Ya i agree that we can modify the access control of an resource using accesscontrol namespace.
But suppose a malicious code is downloaded from internet (it doesn't have the access contr check).
Then how will we stop that assembly from accessing our resource.
Some people recommend that for four basic types of applciations namely:
1.Standalone desktop application
2.Enterprise application
3.B2C application
4.B2C application
Out of these stanalone applications and B2B applications which are using resources are recomended to use resource based authorization.
while creating a typical applications on any of the four types above, how should we go about security.
Can you please clarify this or provide me some link to any website where i can get more on this
Regards
|