• Select Security permission and click OK.

    选择Security permission单击ok

    youdao

  • Defining the security permission on the SCA component.

    SCA组件定义安全权限

    youdao

  • You use SCDL to define security permission and identity.

    使用SCDL定义安全权限标识

    youdao

  • A security stack walk stops when a security permission is asserted.

    断言安全权限后,安全堆栈审核随即停止

    youdao

  • Next we will define the security permission for the CreditApproval SCA component.

    接下来我们定义CreditApprovalSCA组件安全权限

    youdao

  • Interfaces: at this level, you define the security permission of the SCA component.

    接口级别可以定义sca组件安全权限

    youdao

  • Select the Security permission qualifier, and in the Role field enter manager (Figure 5).

    选择Security permission限定符Role字段中输入manager5)。

    youdao

  • This security permission can be modified using the Component Services administrative tool.

    安全权限可以使用组件服务管理工具修改

    youdao

  • Configures the code access security permission set that is used to run a particular application.

    配置用于运行特定应用程序代码访问安全权限

    youdao

  • A new security permission LoggingPermission is defined to control updates to the logging configuration.

    LoggingPermission用来控制日志配置修改

    youdao

  • Explicit assembly binding redirection in an application configuration file requires a security permission.

    应用程序配置文件中的显式程序集绑定重定向需要安全权限。

    youdao

  • To define security restrictions for operations or the interface as a whole, use the security permission qualifier.

    整体定义操作安全限制界面,可是使用安全许可限定符。

    youdao

  • The security permission is granted to applications running in the Trusted Zone (local machine) and Intranet Zone.

    安全性使用权限授与信任区域本机电脑)内部网路区域中执行的应用程式。

    youdao

  • When this check box is selected, security permission requests are added to the deployment manifest for your application.

    当选中复选安全权限请求添加应用程序部署清单中

    youdao

  • For example, a local application that has the code access security permission might not have operating system permission.

    例如具有代码访问安全性权限本地应用程序可能具有操作系统权限。

    youdao

  • Use the security permission qualifier to restrict access to an operation in an interface to a specified set of users or groups.

    使用安全许可限定符限制一个用户或者指定集合访问界面中的操作

    youdao

  • If no security permission is specified, no permissions are checked and all callers are permitted to call the interface or operation.

    如果没有指定安全许可,则没有许可检查所有调用允许调用接口操作

    youdao

  • Asserting a security permission without performing any security checks can leave an exploitable security weakness in your code.

    如果执行任何安全检查的情况下断言安全权限,则代码留下可利用的安全漏洞。

    youdao

  • Declares a security permission that can be used to limit access to specific components or features of this or other applications.

    声明一个可以用来限制应用自身或者其他应用访问某些组件或者功能安全权限

    youdao

  • If the security permission qualifier is specified, the identity of the caller must have the designated role in order to be permitted to call the interface or operation.

    如果安全许可限定符指定调用方的身份必须指定角色获得调用接口操作许可。

    youdao

  • Code access security affects all managed code that targets the common language runtime, even if that code does not make a single code-access-security permission check.

    代码访问安全性将影响面向公共语言运行时所有托管代码,即使代码执行代码访问安全性权限的单项检查。

    youdao

  • On the other hand, JACC does not supply support for performing non-standard permission checking, as would be required in extending the J2EE security model.

    一方面,JACC并未提供执行非标准权限检查支持扩展J2EE安全模型又需要这种支持。

    youdao

  • One security issue is whether the provider's administrator can access your sensitive, compliance, privacy, and test data stored at known locations without your permission.

    其中一个安全性问题提供商管理人员是否能够在未经允许访问存储已知位置敏感法规保密测试数据

    youdao

  • What you should not do is use these techniques to perform a security test without permission.

    应该在没有获得批准的情况下使用这些方法进行安全测试

    youdao

  • The J2EE security model is based on method permission, so it is impractical and cumbersome for fine grained security access.

    J2EE安全模型方法权限基础,因此对于细粒度的安全访问来说,不切实际很麻烦。

    youdao

  • These groups and roles can be used in Security policies such as access permission for each object within the IBM Cognos 8 portal.

    这些角色用于一些安全性策略比如针对IBMCognos8门户中的每个对象访问权限

    youdao

  • Police and security services would be able to have access to the information after seeking permission from the courts.

    警方安全部门获得法庭批准,即可查阅这些资料

    youdao

  • Instead, Vista was bloated, buggy, incompatible with lots of existing software, and its new "security model" was to ask permission for everything.

    可相反Vista臃肿、毛病不断、许多软件不兼容新的安全模型”则是任何事情都要求取得许可

    youdao

  • Listing 2 shows the permission changes needed to make the system compliant with the FPM command's high-level security without changing any actual file permissions.

    清单2显示为了使系统遵从fpm命令的high级别安全性,并且更改任何实际文件许可需要做出的许可更改

    youdao

  • Listing 2 shows the permission changes needed to make the system compliant with the FPM command's high-level security without changing any actual file permissions.

    清单2显示为了使系统遵从fpm命令的high级别安全性,并且更改任何实际文件许可需要做出的许可更改

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定