Select Security permission and click OK.
选择Security permission并单击ok。
Defining the security permission on the SCA component.
在SCA组件上定义安全权限。
You use SCDL to define security permission and identity.
要使用SCDL来定义安全权限和标识。
A security stack walk stops when a security permission is asserted.
断言安全权限后,安全堆栈审核随即停止。
Next we will define the security permission for the CreditApproval SCA component.
接下来,我们将定义CreditApprovalSCA组件的安全权限。
Interfaces: at this level, you define the security permission of the SCA component.
接口:在此级别,可以定义sca组件的安全权限。
Select the Security permission qualifier, and in the Role field enter manager (Figure 5).
选择Security permission限定符,并在Role字段中输入manager(图5)。
This security permission can be modified using the Component Services administrative tool.
此安全权限可以使用组件服务管理工具修改。
Configures the code access security permission set that is used to run a particular application.
配置用于运行特定应用程序的代码访问安全权限集。
A new security permission LoggingPermission is defined to control updates to the logging configuration.
LoggingPermission用来控制日志配置的修改。
Explicit assembly binding redirection in an application configuration file requires a security permission.
应用程序配置文件中的显式程序集绑定重定向需要安全权限。
To define security restrictions for operations or the interface as a whole, use the security permission qualifier.
要整体定义操作的安全限制或界面,可是使用安全许可限定符。
The security permission is granted to applications running in the Trusted Zone (local machine) and Intranet Zone.
安全性使用权限是授与给在受信任区域 (本机电脑)和内部网路区域中执行的应用程式。
When this check box is selected, security permission requests are added to the deployment manifest for your application.
当选中此复选框时,安全权限请求会添加到应用程序的部署清单中。
For example, a local application that has the code access security permission might not have operating system permission.
例如,具有代码访问安全性权限的本地应用程序可能不具有操作系统权限。
Use the security permission qualifier to restrict access to an operation in an interface to a specified set of users or groups.
使用安全许可限定符来限制一个用户或者组的指定集合的访问界面中的操作。
If no security permission is specified, no permissions are checked and all callers are permitted to call the interface or operation.
如果没有指定安全许可,则没有许可检查,所有调用方都允许调用接口和操作。
Asserting a security permission without performing any security checks can leave an exploitable security weakness in your code.
如果在不执行任何安全检查的情况下断言安全权限,则会在代码中留下可利用的安全漏洞。
Declares a security permission that can be used to limit access to specific components or features of this or other applications.
声明一个可以被用来限制应用自身或者其他应用访问某些组件或者功能的安全权限。
If the security permission qualifier is specified, the identity of the caller must have the designated role in order to be permitted to call the interface or operation.
如果安全许可限定符是指定的,调用方的身份必须有指定角色来获得调用接口或操作许可。
Code access security affects all managed code that targets the common language runtime, even if that code does not make a single code-access-security permission check.
代码访问安全性将影响面向公共语言运行时的所有托管代码,即使该代码不执行代码访问安全性权限的单项检查。
On the other hand, JACC does not supply support for performing non-standard permission checking, as would be required in extending the J2EE security model.
另一方面,JACC并未提供对执行非标准权限检查的支持,而扩展J2EE安全模型又将需要这种支持。
One security issue is whether the provider's administrator can access your sensitive, compliance, privacy, and test data stored at known locations without your permission.
其中一个安全性问题是提供商管理人员是否能够在未经您的允许访问您存储在已知位置的敏感、法规、保密和测试数据。
What you should not do is use these techniques to perform a security test without permission.
您不应该在没有获得批准的情况下使用这些方法来进行安全测试。
The J2EE security model is based on method permission, so it is impractical and cumbersome for fine grained security access.
J2EE安全模型以方法权限为基础,因此对于细粒度的安全访问来说,它既不切实际又很麻烦。
These groups and roles can be used in Security policies such as access permission for each object within the IBM Cognos 8 portal.
这些组和角色可用于一些安全性策略,比如针对IBMCognos8门户中的每个对象的访问权限。
Police and security services would be able to have access to the information after seeking permission from the courts.
警方和安全部门获得法庭批准后,即可查阅这些资料。
Instead, Vista was bloated, buggy, incompatible with lots of existing software, and its new "security model" was to ask permission for everything.
可相反的是,Vista臃肿、毛病不断、与许多软件不兼容,其新的“安全模型”则是任何事情都要求取得许可。
Listing 2 shows the permission changes needed to make the system compliant with the FPM command's high-level security without changing any actual file permissions.
清单2显示为了使系统遵从fpm命令的high级别安全性,并且不更改任何实际的文件许可,需要做出的许可更改。
Listing 2 shows the permission changes needed to make the system compliant with the FPM command's high-level security without changing any actual file permissions.
清单2显示为了使系统遵从fpm命令的high级别安全性,并且不更改任何实际的文件许可,需要做出的许可更改。
应用推荐