所有雇员都可进入内联网中无使用权限制的部分。
All employees can access the parts of the Intranet that are not ring-fenced.
在创建ACL时使用权限集合。
以下表格将说明使用权限要求的型别。
The following table describes the types of permission requests.
描述使用权限物件和执行阶段如何使用它们。
Describes permission objects and how they are used by the runtime.
使用权限表来管理权限有其优点也有其缺点。
Managing access using an access matrix like the one above has advantages and disadvantages.
要求衍生类别必须具有指定的识别或使用权限。
Require derived classes to have a specified identity or permission.
其他主机或沙箱对应用程序提供受限制的使用权限。
Other hosts or sandboxes provide a limited permission set for applications.
这个范例也告知系统,您不需要任何额外的使用权限。
This example also tells the system that no additional permissions are wanted.
已在安全性群组中加入或移除使用者,或更新使用权限。
Users are added to or removed from security groups or permissions are updated.
下面的图2中展示了如何使用权限和权限组生成权限集合。
Figure 2, below, depicts how a privilege set is formed making use of privileges and privilege groups.
每个可保护对象都具有可使用权限语句授予主体的权限。
Every securable object has permissions that can be granted to a principal using permission statements.
CM使用权限集合和ACL提供了一种严格的粒度级授权机制。
CM USES privilege sets and ACLs to provide a stringent and granular authorization mechanism.
父母可以询问孩子在干什么,当然还可来场关于正确使用权限的谈话。
Parents could ask what kids are doing, of course, and have a talk about proper usage limits.
多级业务光网络中,较高优先级的业务应具有较高的资源使用权限。
In an integrated optical network, traffics with higher priority should have more opportunities to access the network resources.
但是,我们不建议为了防范故意误用,而使用权限请求来禁止访问。
However, we do not recommend using permission requests to prohibit access for the purpose of protecting against intentional misuse.
有时您可能需要为同一资料夹建立多个规则,才能建立正确的使用权限。
Sometimes, you might have to create multiple rules for the same folder in order to establish the correct permissions.
通过分析注册表中的键和值,提出了一系列限制和反限制用户使用权限的方法。
Through analyzing registry's key and value, we present a series of method that limits and free user's right to use Windows.
七号信令鉴权系统是针对于通信用户在不同的通信网间的使用权限的鉴别系统。
SS7 is the identification system which aims at the authority identification of communication users corresponding in different communication net.
您必须在记录档所在处的电脑上有管理员使用权限,才能够清除事件记录档项目。
You must have administrator permissions to the computer on which the log resides to clear event log entries.
请注意,不受限制的使用者和企业层级并不会导致将不受限制的使用权限授与组件。
Note that unrestricted user and enterprise levels do not result in unrestricted permissions being granted to an assembly.
通常,程序码群组会和为该群组中程序码指定允许使用权限的具名使用权限集合关联。
Often, code groups are associated with a named permission set that specifies the allowable permissions for code in that group.
专案层级群组只能拥有执行专案作业 (例如启动组建或发行测试结果) 的使用权限。
Project-level groups can only have permissions to perform project operations, such as start a build or publish test results.
CM使用权限、权限组、权限集合和ACL对用户进行授权,从而对特定项目执行特定操作。
CM USES privileges, privilege groups, privilege sets, and ACLs to authorize the users to perform specific operations on specific items.
另一种可以限制您的程序码只能取得最低使用权限的方法是列出您想拒绝的特定使用权限。
Another way to limit the permissions your code receives to the fewest privileges is to list specific permissions you want to refuse.
这提供了用于个人用途的最终使用权限,ODRL使其播放、展示、执行和打印权限的使用更加明确。
This allows the private end-use rights which ODRL makes more explicit in its Usage entity of Play, Display, Execute, and Print permissions.
我们将使用资源一词来表示可以使用权限保护的最细粒度的功能;例如,We b页或EJB方法调用。
We'll use the term resource to refer to the finest grain of functionality that we can secure with a permission; for example, a Web page or EJB method call.
如果攻击者拥有一个(可靠的)Consumer站点的账号,那么该使用权限可能被保存为将来使用。
If the attacker has an account with the (honest) Consumer site, the access may persist in future visits.
这些群组也会指定给专案并提供专案特有的使用权限,例如启动组建或删除专案的使用权限。
They can also be assigned to projects and given project-specific permissions, such as permission to start a build or delete a project.
要求使用权限可以让管理员知道应用程序所需的最小使用权限需求,并据此调整安全性原则。
Requesting permissions lets administrators know the minimum permissions that your application needs so that they can adjust security policy accordingly.
取得资讯,以描述授与给应用程序的使用权限,以及该应用程序是否有允许其执行的信任层级。
Gets information describing permissions granted to an application and whether the application has a trust level that allows it to run.
应用推荐