely powerful, was found to be difficult to configure and maintain on end-user workstations using tools like CASPOL (Code Access Security Policy editor), and sometimes difficult to use in production code. It was also difficult for users to understand exactly what rights they’ve granted to specific applications. Finally, it had no provision for easy runtime ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required