Press Release Summary: Code Access Security is based on evidence that is associated with a specific assembly. Typically the evidence is the source of the assembly.
Press Release Body: The .NET Framework can provide its programmers with its own security mechanism with two general features: the Validation and Verification and CAS or more commonly known as the Code Access Security. Code Access Security (CAS), in the Microsoft .NET framework, is Microsoft\'s solution to prevent untrusted code from performing privileged actions. When the CLR loads an assembly it will obtain evidence for the assembly and use this to identify the code group that the assembly belongs to. Learn more of this with the href=http://www.astonishdesigns.com>austin .net consultant. A code group contains a permission set. Code that performs a privileged action will perform a code access demand which will cause the CLR to walk up the call stack and examine the permission set granted to the assembly of each method in the call stack. The code groups and permission sets are determined by the administrator of the machine who defines the security policy. Code groups associate a piece of evidence with a named permission set. The administrator uses the .NET Configuration Tool to specify a particular type of evidence (for example, Site) and a particular value for that evidence (for example, www.mysite.com) and then identifies the permission set that the code group will be granted. Visit the austin .net consultant to know more about this. Evidence can be any information associated with an assembly. The default evidences that are used by .NET code access security are: Application directory (The directory in which an assembly resides), Publisher (The assembly\'s publisher\'s digital signature), URL (the complete URL where the library was downloaded from), Site (The hostname of the URL), Zone (the defined security zones), Hash (a cryptographic hash of the assembly, which identifies a specific version), and Strong Name (the X.509 certificate uniquely identifying a publisher). Learn more of this with the austin .net consultant. A developer can use custom evidence, or also called assembly evidence, but this requires writing a security assembly and in version 1.1 of .NET this facility does not work. Evidence based on a hash of the assembly is easily obtained in code. For more information regarding .NET Framework security, then visit the href=http://www.astonishdesigns.com>austin .net consultant for more details.