This situation exists in frameworks such as WPF, which provide partial-trust access to XAML loading for portions of the WPF application model.
这种情况存在于诸如wpf的框架中,该框架提供对WPF应用程序模型部分的xaml加载的部分信任访问。
Revoking access privileges and revoking a certificate are functionally equivalent; removing the certificate from the trust store accomplishes both tasks.
撤销访问权限和撤销证书在功能上相当;从信任存储区中删除证书可同时完成这两项任务。
With a trust store consisting of a single trusted ca and nothing more, the CRL approaches an equivalent per-DN revocation capability in which revocation of the certificate effectively revokes access.
使用除包含单个受信任存储CA之外没有其他任何内容的信任存储区,CRL提供一个等效的每DN撤销功能,撤销证书将有效撤销访问权。
If access is based entirely on self-signed certificates, deleting the public key of a certificate from the trust store revokes its access.
如果访问完全基于自签名证书,则从信任存储区中删除证书的公钥将撤销其访问权。
Note that in the Tivoli Access Manager architecture, the client and service provider must be members of the same Kerberos realm or of Kerberos realms that have a trust relationship.
注意,在TivoliAccessManager体系结构中,客户端和服务提供者必须是同一kerberos域或具有信任关系的多个kerberos域的成员。
A truly engaged scholar may be able to develop the level of trust with the entrepreneur and the investors that allows the kind of access and understanding not previously possible.
一个真正做到导入性研究的人应该是可以与创业者和投资者建立不同程度的信任感,实现之前所无法做到了接触程度和了解尝试。
This trust fund will provide rapid assistance to the most fragile, poor and heavily-impacted countries and territories with little access to immediate funding.
该信托基金将为最脆弱、最贫困和受影响最大的国家以及几乎不能得到任何紧急资助的地区提供快速援助。
The account used is an interdomain trust account. Use your global user account or local user account to access this server.
所用帐户为域间信任帐户。请使用您的全局用户帐户或本地用户帐户来访问这台服务器。
Furthermore, code access security eliminates the need for messy dialog boxes asking users whether they trust your network or code downloaded from the Internet.
此外代码访问安全忽略了弹出询问用户是否信任您的网络或者从英特网上下载的代码的对话框的需要。
The account used is a server trust account. Use your global user account or local user account to access this server.
已使用的帐户为服务器信任帐户。使用您的全局用户帐户或本地用户帐户来访问此服务器。
Change the trust level to Restricted and you block all access to your PC from the specified device.
将信任级别改为受限,你就能阻止特定设备对你的PC的一切访问。
On an inbound forest trust, you must manually assign permissions on each domain and resource to which you want users in the second forest to have access.
则必须将对每个域和资源的权限手动分配给您希望具有访问权的第二个林中的用户。
The ISO10181 access control framework and the Privilege Management Infrastructure PMI are analyzed, and a Cross Trust Regions Authorization Framework(CTRA) is designed.
分析ISO10181访问控制框架与权限管理基础设施PMI,提出了跨信任域的授权模型CTRA。
They can leverage the trust and access that new relationship gives them to expand and solidify customer relationships in exciting and profitable new ways.
他们可以依靠客户的信任和这种全新关系带来的新渠道,更好地扩大和巩固客户关系。
So that the owner of the resources could implement access control, authority management, trust management using his security policies under the support of PKI.
使依托于PKI系统的资源的管理者可以根据自身的安全策略实现对资源的访问控制、权限管理、信任管理等。
Thus, based on the trust and recommendation mechanism and fair participation idea, this paper proposes a new access control framework.
为此,基于信任推荐机制与公平参与机制,提出了一种新的访问控制框架。
In this system, many new techniques are adopted, for example, mechanism of the chain of trust, role-based access control model, two-level of logs, trusted authorization and so on.
系统中采用了信任链机制、基于角色的访问控制模型、两级日志、可信认证等技术,同时给出了可信在分布式计算机系统中的实现技术和途径。
We acknowledge your trust and are committed to take reasonable steps to protect Personally Identifiable Information you provide online from loss, misuse, and unauthorized access.
我们感谢您的信任,并采取合理的步骤保护您在线提供的个人信息,防止其丢失,滥用和非授权访问。
The restricted access mechanism meets the request of nonrandom matching and is favorable for setting up repeated game and trust mechanism and also favors contract management.
限制性进入机制符合非随机配对的要求,并有利于建立重复博弈和信任机制,有利于契约管理。
Your applications can use Full Trust or use partial zones, such as the Internet and Intranet zones, to limit access.
您的应用程式可以使用完全信任或部分信任区域 (例如网际网路和内部网路区域)以限制存取。
Automated trust Negotiation (ATN) provides a means to establish the trust membership by disclosing and matching credentials and access control policies.
自动信任协商(atn)是指通过暴露信任凭证与访问控制策略进行匹配以达到建立信任关系的目的。
Due to some factors of insecurity existed in nowadays Internet, the issue on access control and trust negotiation is introduced.
论文从说明目前网络存在的不安全因素入手,引出访问控制和信任协商的课题研究。
Code access security also enforces the varying levels of trust on code, which minimizes the amount of code that must be fully trusted in order to run.
程序码存取安全性也可以提高程序码的各种信任层级,使必须完全受信任才可执行的程序码数量减少。
Partial Trust means that only the actions that are permitted under the requested code access security permissions will run.
部分信任」表示只有在要求之程式码存取安全性权限下所允行的动作才会执行。
An application that has Full Trust permissions has unrestricted access to resources such as the file system and the registry.
具有“完全信任”权限的应用程序,对于档案系统和登录之类的资源,都可以进行无限制的存取。
Certain parts of your application, such as data access, can be designed and written differently for both partial trust and full trust environments.
对于应用程序的某些部分,例如数据访问,可以针对部分信任和完全信任环境分别进行设计和编写代码。
Human need for social trust is to meet the psychological needs of their own security, and meet the psychological needs of security, access security is the basic premise of social trust generated.
人类需要社会信任是为了满足自身的安全心理需求,而满足安全心理需求、获取安全感则是社会信任产生的基本前提。
This blanket of trust jeopardizes security by subjecting users to risks on both public and semi-public networks, including cable connections, public access wireless and enterprise networks.
信任的这床毯子危害由使用户遭到的安全上冒险公共和半保密的网络,包括电缆线连接,无线的公共的存取和企业网络。
Meanwhile, it ensures the secure storage and access of trust data and enhances the anonymity and security in the transaction of P2P network.
同时也保证了信任数据的安全存储和访问,同时增强了P 2 P网络中交易的匿名性和安全性。
Meanwhile, it ensures the secure storage and access of trust data and enhances the anonymity and security in the transaction of P2P network.
同时也保证了信任数据的安全存储和访问,同时增强了P 2 P网络中交易的匿名性和安全性。
应用推荐