豁免权使原本安全标签权限不足的用户可以访问受保护数据。
An exemption allows users access to protected data that the user's security labels might have otherwise prevented from accessing.
这些键集通过它们的键,提供了对保护数据的读写权限。
These keysets provide read and write access to the data protected by their keys.
实际上,帐号、密码和权限只能在遵守固定规则的操作系统环境中保护您的数据。
The fact is accounts, passwords, and permissions can only protect your data in the context of an operating system that obeys stated rules.
FOAF信息聚合者在其操作权限以内必须承担数据保护法律下的什么法律义务呢?
What legal obligations do aggregators of FOAF information have under the data-protection law in the jurisdiction under which they operate?
通过前面所描述的机制,可以为键不安全的内核扩展授予广泛的数据访问权限,这种机制是一种保护门类型,我们将其称为隐式保护门。
The mechanism described earlier that grants broad data access rights to a key-unsafe kernel extension is a type of protection gate called an implicit protection gate.
这并不会保护数据以防可以监听用户输入密码的根权限入侵,它可以为丢失的没有文件系统加密的设备提供保护。
While this does not protect data from a root compromise that can monitor the user inputting the password, it can provide protection for a lost device without file system encryption.
软件及数据的保护措施应加强密码校验、权限控制、图形码技术和数据加密技术。
Software and data's safeguard measure should strengthen cryptogram verify, purview control, graphics technique and data encrypt technique.
使用权限信息表和数据库用户共同控制权限,对数据做了双层保护。
Double protection to the data was realized with right information table and database user.
基于最小特权原理,从分析进程的访问权限出发,提出了一种防御恶意程序攻击的数据保护模型。
After analyzing the access rights of the processes, this paper presents a data-protection model which will prevent the attack of the malicious processes on the base of minimal privilege principle.
基于最小特权原理,从分析进程的访问权限出发,提出了一种防御恶意程序攻击的数据保护模型。
After analyzing the access rights of the processes, this paper presents a data-protection model which will prevent the attack of the malicious processes on the base of minimal privilege principle.
应用推荐