打开现有的已命名信号量,并指定所需的安全访问权限。
Opens an existing named semaphore, specifying the desired security access rights.
这样,恶意代码获得的安全访问权限可以比它被允许的要高。
In this way, malicious code can achieve higher security access than it should be allowed.
尼娜想知道梅森是否就是那个内奸,她指令托尼关闭梅森的安全访问权限。
Nina wonders if he is the mole, and she orders Tony to shut down Mason's security access.
每一个成员都会准确的看到相同的分类结构,只要他们拥有必要的安全访问权限。
Everyone will see exactly the same breakdown structure, as long as they have the required security access.
端到端安全模型意味着所有提供者将授予所有受信任的请求应用程序访问权限。
The end to end security model would mean that all providers give access to all trusted requesting applications.
适用于一个系统的安全策略实质上是一个良好定义的“仓库”,它存储了授予这个系统中不同实体的访问权限的断言。
The security policy applicable to a system is in essence a well-defined "repository" of assertions regarding access permissions granted to the different entities in that system.
只有确认了适当的权限后,用户才可以访问安全的系统或者资源。
Only after the appropriate rights have been confirmed will the user be granted access to secured systems or resources.
硬链接的文件不需要用户有访问原始文件的权限,也不会显示原始文件的位置,这样有助于文件的安全。
A hard-linked file does not require the user to have access rights to the original file and does not show the location of the original, so it has some security advantages.
您已经了解如何在不能直接采用SSL或通道安全出口之类的强身份验证方法时锁定管理访问权限。
You have seen how to lock down administrative access when strong authentication methods such as SSL or channel security exits are not immediately available.
他也可以设备上装些感兴趣的应用,但这些应用将永远无法获得访问权限或者升级为安全应用,因为它们完全被环境配置文件隔离了。
He can also have his fun apps on the same device, but they'll never be able to get access or break into a more secure app because of the complete segmentation of profiles.
它涵盖任何安全管理解决方案都具有的要素,比如用户认证、访问权限控制、审计、单点登录、高可用性和日志记录。
This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.
特别是管理用户和访问云端的权限对于组织来说是一个很大的安全方面的疑虑,也是一个棘手的问题。
In particular, managing user identity and access in the cloud is a tough problem to solve and a big security concern for organizations.
图5:安全策略提供访问权限,角色定义允许操作。
Figure 5: Security Polices provide access, and Roles define Allowed Actions.
用户或者从基于文件的用户和组安全文件进行管理,或者从一个轻量级目录访问权限协议(LDAP)目录中产生。
Users are managed either from file-based user and group security files or populated from a Lightweight directory Access Protocol (LDAP) directory.
通过前面所描述的机制,可以为键不安全的内核扩展授予广泛的数据访问权限,这种机制是一种保护门类型,我们将其称为隐式保护门。
The mechanism described earlier that grants broad data access rights to a key-unsafe kernel extension is a type of protection gate called an implicit protection gate.
豁免权使原本安全标签权限不足的用户可以访问受保护数据。
An exemption allows users access to protected data that the user's security labels might have otherwise prevented from accessing.
因此,每一个类或者对象“属于”一个ProtectionDomain,安全策略对这个保护域授予了某种访问权限。
Therefore, each class or object "belongs to" a ProtectionDomain, to which certain access permissions have been granted by the security policy.
默认情况下,Android应用程序没有被授予权限,这通过不允许它们访问设备上的受保护API或资源,确保了它们的安全。
By default, Android applications have no permissions granted, making them safe by not allowing them to gain access to protected APIs or resources on the device.
与传统备选方法相比,这种方法提供了更安全的访问:以 root 的身份运行Web服务器,并提供转换到文件访问器权限的实例。
This provides more secure access than a traditional alternative: Run the Web server as root (!), with instances switching to the privilege of the file accessor.
mqm用户ID和组基本上不能受到OAM实施的安全保护,因为不能回收它们的访问权限。
The MQM user ID and group are essentially exempt from security enforced by the OAM, since their access cannot be revoked.
它们不但提供了真正的安全,而且如果具有适当的访问权限(无论是使用Notes客户机还是Web 浏览器),还便于使用。
They provides real security, but are also convenient to use if you have the appropriate access whether using a Notes client or a Web browser.
我们已经确保了访问数据的安全性,但在授予用户访问数据的权限,而黑客却能够访问通过Internet传输的数据包时,会出现什么情况呢?
We have secured access to the data, but what happens when a user is given access to the data, and a hacker can access the data packets as they are being sent across the Internet?
但是,在某些情况下,标准的文件权限有局限性;与应用程序访问或安全性相关的产品可能会出现这种情况。
However, there are situations when the standard file access does have limitations; this can arise with application access or security related products.
如果不谨慎地控制谁对文件系统有写访问权限,用户只需手工编辑配置文件,就可以破坏产品的安全性控制(比如审计)。
If you do not carefully control who has write access to the file system, a user can subvert the product security controls (such as auditing) by simply hand editing the configuration files.
必须对新访问机制强制执行现有的访问权限以及安全性与审核需求。
Existing access rights as well as security and audit requirements must be enforced for the new access mechanisms.
系统必须提供安全性,并根据相应的权限控制对这些功能的访问。
The system must provide security and control access to those functions based on permissions.
对于此类场景,需要实现更加细粒度的安全性,对文档的不同部分应用不同的访问权限。
For a scenario like this one, you would need to implement more fine-grained security applying different access rights to different portions of the document.
当另一个用户需要访问该文件时,在授予对数据的访问权限之前,将验证其安全凭据,既使这些文件数据已经以明文格式存在于内存中。
When another user requires access to the file, their security credentials are verified before being granted access to the data even though the file data is already in memory and in clear format.
J2EE安全模型以方法权限为基础,因此对于细粒度的安全访问来说,它既不切实际又很麻烦。
The J2EE security model is based on method permission, so it is impractical and cumbersome for fine grained security access.
J2EE安全模型以方法权限为基础,因此对于细粒度的安全访问来说,它既不切实际又很麻烦。
The J2EE security model is based on method permission, so it is impractical and cumbersome for fine grained security access.
应用推荐