11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

806 <strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> CountermeasuresI<strong>Security</strong>EncodableFromXmlToXmlIPermissionCopyDem<strong>and</strong>IntersectIsSubsetOfUnionIStackWalkAssertDem<strong>and</strong>DenyPermitOnlyCodeAccessPermissionDem<strong>and</strong>AssertDenyPermitOnlyIUnrestrictedPermissionIsUnrestrictedEncryptionPermissionCopyUnionIntersectIsSubsetOfIsUnrestrictedFromXmlToXmlFigure 8Custom EncryptionPermission inheritance hierarchyThe custom EncryptionPermission class maintains the following states:●●EncryptionPermissionFlag. Determines whether code that is granted thispermission is able to encrypt data, decrypt data, or both.StorePermissionFlag. Determines whether code that is granted this permission isable to use DPAPI with the machine store, current user store, or both.Summary of StepsThis How To includes the following steps:Step 1. Create the EncryptionPermission class.Step 2. Create the EncryptionPermissionAttribute class.Step 3. Install the Permission assembly in the global assembly cache (GAC).Step 4. Update the DPAPI managed wrapper code.Step 5. Call DPAPI from a medium trust <strong>Web</strong> application.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!