DocumentCode :
509408
Title :
The Component Code of Each Call Analyze and Compare Based on .NET
Author :
Jing, Zhou ; Yuan, Fang
Author_Institution :
Dept. of Comput. Sci. & Technol., Huanggang Normal Univ., Huanggang, China
Volume :
1
fYear :
2009
fDate :
21-22 Nov. 2009
Firstpage :
689
Lastpage :
691
Abstract :
Based on the .NET programming model of Web technology in the scope of the application programmers have been more widely and mature, and based on the .NET technology for the use of programming code is to be broaden higher requirements and skilled. This paper briefly analyses problems mainly through based on the .NET trust code and non-trust code between the key characteristics. Another, this paper makes a detailed analysis which indicate the defined characteristics of the trust model and non-trust model, in addition which give the explain and contrast of the each defined characteristics. The main purpose is to let the reader who is clearly understand the difference between two kinds of models, and call respectively based on the .NET detailed description of the two kinds of code and call the process, and base on the analysis and comparison for the .NET trust code and non-trust code between the key techniques to realize the calling each other.
Keywords :
Internet; middleware; network operating systems; security of data; .NET programming model; .NET trust code; Web technology; application programmers; component code; middleware; nontrust code; nontrust model characteristics; process call; programming code; Application software; Computer science; Information analysis; Information technology; Middleware; Paper technology; Programming profession; .NET; Code; calls; characteristics; process;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent Information Technology Application, 2009. IITA 2009. Third International Symposium on
Conference_Location :
Nanchang
Print_ISBN :
978-0-7695-3859-4
Type :
conf
DOI :
10.1109/IITA.2009.60
Filename :
5370215
Link To Document :
بازگشت