这种流程允许应用程序只执行登录用户权限范围内的操作。
This process allows the application to perform only operations allowable to the logged-in user.
EAz实现permissions类的方式使其成为EAz应用程序声明其权限和操作的单一标准位置。
EAz implements a permissions class as a single standard location for an EAz application to declare its permissions and actions.
它使EAz能够通过操作名称向应用程序的服务层提供“众所周知”的权限集。
This gives EAz the ability to supply "well known" permission sets to an application's service layers by action name.
这些人员有权安装和删除应用程序、更改操作系统权限以及对属性和系统配置文件进行更改。
This person (or persons) has access to install and remove applications, change OS permissions, and make changes to property and system configuration files.
在作为本系列结束的第3部分,您将探索如何将应用程序操作、组和主体,以及它们与EAz权限的关系在图形界面中可视化。
In Part 3, the conclusion to this series, you will explore how to visualize application actions, groups, and principals, and their relationship to EAz permissions, in a graphical interface.
两个静态map是将权限与操作相关联的应用程序结构。
The two static maps are the application structures that relate permissions to actions.
本文阐述了将应用程序操作、组和参与者,以及它们与 EAz权限的关系在图形界面中实现可视化的技术。
This article illustrated a technique for visualizing application actions, groups, and actors, and their relationship to EAz permissions, in a graphical interface.
权限表示应用程序的原子二进制权限;操作是应用程序的命令,即要求授权的活动。
Permissions represent atomic binary permissions for an application and actions are the application's commands; that is, the activities that require authorization. In syntactic terms.
“无线手机上网应用协议并不是基于标准的英特网协议,因此对其浏览器没有太大的竞争要求,而且操作人员对入网许可有着较为严实的权限控制”,他讲道。
"WAP was not based on standard Internet protocols, there was no competition for browsers, and operators had a stranglehold on access," he says.
传统应用软件的用户权限分配操作十分繁琐且效率较低,因而必须提高软件的工作效率。
OBJECTIVE The traditional operation of distributing the users'rights for application software is complicated as well as low effcient.
在应用服务器上进行权限控制就能保证客户端对数据库的操作中不包含不必要及不合法的操作。
The application server's privileges are restricted to prevent it from performing unneeded and unwanted operations during a client operation.
用户权限管理是焊接应用软件的重要组成部分之一,关系到系统信息安全、用户对软件操作和使用权限等重要问题,是焊接应用软件是否实用的重要标志。
Management of user authority is an important component of welding application software. It's concerned with the security of system information, the user's operation and the authority, etc.
为了应用操作的正确,需要请求相应的权限。
Requests a permission that the application must be granted in order for it to operate correctly.
要限制权限滥用,操作系统必须清楚哪些是应用程序正常所需权限。
To prohibit privilege abuse, operating system must clearly know the necessary privileges needed by a program.
Android是一种权限分离的操作系统,其中每个应用以唯一的身份标识(Linux用户ID和组ID)运行。
Android is a privilege-separated operating system, in which each application runs with a distinct system identity (Linux user ID and group ID).
如果因出错而无法完成重构操作,则有关该错误的信息将写入应用程序事件日志中,对此应用程序事件日志拥有“普通用户”权限的任何用户都可以查看该信息。
If an error prevents a refactoring operation from completing, information about the error is written to the application event log, where any user who has "Normal user" permissions can view it.
应用程序不具备创建命名操作系统对象的权限。
The application does not have permissions to create named operating-system objects.
通过在多个实际系统中的应用,证明此方案不仅可以满足企业对信息系统权限管理的要求,而且使权限管理具有很高的灵活性和可操作性。
Several practical application prove that this resolvent not only can appease enterprise's request for privilege management of MIS, but also is very flexible and exercisable.
代码访问安全性还可让您应用程序可以执行的操作进行更好的控制,原因是您可以仅指定您需要应用程序具有的权限。
Code access security also gives you more control over what actions your application can perform, because you can specify only those permissions you need your application to have.
请求可选的权限时,必须处理可能的安全异常。如果未授予应用程序执行操作所需要的权限,则会生成安全异常。
When you request optional permissions, you must handle security exceptions that will be generated if your application performs an action that requires permissions not granted to it.
反射机制把客户对服务器对象的访问隔离开来,进行访问权限的检查和安全审计,防止应用软件的非法访问和操作来提高系统可靠性。
The reflective mechanism isolates the clients from the server object to validate the permissions and auditing, thus raising the dependability of the system.
例如,具有代码访问安全性权限的本地应用程序可能不具有操作系统权限。
For example, a local application that has the code access security permission might not have operating system permission.
例如,具有代码访问安全性权限的本地应用程序可能不具有操作系统权限。
For example, a local application that has the code access security permission might not have operating system permission.
应用推荐