Stack inspection: Theory and variants
ACM Transactions on Programming Languages and Systems (TOPLAS)
Language integration in the common language runtime
ACM SIGPLAN Notices
Content extraction signatures using XML digital signatures and custom transforms on-demand
WWW '03 Proceedings of the 12th international conference on World Wide Web
Interfaces for stack inspection
Journal of Functional Programming
XacT: a bridge between resource management and access control in multi-layered applications
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Data-centric security: role analysis and role typestates
Proceedings of the eleventh ACM symposium on Access control models and technologies
Proceedings of the 2006 workshop on ML
Hardware architecture of a cryptosystem based on cellular automata model
ISTASC'04 Proceedings of the 4th WSEAS International Conference on Systems Theory and Scientific Computation
Patterns for session-based access control
Proceedings of the 2006 conference on Pattern languages of programs
Security in Distributed Applications
Advances in Software Engineering
Security-By-Contract for the Future Internet
Future Internet --- FIS 2008
Do You Really Mean What You Actually Enforced?
Formal Aspects in Security and Trust
Electronic Notes in Theoretical Computer Science (ENTCS)
A permission system for secure AOP
Proceedings of the 9th International Conference on Aspect-Oriented Software Development
Typing one-to-one and one-to-many correspondences in security protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Simulator for testing cellular automata cryptographic algorithms
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Hardware implementation on FPGA platform for cellular automata cryptosystem
TELE-INFO'06 Proceedings of the 5th WSEAS international conference on Telecommunications and informatics
Exploring the cellular automata phenomenology for cryptographic applications
ICAI'05/MCBC'05/AMTA'05/MCBE'05 Proceedings of the 6th WSEAS international conference on Automation & information, and 6th WSEAS international conference on mathematics and computers in biology and chemistry, and 6th WSEAS international conference on acoustics and music: theory and applications, and 6th WSEAS international conference on Mathematics and computers in business and economics
SP'04 Proceedings of the 12th international conference on Security Protocols
Towards remote policy enforcement for runtime protection of mobile code using trusted computing
IWSEC'06 Proceedings of the 1st international conference on Security
Hi-index | 0.00 |
.NET Framework Security provides the ultimate high-end comprehensive reference to all of the new security features available in .NET. Through extensive code samples and step-by-step walkthroughs of configuration techniques, the reader is taken deep into the world of secure applications. Demonstrations of creating custom procedures and a full explanation of each aspect separate this book from many other "lecture books." Many of the concepts expressed in this book are not only viable in .NET, but on the Internet in general. These factors combined make this the one reference that every developer and system administrator should have.