The three tenets of this model are transparent code, security-safe-critical code, and security-critical code.
这个模型的三个原则是透明程序码、安全性安全关键程序码和安全性关键程序码。
Security transparent code should use full demands to make security decisions and safe-critical code should not rely on transparent code to have made the full demand.
安全透明代码应使用完整的需求来作出安全决策并且安全关键代码不应依赖透明代码以进行完全的请求。
Acting as a bridge is code marked as "Safe Critical" ACTS as a bridge between the two.
标识为“Safe Critical”的代码在两者间起到桥梁的作用。
Additionally, safe critical code, which does make security decisions, should not be relying on transparent code to have previously made such a decision.
此外,确实会作出安全决策的安全关键代码不应依赖透明代码实现作出这种决策。
If you do not, publicly visible security-critical types and members are treated as security-safe-critical and can be called by partially trusted code outside the assembly.
如果不这样做,则公开可见的安全关键类型和成员将被视为是安全可靠关键的,并且可以由程序集外部的部分信任的代码调用。
Any code that performs security checks, such as security demands, should be safe-critical instead.
执行安全检查的任何代码(如安全要求)应改为安全关键。
When you use Level 1 transparency, you are using a security model that separates code into security-transparent, security-safe-critical, and security-critical methods.
使用1级透明度时,您会使用一种安全模型,该模型将代码分成三类方法:安全透明的方法、安全可靠关键的方法和安全关键的方法。
When you use Level 1 transparency, you are using a security model that separates code into security-transparent, security-safe-critical, and security-critical methods.
使用1级透明度时,您会使用一种安全模型,该模型将代码分成三类方法:安全透明的方法、安全可靠关键的方法和安全关键的方法。
应用推荐