DocumentCode
509408
Title
The Component Code of Each Call Analyze and Compare Based on .NET
Author
Jing, Zhou ; Yuan, Fang
Author_Institution
Dept. of Comput. Sci. & Technol., Huanggang Normal Univ., Huanggang, China
Volume
1
fYear
2009
fDate
21-22 Nov. 2009
Firstpage
689
Lastpage
691
Abstract
Based on the .NET programming model of Web technology in the scope of the application programmers have been more widely and mature, and based on the .NET technology for the use of programming code is to be broaden higher requirements and skilled. This paper briefly analyses problems mainly through based on the .NET trust code and non-trust code between the key characteristics. Another, this paper makes a detailed analysis which indicate the defined characteristics of the trust model and non-trust model, in addition which give the explain and contrast of the each defined characteristics. The main purpose is to let the reader who is clearly understand the difference between two kinds of models, and call respectively based on the .NET detailed description of the two kinds of code and call the process, and base on the analysis and comparison for the .NET trust code and non-trust code between the key techniques to realize the calling each other.
Keywords
Internet; middleware; network operating systems; security of data; .NET programming model; .NET trust code; Web technology; application programmers; component code; middleware; nontrust code; nontrust model characteristics; process call; programming code; Application software; Computer science; Information analysis; Information technology; Middleware; Paper technology; Programming profession; .NET; Code; calls; characteristics; process;
fLanguage
English
Publisher
ieee
Conference_Titel
Intelligent Information Technology Application, 2009. IITA 2009. Third International Symposium on
Conference_Location
Nanchang
Print_ISBN
978-0-7695-3859-4
Type
conf
DOI
10.1109/IITA.2009.60
Filename
5370215
Link To Document