Select Security permission and click OK.
选择Security permission并单击ok。
You use SCDL to define security permission and identity.
要使用SCDL来定义安全权限和标识。
A security stack walk stops when a security permission is asserted.
断言安全权限后,安全堆栈审核随即停止。
Interfaces: at this level, you define the security permission of the SCA component.
接口:在此级别,可以定义sca组件的安全权限。
Select the Security permission qualifier, and in the Role field enter manager (Figure 5).
选择Security permission限定符,并在Role字段中输入manager(图5)。
Configures the code access security permission set that is used to run a particular application.
配置用于运行特定应用程序的代码访问安全权限集。
ODM directory permission changes and general security update
ODM目录权限的变动和一般性安全更新
If there's no permission, the security manager throws an exception.
如果未许可,安全性管理器抛出一个例外。
In the "Advanced security setting" window, go to the Permission TAB and click Add.
在“Advancedsecuritysetting ”窗口中,选择Permission选项卡并单击add。
No part of this work may be reproded without the written permission of Security Management.
没有这项工作的一部分可能会被复制未经书面许可,安全管理。
For more information about evidence, code groups, and permission sets, see Security Policy Model.
有关证据、代码组和权限集的更多信息,请参见安全策略模型。
For imperative security, use the corresponding permission class.
对于强制性安全,应使用相应的权限类。
Permission demands are closely controlled through security policy, hosting environment, and code-source permission grants.
权限请求通过安全策略、宿主环境以及代码源权限授予进行严格的控制。
Tell security policy that the named-permission set exists.
通知安全策略该命名的权限集已经存在。
Net Security Zone Permission Sets?
网络安全区域权限集?。
Net Security Zone Permission Sets?
网络安全区域权限集?。
应用推荐