You can also take advantage of the code access security that's built into the CLR.
还可利用内建在 CLR中的代码访问安全性。
Role-based security checks have slightly different semantics than code access security checks.
基于角色的安全检查与代码访问安全检查在语义上稍有不同。
Provide data governance capabilities to enforce and audit both transaction and data access security.
提供数据治理功能,实现并审计事务和数据访问安全。
Code-access security maps this evidence to a set of permissions when the code is loaded and run.
当加载并运行代码时,代码访问安全机制会将此证据映射到一组权限。
Improperly administering code access security (CAS) policy can potentially create security weaknesses.
不正确管理代码访问安全性(CAS)策略可能会导致安全漏洞。
Disabling code access security makes the system vulnerable to attacks by malicious code such as viruses and worms.
禁用代码访问安全性会使系统容易受到恶意代码(如病毒和蠕虫)的攻击。
Code access security can also help minimize the damage that can result from security vulnerabilities in your code.
代码访问安全性还有助于最大限度地减少由于代码中的安全脆弱性而造成的损害。
The infrastructure that code access security and CLR deployment bring to the table enables some cool possibilities.
在代码访问安全以及CLR部署的基础上带来更多更酷的可能性。
Although restricted by this, code access security further restricts the application depending on where it came from.
虽然受限于此,但是代码访问安全将根据这个文件的来源重新对其进行约束。
Using code access security can reduce the likelihood that your code will be misused by malicious or error-filled code.
使用代码访问安全性,可以减小恶意代码或包含错误的代码滥用您的代码的可能性。
If you design class libraries, you need to understand code access security and be careful to secure your class library.
如果设计类库,则需要了解代码访问安全性,并仔细地保护您的类库。
Another common trend is the application of service gateway patterns to provide enhanced access security for service endpoints.
另一个常见的趋势是,应用服务网关模式来为服务端点提供增强的访问安全。
Code access security (CAS) is a mechanism that helps limit the access that code has to protected resources and operations.
代码访问安全性(CAS)是帮助限制代码对受保护资源和操作的访问权限的一种机制。
Secondly, aiming at the weakness of access security in present NAS products, the defending strategy of NAS devices is researched.
其次,针对NAS设备固有的访问安全方面的弱点,论文研究了NAS设备的防护策略。
Code access security policy configuration state consists of three administrative policy levels: enterprise, machine, and user policy.
代码访问安全性策略配置状态分为三个管理策略级别:企业、计算机和用户策略。
To guarantee access security in network collaborative enterprise modeling systems, establishing access control function is in demand.
为了保证在网络化的协同企业建模系统中对模型的安全访问,需要建立一套有效的访问控制机制。
Using secure class libraries: class libraries use code access security to specify the permissions they require in order to be accessed.
使用安全类别库:类别库会使用程序码存取安全性,来指定存取类别库时所需的使用权限。
Full-trust applications are not affected by code access security unless they are marked as security-transparent, because they are fully trusted.
除非完全信任的应用程序标记为安全-透明,否则它们不受代码访问安全性的影响,因为它们是完全受信任的。
Along the way you get the benefits of the managed environment in which a fully compiled.net-based application executes, including code access security.
通过该方法,您可以受益于托管环境,在该环境中执行完全编译的基于. NET的应用程序,其中包括代码访问安全性。
The meeting proposed to enhance pipeline safety enterprises to work together to build a "peace pipeline" energy strategy to maintain access security.
会议提出,企地携手加强管道安全工作,共建“平安管道”,维护能源战略通道安全。
If so, you must protect the directory containing these files, using code access security or an access Control List in the file system, as appropriate.
如果存在,则必须相应地使用文件系统中的代码访问安全机制或访问控制列表,来保护包含这些文件的目录。
Code access security allows code to be trusted to varying degrees, depending on where the code originates and on other aspects of the code's identity.
代码访问安全性使代码可以根据它所来自的位置以及代码标识的其他方面,获得不同等级的受信度。
Code access security also enforces the varying levels of trust on code, which minimizes the amount of code that must be fully trusted in order to run.
程序码存取安全性也可以提高程序码的各种信任层级,使必须完全受信任才可执行的程序码数量减少。
Code access security enables code to be trusted to varying degrees depending on where the code originates and on other aspects of the code's identity.
程序码存取安全性依程序码的来源和程序码本身的其他部分,分别给与程序码不同程度的信任等级。
You can also use the security Settings link on this page to bypass the wizard's default offer to set up the necessary code access security for your project.
也可使用该页面上的SecuritySettings链接以不使用向导提供的默认值,来为项目设置必要的代码访问安全性。
Furthermore, code access security eliminates the need for messy dialog boxes asking users whether they trust your network or code downloaded from the Internet.
此外代码访问安全忽略了弹出询问用户是否信任您的网络或者从英特网上下载的代码的对话框的需要。
You can edit policy files by hand or you can use the Code Access Security Policy tool to administer security policy for the enterprise, machine, or user levels.
您可以手动编辑策略文件,也可以使用代码访问安全性策略工具管理企业级别、计算机级别或用户级别的安全策略。
In the third mobile communication systems, access security includes the confidentiality of the subscriber identity, entity authentication and the security of data.
在第三代移动通信系统中,接入安全主要包括身份保密、实体认证和数据的安全三个方面。
Code access security affects all managed code that targets the common language runtime, even if that code does not make a single code-access-security permission check.
代码访问安全性将影响面向公共语言运行时的所有托管代码,即使该代码不执行代码访问安全性权限的单项检查。
Code access security affects all managed code that targets the common language runtime, even if that code does not make a single code-access-security permission check.
代码访问安全性将影响面向公共语言运行时的所有托管代码,即使该代码不执行代码访问安全性权限的单项检查。
应用推荐