这是存取安全使用的范例。
部分信任」表示只有在要求之程式码存取安全性权限下所允行的动作才会执行。
Partial Trust means that only the actions that are permitted under the requested code access security permissions will run.
使用安全类别库:类别库会使用程序码存取安全性,来指定存取类别库时所需的使用权限。
Using secure class libraries: class libraries use code access security to specify the permissions they require in order to be accessed.
程序码存取安全性依程序码的来源和程序码本身的其他部分,分别给与程序码不同程度的信任等级。
Code access security enables code to be trusted to varying degrees depending on where the code originates and on other aspects of the code's identity.
程序码存取安全性也可以提高程序码的各种信任层级,使必须完全受信任才可执行的程序码数量减少。
Code access security also enforces the varying levels of trust on code, which minimizes the amount of code that must be fully trusted in order to run.
在载入时间,程序码存取安全系统会检查所有原则层级,产生的使用权限授权是每一个层级中所有允许的使用权限的交集。
At load time, the code access security system examines all policy levels and the resulting permission grant is the intersection of all allowed permissions in each level.
世界卫生组织采用一系列技术和安全措施以防范我们系统上所保存信息的丢失、滥用、未经授权的存取或公布、修改或损毁。
WHO employs a range of technologies and security measures to protect the information maintained on our systems from loss, misuse, unauthorized access or disclosure, alteration, or destruction.
您可以提供渐进式安全和存取控管,这样不同的角色和小组只对认为可接受的区域产生影响。
You can provide granular security and access control so that different roles and teams only have influence on areas that are deemed acceptable.
现今的资料存取控制可精细到个别资料格中的资讯,以便为重要资料及机密客户资讯,提供更严密的安全防护。
Access to data can now be controlled down to an individual cell of information, providing greater security for your critical data and sensitive customer information.
档案安全与敏感需求。为了机密、资讯专属性、或法规保护等理由,某些档案的存取必须受到限制。
Records security and sensitivity needs. Some records require limitations on access to them for reasons of confidentiality, proprietary nature of the information or due to legal protections.
可经由与档案所属的营运单位的协商,来进行存取与安全分类的分派。
The access and security classifications may be assigned in consultation with the business unit to which the records belong.
在用户层次结构的动态存取控制问题上,本文提出了一种安全有效的方案。
In the problem of dynamic access control, we present a secure and efficient scheme, which is based on discrete logarithms and polynomial interpolation.
合理的安全与存取有赖于组织的本质与规模,以及需要安全考量的资讯的内容与价值。
Reasonable security and access will depend on both the nature and size of the organization, as well as the content and value of the information requiring security.
在一些最早的存取控制系统中,人们用角色来分隔安全管理和系统管理。
People use it to separate the management of system from security in the access control system.
目前,绝大多数USB接口设备是以明文的形式进行数据的存取与传输,这就不可避免的带来了安全隐患。
At present, most USB interface equipments store and transmit data in plaintext form, unavoidable potential safety menace has been brought.
针对工作流建模的复杂性和模型的安全存取控制问题,提出一种通过建立任务节点和路由节点及其依赖关系来创建工作流模型的方法。
Due to complexity of modeling workflow and problems of secure access control, a method that makes a workflow model by setting up task nodes, route nodes and their dependency is brought forward.
它具有存取速度快、存储安全、可靠性高、操作使用简便等优点。
It has the advantage of quick access, safe storage, high dependability and simple operations, etc.
协助安全存放所有合同,租约和其他财务记录,包括适当的存放和存取。
Assists in providing safe keeping, including proper storage and access, for all contracts, leases and other financial records.
在任务节点中引入RBAC机制对角色属性进行约束以实现对工作流的安全存取控制。
Injecting RBAC mechanism into task nodes to restrict the role attribute can secure the access control of the workflow.
数据完整性和合法存取会受到很多方面的安全威胁,包括密码策略、系统后门、数据库操作以及本身的安全方案。
Integrity and legitimate accessing of data will receive security threat in many ways, including password strategy, system backdoor, database operating and safety plan of itself.
本文提出了一个简单安全的存取控制机制,可以有效地控制移动代理在本地主机的更新及创建权限。
This paper proposed a simple and secure access control mechanism that can effectively control mobile agents updating and creating ability in native host.
改进了安全级比较的规则,使得更适合现实中空间数据存取控制的需求。
Improve the rules of comparing the security label, which meet the practical demand of the Access Control for spatial database.
PK I技术能够有效满足网络应用中的机密性、完整性、真实性及不可否认性和存取控制等安全需求。
PKI can effectively meet many safety requirements for confidentiality, integrality, facticity an acceptability and access control for network applications.
外部存储器存取请求首先通过读取相应的安全位来处理。
External memory access requests are processed by first reading the corresponding security bit.
安全性解决方案主要措施有用户验证、页面授权、密码存取数据库和使用存储过程操作数据库。
Security solution includes validating users, page authorization, reading and writing database using the password and manipulating database using store procedures.
与设置用户存取权限控制、冗余备份恢复、网络安全等多种安全策略共同建立有机的安全体系。
Together with the technology of Access Control, redundant backup recovery and network security, it makes an allround security system.
在计算机安全学中,一种对存取受到控制的实体的特征的描述。
In computer security, a description of the characteristics of an entity to which access is controlled.
存取控制机制是保障数据库安全的一种主要手段。
Access control mechanisms are the principal way to protect data.
存取控制机制是保障数据库安全的一种主要手段。
Access control mechanisms are the principal way to protect data.
应用推荐