Code Access Security (CAS) and Design Patterns

IPattern.com (Maxim V. Karpov): “To be classified as a good developer is no longer characterized by merely writing manageable and well-documented code, but by today�s definition it also includes knowing how to write a secure code. This has priority over all other qualities assessed. Last year ‘Web Services’ was the buzz in the technology field, but has since been replaced with ‘Security’. Many job positions have been modified to include Security as a primary responsibility. On many levels of the Corporate Enterprise, changes are made to ensure that production systems are Secure and hackers cannot gain control of critical applications inside the businesses. When it comes to ‘Security’, there are so many layers; it is like an onion in which every layer that is peeled away, reveals yet another layer and so on. It takes great effort and much invested time in order to expose the core of the onion and the same is true with Security. In today�s installment, I want to peel that initial layer from regarding the Security topic. I regret not being familiar with this technology a year ago, but have put forth much effort this year to learn, manipulate and implement solutions with this highly demanded skill. The outcome of my personal endeavor is my collective thoughts and learning�s that you will find below. My main goal was to decipher the complexity of Code Access Security (CAS for short) into simple, understandable English supplemented with colorful diagrams to reinforce the knowledge. A picture speaks a thousand words!”

more …