Browse by Tags

Tagged Content List
  • Blog Post: Differences Between the Security Rule Sets

    In my last post I talked about the two different security rule sets supported by the v4 CLR .  At a high level, level 1 is the v2.0 security transparency model, and level 2 encompasses the updated v4 security transparency model.  Digging down a little deeper, it’s interesting to look at some...
  • Blog Post: MD5 on Silverlight

    Reid Borsuk, an SDE/T on the CLR security team, has released a fully transparent implementation of the MD5 hash algorithm to the MSDN Code Gallery .  Since the code is entirely transparent, it can be used as part of a Silverlight application that needs to compute MD5 hashes in order to interop with...
  • Blog Post: Dr. Dobbs Looks at Silverlight Security

    Dino Esposito has an article in the March Dr. Dobb's Journal taking a look at the Silverlight platform from a security perspective: The Silverlight 2.0 Security Model .  The second half in particular boils down some of the details of the transparency model used for security enforcement in Silverlight...
  • Blog Post: Silverlight Security Cheat Sheet

    Over the last week we took a look at the new Silverlight security model. When you're writing a Silverlight application though, there's a lot of information there that you may not want to wade through to get yourself unblocked. Here's a quick cheat sheet highlighting the important points that you'll need...
  • Blog Post: Silverlight Security III: Inheritance

    Over the last few days we've looked at the basics of the CoreCLR security model in Silverlight , and how to tell which platform APIs are available for applications to call . Let's wrap up this mini-series on CoreCLR security by looking at how the CoreCLR transparency model interacts with inheritance...
  • Blog Post: Silverlight Security II: What Makes a Method Critical

    Yesterday we talked about the CoreCLR security model , and how it is built upon the transparency model introduced in the v2.0 .NET Framework. The quick summary was that all Silverlight application code is transparent, and transparent code may only call other transparent code and safe critical code. With...
  • Blog Post: The Silverlight Security Model

    You may have heard a thing or two last week about a little project we like to call Silverlight , including a small version of the CLR that will run in the browser on both Windows and the Mac. (If you haven't grabbed the Silverlight v1.1 alpha bits yet, I highly recommend it -- as well as grabbing the...
Page 1 of 1 (7 items)