• 打开现有已命名信号量并指定所需安全访问权限

    Opens an existing named semaphore, specifying the desired security access rights.

    youdao

  • 这样恶意代码获得安全访问权限可以允许要高

    In this way, malicious code can achieve higher security access than it should be allowed.

    youdao

  • 尼娜想知道梅森是否就是那个内奸,指令托尼关闭梅森安全访问权限

    Nina wonders if he is the mole, and she orders Tony to shut down Mason's security access.

    youdao

  • 每一个成员都会准确看到相同分类结构只要他们拥有必要的安全访问权限

    Everyone will see exactly the same breakdown structure, as long as they have the required security access.

    youdao

  • 安全模型意味着所有提供者将授予所有受信任的请求应用程序访问权限

    The end to end security model would mean that all providers give access to all trusted requesting applications.

    youdao

  • 适用系统安全策略实质上一个良好定义仓库”,它存储了授予这个系统不同实体访问权限断言

    The security policy applicable to a system is in essence a well-defined "repository" of assertions regarding access permissions granted to the different entities in that system.

    youdao

  • 只有确认适当权限,用户才可以访问安全系统或者资源

    Only after the appropriate rights have been confirmed will the user be granted access to secured systems or resources.

    youdao

  • 链接文件需要用户访问原始文件权限,也不会显示原始文件的位置,这样有助于文件的安全

    A hard-linked file does not require the user to have access rights to the original file and does not show the location of the original, so it has some security advantages.

    youdao

  • 已经了解如何不能直接采用SSL通道安全出口之类身份验证方法锁定管理访问权限

    You have seen how to lock down administrative access when strong authentication methods such as SSL or channel security exits are not immediately available.

    youdao

  • 可以设备上装些感兴趣应用这些应用永远无法获得访问权限或者升级安全应用因为它们完全被环境配置文件隔离了。

    He can also have his fun apps on the same device, but they'll never be able to get access or break into a more secure app because of the complete segmentation of profiles.

    youdao

  • 涵盖任何安全管理解决方案具有的要素,比如用户认证访问权限控制审计点登录可用性日志记录。

    This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.

    youdao

  • 特别是管理用户访问云端权限对于组织来说很大安全方面的疑虑,也是一个棘手问题

    In particular, managing user identity and access in the cloud is a tough problem to solve and a big security concern for organizations.

    youdao

  • 5安全策略提供访问权限角色定义允许操作

    Figure 5: Security Polices provide access, and Roles define Allowed Actions.

    youdao

  • 用户或者基于文件用户安全文件进行管理,或者从一个轻量级目录访问权限协议(LDAP)目录中产生。

    Users are managed either from file-based user and group security files or populated from a Lightweight directory Access Protocol (LDAP) directory.

    youdao

  • 通过前面所描述机制,可以键不安全内核扩展授予广泛的数据访问权限这种机制一种保护类型,我们将其称为隐式保护门。

    The mechanism described earlier that grants broad data access rights to a key-unsafe kernel extension is a type of protection gate called an implicit protection gate.

    youdao

  • 豁免权使原本安全标签权限不足用户可以访问受保护数据

    An exemption allows users access to protected data that the user's security labels might have otherwise prevented from accessing.

    youdao

  • 因此每一个或者对象属于ProtectionDomain安全策略对这个保护域授予某种访问权限

    Therefore, each class or object "belongs to" a ProtectionDomain, to which certain access permissions have been granted by the security policy.

    youdao

  • 默认情况下,Android应用程序没有被授予权限,这通过允许它们访问设备受保护API资源确保了它们的安全

    By default, Android applications have no permissions granted, making them safe by not allowing them to gain access to protected APIs or resources on the device.

    youdao

  • 传统备选方法相比这种方法提供安全访问以 root 的身份运行Web服务器,并提供转换文件访问权限实例

    This provides more secure access than a traditional alternative: Run the Web server as root (!), with instances switching to the privilege of the file accessor.

    youdao

  • mqm用户ID基本上不能受到OAM实施安全保护,因为不能回收它们访问权限

    The MQM user ID and group are essentially exempt from security enforced by the OAM, since their access cannot be revoked.

    youdao

  • 它们不但提供了真正安全而且如果具有适当访问权限无论是使用Notes客户机还是Web 浏览器),便于使用

    They provides real security, but are also convenient to use if you have the appropriate access whether using a Notes client or a Web browser.

    youdao

  • 我们已经确保访问数据安全性,在授予用户访问数据权限黑客能够访问通过Internet传输的数据包,会出现什么情况呢?

    We have secured access to the data, but what happens when a user is given access to the data, and a hacker can access the data packets as they are being sent across the Internet?

    youdao

  • 但是某些情况下,标准文件权限局限性应用程序访问安全相关产品可能会出现这种情况。

    However, there are situations when the standard file access does have limitations; this can arise with application access or security related products.

    youdao

  • 如果谨慎地控制文件系统访问权限用户只需手工编辑配置文件,就可以破坏产品安全控制(比如审计)。

    If you do not carefully control who has write access to the file system, a user can subvert the product security controls (such as auditing) by simply hand editing the configuration files.

    youdao

  • 必须访问机制强制执行现有访问权限以及安全审核需求

    Existing access rights as well as security and audit requirements must be enforced for the new access mechanisms.

    youdao

  • 系统必须提供安全根据相应的权限控制这些功能访问

    The system must provide security and control access to those functions based on permissions.

    youdao

  • 对于此类场景,需要实现更加细粒度安全文档不同部分应用不同的访问权限

    For a scenario like this one, you would need to implement more fine-grained security applying different access rights to different portions of the document.

    youdao

  • 另一个用户需要访问文件时,在授予数据访问权限之前,将验证安全凭据使这些文件数据已经明文格式存在内存中。

    When another user requires access to the file, their security credentials are verified before being granted access to the data even though the file data is already in memory and in clear format.

    youdao

  • J2EE安全模型方法权限基础,因此对于粒度的安全访问来说,不切实际很麻烦。

    The J2EE security model is based on method permission, so it is impractical and cumbersome for fine grained security access.

    youdao

  • J2EE安全模型方法权限基础,因此对于粒度的安全访问来说,不切实际很麻烦。

    The J2EE security model is based on method permission, so it is impractical and cumbersome for fine grained security access.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定