所有雇员都可进入内联网中无使用权限制的部分。
All employees can access the parts of the Intranet that are not ring-fenced.
在创建ACL时使用权限集合。
服务控制程序使用权限不受限制。
以下表格将说明使用权限要求的型别。
The following table describes the types of permission requests.
通过从儿童账户删除使用权限可以实现这点。
描述使用权限物件和执行阶段如何使用它们。
Describes permission objects and how they are used by the runtime.
然而,使用权限也可接受它本身专用的参数。
However, permissions also accept their own parameters that are exclusive to them.
使用权限表来管理权限有其优点也有其缺点。
Managing access using an access matrix like the one above has advantages and disadvantages.
设计使用权限类别。
代码可以使用权限来拒绝对其要保护的资源的访问。
Code can use permissions to deny access to resources it wants to protect.
这个范例也告知系统,您不需要任何额外的使用权限。
This example also tells the system that no additional permissions are wanted.
已在安全性群组中加入或移除使用者,或更新使用权限。
Users are added to or removed from security groups or permissions are updated.
下面的图2中展示了如何使用权限和权限组生成权限集合。
Figure 2, below, depicts how a privilege set is formed making use of privileges and privilege groups.
这个使用权限是任意指定的自订使用权限,并不存在于。
This permission is a hypothetical custom permission and does not exist in the.
每个可保护对象都具有可使用权限语句授予主体的权限。
Every securable object has permissions that can be granted to a principal using permission statements.
CM使用权限集合和ACL提供了一种严格的粒度级授权机制。
CM USES privilege sets and ACLs to provide a stringent and granular authorization mechanism.
集合层级群组可以同时具有集合层级和专案层级的使用权限。
Collection-level groups can have permissions at both the collection and the project level.
父母可以询问孩子在干什么,当然还可来场关于正确使用权限的谈话。
Parents could ask what kids are doing, of course, and have a talk about proper usage limits.
多级业务光网络中,较高优先级的业务应具有较高的资源使用权限。
In an integrated optical network, traffics with higher priority should have more opportunities to access the network resources.
使用权限信息表和数据库用户共同控制权限,对数据做了双层保护。
Double protection to the data was realized with right information table and database user.
您应该只要求您的程序码会用到的使用权限,而不要求过多的使用权限。
You should request only those permissions that your code needs, and no more.
通过分析注册表中的键和值,提出了一系列限制和反限制用户使用权限的方法。
Through analyzing registry's key and value, we present a series of method that limits and free user's right to use Windows.
您必须在记录档所在处的电脑上有管理员使用权限,才能够清除事件记录档项目。
You must have administrator permissions to the computer on which the log resides to clear event log entries.
通常,程序码群组会和为该群组中程序码指定允许使用权限的具名使用权限集合关联。
Often, code groups are associated with a named permission set that specifies the allowable permissions for code in that group.
专案层级群组只能拥有执行专案作业 (例如启动组建或发行测试结果) 的使用权限。
Project-level groups can only have permissions to perform project operations, such as start a build or publish test results.
CM使用权限、权限组、权限集合和ACL对用户进行授权,从而对特定项目执行特定操作。
CM USES privileges, privilege groups, privilege sets, and ACLs to authorize the users to perform specific operations on specific items.
另一种可以限制您的程序码只能取得最低使用权限的方法是列出您想拒绝的特定使用权限。
Another way to limit the permissions your code receives to the fewest privileges is to list specific permissions you want to refuse.
这提供了用于个人用途的最终使用权限,ODRL使其播放、展示、执行和打印权限的使用更加明确。
This allows the private end-use rights which ODRL makes more explicit in its Usage entity of Play, Display, Execute, and Print permissions.
我们将使用资源一词来表示可以使用权限保护的最细粒度的功能;例如,We b页或EJB方法调用。
We'll use the term resource to refer to the finest grain of functionality that we can secure with a permission; for example, a Web page or EJB method call.
如果攻击者拥有一个(可靠的)Consumer站点的账号,那么该使用权限可能被保存为将来使用。
If the attacker has an account with the (honest) Consumer site, the access may persist in future visits.
应用推荐