单词 | security-policy | ||||||||||||||||
释义 | security-policy
更多释义 收起释义 例句释义: 安全策略,安全政策,安全性原则 1. Before you add an assembly to security policy, you must give it a strong name and put it in the global assembly cache. 在将一个程序集添加到安全策略中之前,必须给它提供一个强名称并将其放置在全局程序集缓存中。 msdn2.microsoft.com 2. Default security policy does not know about the existence of any custom permission. 默认安全策略不知道任何自定义权限的存在。 msdn2.microsoft.com 3. Members of that group have no knowledge of any other records in the system, other than those with their security policy. 那个小组的成员对这个系统中的其它记录是一无所知的,除了那些他们安全策略的记录。 www.ibm.com 4. South Circle Technologies Willing to work with you together to promote the new century, the cause of social security policy process. 南圆科技公司愿同您一起携手推动新世纪的社会安防事业政策的进程。 www.b2easy.com 5. Only a consistent national security policy, including a sustained US presence in the region, can do that, " he said. " 只有安全政策保持连续性,包括保持美国军力在相关区域的长期存在,才能让中国人明白这一点。 blog.sina.com.cn 6. Occasionally, it might be necessary to reset a security policy to the defaults after some policy changes create undesirable side effects. 有时候,在某些策略更改造成了非预想的副作用后,可能需要将安全策略重置为默认设置。 msdn2.microsoft.com 7. After creating a security policy, the security administrator creates objects, called security labels that are also part of that policy. 创建好安全策略后,安全管理员创建安全标签,安全标签也是安全策略的一部分。 www.ibm.com 8. Britain, too, has set up a cyber-security policy outfit, and an "operations centre" based in GCHQ, the British equivalent of the NSA. 英国也建立起了一整套网络安全政策体系,和总部设在英国国家通讯总部(GCHQ)的“行动中心”,GCHQ相当于美国国家安全局。 www.bing.com 9. An illustration of an operational policy enforcement architectural style for managing security policy is shown in the figure below. 下图说明用于管理安全策略的一种操作策略实施架构风格。 www.ibm.com 10. To which certain access permissions have been granted by the security policy . 安全策略对这个保护域授予了某种访问权限。 www.bing.com 1. Upon authentication of a party in a web services transaction, a company's security policy often needs to be enforced. 当验证Web服务事务中的一方时,通常需要强制执行公司的安全性策略。 www.ibm.com 2. A firewall effectively implements a security policy governing the network traffic between two or more networks. 防火墙可以有效地实现管理两个或多个网络之间网络传输的安全策略。 www-128.ibm.com 3. Her first political office was as vice-chairman of the Campaign for Nuclear Disarmament; now she is in charge of European security policy. 她的第一份公职是核裁军运动副主席;但如今她负责欧洲安全政策。 www.bing.com 4. You can add a step to the Setup project to configure the security policy, or the appropriate security policy can be set by an administrator. 您可以向安装项目添加一个步骤以配置安全策略,或者可以由管理员设置适当的安全策略。 msdn2.microsoft.com 5. I do not intend on this occasion to go into any detailed justification of our entire post-World War II national security policy. 我不打算在这个场合为我们整个二战后国家安全政策进行详细辩解。 blog.sina.com.cn 6. After creating a security policy, the security administrator creates security labels that are part of that policy. 创建安全策略之后,安全管理员将创建安全策略中的安全标签。 www.ibm.com 7. This model consists of IT security services, security policy infrastructure, business security services, and security enablers. 此模型由IT安全服务、安全策略基础设施、业务安全服务和安全支持因素组成。 www.ibm.com 8. The result is determined by the system security policy exclusive of any. 策略之外的系统安全策略决定。 msdn2.microsoft.com 9. An expired key may be replaced with a new key to use to encrypt and decrypt as part of a security policy. 作为安全策略的一部分,到期的密钥可被新密钥代替以用于加密和解密。 www.pat365.com 10. Objects used to determine whether an assembly is a member of the group of assemblies used to evaluate security policy . 对象列表,这些对象用于确定程序集是否为用于评估安全策略的程序集组的成员。 www.bing.com 1. If this could be an issue with your security policy, then do not uncomment this line. 如果与您的安全策略有冲突,那么就不要取消注释该行。 www.ibm.com 2. The first "hard" question you'll be asked is what you want the default security policy to be for outgoing requests. 您遇到的第一个“难”问题,是问您想要对对外发送的请求采取什么样的默认安全策略。 www.bing.com 3. A client computer can have only one Client Security policy deployed to it at a time. 客户端计算机每次仅可以部署一个ClientSecurity策略。 technet.microsoft.com 4. Data in a table can only be protected by security labels that are part of the security policy protecting the table. 一个表中的数据只能受到保护该表的安全策略的安全标签的保护。 www.ibm.com 5. Explains basic administration concepts and describes some of the best practices to use when administering code access security policy. 解释基本管理概念,并描述管理代码访问安全策略时应使用的一些最佳做法。 msdn2.microsoft.com 6. Includes details of the design and implementation of the kernel security mechanisms , as well as the security policy configuration . 包括内核安全性机制的设计和实现,以及安全性策略配置的详细信息。 www.bing.com 7. No worries; I present you with a checklist of what should be included in a security policy. 不用担心;我会提供一个检查表,指出在安全策略中应该包含什么。 www.ibm.com 8. Depending on your security policy, you may find all three to be applicable to your situation. 根据不同的安全策略,三种方法可能都适用。 za.php.net 9. Systems that do not use the NTFS file system create security weaknesses by allowing unauthorized users to modify security policy. 不使用NTFS文件系统的系统会允许未经授权的用户修改安全策略,因而具有安全弱点。 msdn2.microsoft.com 10. That is painfully obvious in foreign and security policy but applies just as much to the economy. 这在外交和安全政策中极其明显,但也同样适用于经济中。 www.ftchinese.com 1. One from the Centre for Security Policy urges Americans to "Vote as if your life depends on it. Because it does. " 安全政策中心所作的一则广告力劝美国人“投票时押上你的生命,因为它确实命运攸关。” club.topsage.com 2. And if it is a trusted application, the administrator can adjust security policy to allow it to execute from the remote share. 并且它是受信任的应用程序,则管理员可以调整安全策略来允许它从远程共享执行。 msdn2.microsoft.com 3. Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data. 安全策略定义安全标签的组成,并指定控制敏感数据的访问的规则。 www.ibm.com 4. Another security policy might not even have the concept of roles at all. 其它的安全策略甚至可能没有有角色这个概念。 wiki.ubuntu.org.cn 5. The security policy that a host sets on an application domain is called an application-domain security policy. 宿主对应用程序域设置的安全策略称为应用程序域安全策略。 technet.microsoft.com 6. Translates security policy into a prioritized logic program, and then computes its semantics. 先将安全策略用一个优先逻辑程序表示,然后计算其语义。 dictsearch.appspot.com 7. Security policy defines several code groups and associates each group with a set of permissions. 安全性原则会定义几个程式码群组,并将每个群组与一组使用权限相关联。 technet.microsoft.com 8. Security policy is the configurable set of rules that the common language runtime follows when determining the permissions to grant to code. 安全策略是公共语言运行库在确定要授予代码的权限时遵循的可配置的一组规则。 msdn2.microsoft.com 9. This information is then mapped using a code-access security policy to determine the set of permissions granted at run time. 然后,将使用代码访问安全策略映射此信息,以确定在运行时授予的权限集。 msdn2.microsoft.com 10. Describes the techniques that you can use to deploy security policy changes to multiple machines in an enterprise setting. 描述向企业级设置中的多个计算机部署安全策略更改时可以使用的方法。 msdn2.microsoft.com 1. Such a merger has a precedent when the EU created the high representative for foreign affairs and security policy in the Lisbon treaty. 这样的合并有过一个先例,就是《里斯本条约》(Lisbontreaty)中“欧盟外交事务与安全政策高级代表”这一职位的设立。 www.ftchinese.com 2. An end user should evaluate a service provider's security policy before entering into a relationship. 在使用服务之前,最终用户应该评估服务提供商的安全策略。 www.ibm.com 3. The Windows Installer file you build in this walkthrough does not deploy the security policy required to run the solution. 本演练中生成的WindowsInstaller文件不会部署运行解决方案所需的安全策略。 msdn2.microsoft.com 4. To modify security policy to ensure that policy changes do not corrupt the security configuration files. 来修改安全策略,以确保策略更改不会破坏安全配置文件。 msdn2.microsoft.com 5. My Administration has elevated the rights of women and girls abroad as a critical aspect of our foreign and national security policy. 本届政府把提高海外妇女和女童的权利作为我国对外和国家安全政策一个至关重要的领域。 www.america.gov 6. The administrator sets up network security policy that trusts the location, optionally with a custom policy to trust only Office documents. 管理员设置信任该位置的网络安全策略,还可以选择设置一个仅信任Office文档的自定义策略。 msdn2.microsoft.com 7. You can use this information to determine the effect of current security policy on an assembly that you specify. 您可以使用此信息来确定当前的安全策略对所指定程序集的影响。 msdn2.microsoft.com 8. It includes a set of sample security policy configuration files designed to meet common, general-purpose security goals. 它包括一套样品安全策略配置文件,旨在满足共同的,一般用途的安全目标。 blog.sina.com.cn 9. The add-in assembly and all referenced assemblies must be granted full trust in the security policy of each end user. 外接程序程序集和所有的引用程序集必须在每一个最终用户的安全策略中被授予完全信任。 msdn2.microsoft.com 10. You will see an error message that states that the current. NET security policy does not permit the customization to run. 将显示一条错误信息,指出当前的.NET安全策略不允许该自定义项运行。 msdn2.microsoft.com 1. Adds a mapping between a security policy file and a named security trust level to the collection of security policy mappings. 向安全策略映射集合添加安全策略文件与指定的安全信任级别之间的映射。 msdn2.microsoft.com 2. The location of this file can be provided as input to the JVM via the environment variable java. security. policy. 可以通过环境变量java.security.policy将这个文件的位置作为输入提供给JVM。 www.ibm.com 3. For a given application domain , the host can change the default role- based security policy and set a default security principal . 宿主可以为给定的应用程序域设置基于角色的安全策略和当前安全主体。 www.bing.com 4. Juan Manuel Santos, his former defence minister, who leads the opinion polls, says that security policy needs to be adapted to new threats. 领先民调的前国防部长JuanManuelSantos表示,安全政策需要去适应新的威胁。 www.ecocn.org 5. The default permissions granted in each of these permission sets are listed in the Default Security Policy topic. 默认安全策略主题中列出了每个这些权限集中授予的默认权限。 msdn2.microsoft.com 6. Optional permissions can be granted by the security policy set on the computer where the assembly will run. 通过在将运行程序集的计算机上设置安全策略,您可以授予一些可选的权限。 msdn2.microsoft.com 7. But it is difficult for simple security policy to support enterprise-class applications, because of the big security risk of that policy. 但简单的安全策略存在较大的安全隐患,难以支撑企业级的应用。 www.boshuo.net 8. But from the perspective of emigre Tibetan politics and Indian security policy, the campaign against the Karmapa is not very surprising. 但从西藏流亡政治和印度安保政策的角度考量,这场反对葛玛巴的运动也就不那么耸人听闻了。 www.bing.com 9. Security policy defines several code groups and associates each of them with a set of permissions. 安全策略定义若干代码组并将每个代码组与一个权限集关联。 msdn2.microsoft.com 10. Describes some of the best practices for administrating code access security policy. 介绍一些管理代码访问安全策略的最佳方法。 msdn2.microsoft.com 1. Second, a new multi level security policy model for networks isolation was presented. We gave a solution to realize the system. 然后,在此基础上提出一种基于多级安全模型的访问控制模型,并给出具体的实现方案。 kns50.chkd.cnki.net 2. Describes techniques that administrators can use to maintain security policy on a machine or in an enterprise. 介绍管理员可用来在计算机上或企业中维护安全策略的技术。 msdn2.microsoft.com 3. Then one can gradually lift the security of that user as your security policy demands. 以后可以根据安全策略的要求逐渐放松此用户的安全限制。 www.ibm.com 4. "I'm not going to get into details, " Obama said, but he added that national security policy, in particular, should be nonpartisan. 奥巴马说:“我不想讨论细节。”但他表示国家安全政策尤其应该超越党派分歧。 cn.reuters.com 5. To help you setting up code access security policy, I provided a copy of my rssrvpolicy. Config in the Config folder. 为了帮助您设置代码访问安全策略,我提供了我的Config文件夹中的rssrvpolicy.config的副本。 msdn2.microsoft.com 6. These three types of classes are used to create the rules applied by the common language runtime security policy system. 这三种类型的类用于创建由公共语言运行库安全策略系统应用的规则。 msdn2.microsoft.com 7. Please check your own domain as a standard domain user and see if something is not following the security policy in your organization. 我们将用普通域用户对你的域进行检查,看看有哪些方面不符合安全策略。 www.bing.com 8. Note that this is an example; you or your security policy might dictate additional parameters than are being used here. 请注意,这只是一个示例,您或您的安全策略可能规定了其他参数,而不是这里使用的参数。 www.ibm.com 9. The Local Security Policy provides all information for the audit of these settings. 本地安全策略能够提供监听这些设置的所有信息。 blog.sina.com.cn 10. The president also chairs the Supreme National Security Council, which coordinates defence and security policy. 总统也要主持最高国家安全理事会,该理事会负责调整国防和安全政策。 www.bing.com 1. Whenever an attempt is made to load an assembly, the runtime uses security policy to determine which permissions to grant to the assembly. 每当发生加载程序集的尝试时,运行库就使用安全策略确定授予程序集的权限。 msdn2.microsoft.com 2. Firewall just is an effective measure of network security. It will ensure that all communications conform to your Security policy. 而防火墙就是保证网络安全的一种有效措施。它可以保证所有的通信符合安全政策。 www.ebigear.com 3. The default security policy provides adequate security for your computer in most situations. 在大多数情况下,默认安全策略为您的计算机提供足够的安全性。 msdn2.microsoft.com 4. This section describes tasks that help you to identify and fix security policy problems. 本节描述帮助您确定和修复安全策略问题的任务。 msdn2.microsoft.com 5. A departmental IT security review was completed , resulting in the release of an IT security policy for the Department . 年内,本署完成了部门资讯科技保安检讨,并制定了部门资讯科技保安政策。 www.bing.com 6. Information used to make security policy decisions and grant code permissions. 用于做出安全策略决策和授予代码权限的信息。 msdn2.microsoft.com 7. This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography. 此安全策略使用非对称加密执行数字签名与验证、加密和解密。 www.ibm.com 8. These three types of classes are used to create the rules applied by the. NET Framework security policy system. 这三种类型的类用于创建由.NETFramework安全策略系统应用的规则。 msdn2.microsoft.com 9. Application settings are controlled by the network security policy. Please contact your system administrator if necessary. 通过网络安全策略控制程序设置。必要的话联系您的系统管理员。 bbs.360safe.com 10. Default security policy for the Internet and an intranet does not allow access to files. Internet和Intranet的默认安全策略不允许访问文件。 msdn2.microsoft.com 1. Contains a self-protection mechanism that prevents security policy changes that would cause it to cease functioning. 包含一种自保护机制,该机制可防止对安全策略进行将会导致该策略停止运行的更改。 msdn2.microsoft.com 2. This limitation is known as the same origin server security policy. 这项限制就是相同初始服务器安全性策略。 www.ibm.com 3. The Visual Studio Tools for Office Project Wizard does not modify security policy for assemblies created at HTTP locations. “VisualStudioToolsforOffice项目向导”没有为在HTTP位置创建的程序集修改安全策略。 msdn2.microsoft.com 4. Note that security policy does not have to be updated to include non-code access permissions. 注意,要包括非代码访问权限,不必更新安全策略。 msdn2.microsoft.com 5. The security policy 7 defines the assertions used to create a secure access channel between the TCS and the service. 安全策略7定义用于在TCS和服务之间创建一个安全访问通道的声明。 www.ibm.com 6. This attribute can be a user-defined value, if there is a matching security policy mapping defined in a. 元素中定义了匹配的安全策略映射,则此属性可以是用户定义的值。 msdn2.microsoft.com 7. For simplicity, the Forms Authentication Sample is weak-named and requires a simple URL membership entry in the security policy files. 为了简化起见,在安全策略文件中窗体身份验证示例使用弱名称,并且只需要简单的URL成员身份条目。 msdn2.microsoft.com 8. Essentially, this works by embedding security policy into the physical connectivity layers of the network. 本质上,这种隔离的实现机制是将安全策略嵌入到网络的物理连通性层中。 www.ibm.com 9. If that privilege is not allowed by the restricted security policy in effect, an exception is thrown before your code is run. 如果当前受限制的安全策略不允许该权限,在运行代码之前将引发异常。 msdn2.microsoft.com 10. The end of the Cold War also required a thorough rethinking of American national security policy. 在冷战结束后,还需要彻底反思美国的国家安全政策。 dictsearch.appspot.com 1. A code group hierarchy, along with its associated named permission sets, defines and maintains each level of security policy. 代码组层次结构连同其关联的命名权限集一起定义并维护每个安全策略级别。 msdn2.microsoft.com 2. Code access security policy configuration state consists of three administrative policy levels: enterprise, machine, and user policy. 代码访问安全性策略配置状态分为三个管理策略级别:企业、计算机和用户策略。 www.kuenglish.info 3. Attribute to a code group by using one of the security policy tools. 属性应用到代码组来实现此操作。 msdn2.microsoft.com 4. Permission demands are closely controlled through security policy, hosting environment, and code-source permission grants. 权限请求通过安全策略、宿主环境以及代码源权限授予进行严格的控制。 technet.microsoft.com 5. Using Active Directory based group policy settings does not nullify the need for local security policy settings. 使用基于ActiveDirectory的组安全策略设置替代不了本地安全策略设置的作用。 www.bing.com 6. If type-safe code is required by the security policy but the code does not pass verification, an exception is thrown when the code is run. 如果安全策略要求提供类型安全代码,而该代码不能通过验证,则在运行该代码时将引发异常。 msdn2.microsoft.com 7. Use this procedure to create a custom security policy for your specific environment. 使用此步骤可以为特定环境创建自定义的安全策略。 technet.microsoft.com 8. Therefore, the default security policy supports mappings from permissions to principals, permissions to roles, and roles to principals. 因此,缺省的安全策略支持许可映射到主体,许可对角色和角色对主体。 wiki.ubuntu.org.cn 9. You should keep them in mind as you set up and administer your security policy. 在设置和管理安全策略时,应记住这些做法。 msdn2.microsoft.com 10. Groups create a local domain of control in which a specific security policy can be enforced . 对等组建立一个本地控制域,这个控制域必须具有特殊安全策略。 dictsearch.appspot.com 1. But former defense official Frank Gaffney, now president of the Center for Security Policy, says the new strategy has many problems. 但前国防部官员,现任安全政策中心主席弗兰克·加夫尼(FrankGaffney)表示,这一新战略存在诸多问题。 www.bing.com 2. If you change security policy related to your project while Visual Studio is running, Visual Studio does not detect the change. 如果在VisualStudio运行时更改与项目相关的安全策略,则VisualStudio不会检测更改。 msdn2.microsoft.com 3. The default Reporting Services code access security policy grants execution rights to all custom assemblies by default. 默认的ReportingServices代码访问安全策略在默认情况下对所有自定义程序集授予执行权限。 msdn2.microsoft.com 4. This is the same location used for the Machine. Config configuration file and the run-time security policy file. 该位置与用于Machine.config配置文件和运行时安全策略文件的位置相同。 msdn2.microsoft.com 5. Usually, the XML representations of the permissions that make up your security policy are stored in the policy configuration files. 通常,构成安全策略的权限的XML表示形式存储在策略配置文件中。 msdn2.microsoft.com 6. Thus the second casualty, after wretched Georgia, is the idea of a common European foreign and security policy. 倒霉的格鲁吉亚战争之后还有第二个变故:欧洲共同外交安全政策这一理念。 www.ecocn.org 7. A security label belongs to a security policy and contains a value for each security component in that security policy. 一个安全标签归属于一个安全策略,并且为安全策略中的每个安全组件包含一个值。 www.ibm.com 8. Defines the set of information that constitutes input to security policy decisions. 定义组成对安全策略决策的输入的一组信息。 msdn2.microsoft.com 9. The mobile device tends to loosen its security policy to allow access to device services such as local e-mail boxes. 移动设备可能放松安全策略,以允许访问本地电子邮箱之类的设备服务。 www.ibm.com 10. To grant trust to a network location, you must have administrator privileges and change the security policy at the Machine level. 要向网络位置授予信任,必须具有管理员特权并在计算机级别更改安全策略。 msdn2.microsoft.com 1. You can use the same certificate for multiple solutions, and all the solutions will be trusted with no additional security policy updates. 您可以将相同的凭证用于多个方案,而且不需要额外安全性原则更新就会信任所有方案。 technet.microsoft.com 2. Brennan, a former top official at the Central Intelligence Agency, was dispatched to defend the Obama national security policy this week. 布雷南是前中情局高级官员,本周他被指派来维护奥巴马的国家安全政策。 www.bing.com 3. When overridden in a derived class, gets the security policy for the current application domain. 当在派生类中重写时,获取当前应用程序域的安全策略。 msdn2.microsoft.com 4. Always administer security policy on the lowest policy level that impacts the fewest users and still satisfies your administration scenario. 应始终在影响用户最少而还能满足管理方案要求的最低策略级别上管理安全策略。 msdn2.microsoft.com 5. Negotiations in the European Union Foreign Affairs and Security Policy High Representative Paddy Ashdown (female) between Jalili and Iran. 谈判在欧盟外交事务和安全政策高级代表阿什顿(女)与伊朗代表贾利利之间进行。 www.englishtang.com 6. The project in the network may not have Full Trust permission in the local computer due to its security policy. 网络中的项目可能由于本地计算机的安全策略而没有其“完全可信”许可权。 download.boulder.ibm.com 7. Indicates the evidence object that represents the security policy permissions of the compiled assembly. 指示证据对象,该对象表示编译的程序集的安全策略权限。 msdn2.microsoft.com 8. and carrying out communication between the control terminal and the home gateway by applying the security policy. 控制终端和家庭网关应用安全策略进行通信。 ip.com 9. This article introduced some tools and techniques that can help you maintain your system's adherence to its security policy. 本文介绍了一些可以帮您维持系统遵守安全性策略的工具和技术。 www.ibm.com 10. Hillary Clinton, America's secretary of state, has called development "an integral part of America's national security policy" . 美国国务卿希拉里?克林顿把发展称作“美国国家安全政策不可或缺的一部分”。 www.ecocn.org 1. The alliance, a bedrock of Japanese prosperity and crucial to US security policy in the Pacific, has survived ructions before. 日美同盟是日本繁荣的基石,对于美国的太平洋安全政策也至关重要。 www.ftchinese.com 2. Having stated the previous, it may not be the security policy of some systems to divulge passwords to other users. 某些系统的安全策略可能不允许向其他用户泄露密码。 www.ibm.com 3. Different WLAN security products have been deployed to check the WLAN security policy enforcement. 不同的无线局域网安全产品均已被配置好,用于检查无线局域网安全策略执行情况。 blog.sina.com.cn 4. In Windows XP Service Pack 2, you need to set up a security policy in a separate Control Panel component (firewall). 在WindowsXPServicePack2中,需要在单独的控制面板组件(防火墙)中设置安全性策略。 www.ibm.com 5. Evidence-based security policy and code access security provide very powerful, explicit mechanisms to implement security. 基于证据的安全策略和代码访问安全性为实现安全性提供了非常强大的显式机制。 msdn2.microsoft.com 6. Still, Obama's greatest contribution so far to national security policy has been tonal. 同样,到目前为止,奥巴马对国家安全政策做出的最大贡献还是看得见的。 www.bing.com 7. For more information about elevating permissions, see General Security Policy Administration. 有关提升权限的更多信息,请参见常规安全策略管理。 msdn2.microsoft.com 8. Management plug-ins provide security, policy enforcement, and extensive logging capabilities. 管理插件提供安全性、策略强制执行和广泛的日志记录能力。 www.ibm.com 9. System administrators then create a "security policy" that specifies what privileges are granted for which security contexts. 然后系统管理员就可以创建一个指定哪些特权授与哪个安全上下文的“安全策略(securitypolicy)”。 www.ibm.com 10. Define the scope by "drawing" a boundary around the security policy. 通过在安全策略的周围“划出”边界来定义范围。 www.ibm.com 1. If default policy is modified, any code that security policy grants less than full trust. 安全策略授予低于完全信任的所有代码(如果修改了默认策略)。 msdn2.microsoft.com 2. This requirement can be used with an organization's security policy regarding e-mail usage. 可以将这一要求与组织对电子邮件的使用而提出的安全策略一起使用。 technet.microsoft.com 3. Administrators configure security policy by managing code groups and their associated permission sets. 管理员通过管理代码组和与它们关联的权限集来配置安全策略。 msdn2.microsoft.com 4. The security policy is used for access control checks, which are performed by the JVM at runtime. 安全策略用于访问控制检查,这是由JVM在运行时执行的。 www.ibm.com 5. A grand strategy will help a country stay on the straight and narrow during every phase of its security policy. 全程落实国安政策时,优越的大战略可以让该国享受苦心孤诣行事的美好成果。 www.360doc.com 6. Request and response processing rules are created to manipulate the SOAP message as required to conform to the desired security policy. 将创建请求和响应处理规则来按照要求操作SOAP消息,以遵循所需的安全策略。 www.ibm.com 7. Understanding the common language runtime's security policy model will help you administer security policy effectively. 了解公共语言运行时的安全策略模型将帮助您有效地管理安全策略。 207.46.16.252 8. Provides a graphical interface for managing. NET Framework security policy and applications that use remoting services. 提供图形界面以管理.NETFramework安全策略和使用远程处理服务的应用程序。 msdn2.microsoft.com 9. Establishing security requirements Introduction evaluation and review of security policy. 建立安全政策的介绍评价和回顾。 www.securitycn.net 10. If your security policy is not defined for these settings, the following table illustrates some best practice values for these settings. 如果你的安全策略中没有定义这些设置,下表给出了对这些设置来说最实用的值。 blog.sina.com.cn 1. Security policy in future versions of the. NET Compact Framework may vary depending on both device and security domain. 在.NETCompactFramework的未来版本中,安全策略可能会根据设备和安全域的不同而改变。 msdn2.microsoft.com 2. Implements the talented person security policy, provides the education development the strategic depth. 实施人才安全策略,提供教育发展的战略纵深。 www.ceps.com.tw 3. An application might require that you add an application-specific code group to security policy. 应用程序可能要求向安全策略中添加应用程序特定的代码组。 msdn2.microsoft.com 4. An alternative to creating nested OUs is to use the security group deployment method for Client Security policy. 除了创建嵌套OU外,您也可以对ClientSecurity策略使用安全组部署方法。 technet.microsoft.com 5. This error occurs when security policy settings on the SMTP server allow only authenticated users to submit mail for subsequent delivery. 当SMTP服务器中的安全策略设置仅允许经过身份验证的用户提交邮件以进行后续传递时,会出现此错误。 msdn2.microsoft.com 6. Gets or sets the configuration file reference that contains the security policy settings for the named security level. 获取或设置包含指定安全级别的安全策略设置的配置文件引用。 msdn2.microsoft.com 7. Specifies the configuration file that contains security policy settings for the named security level. 为已命名安全级别指定包含安全策略设置的配置文件。 msdn2.microsoft.com 8. The responsibility of enforcing a system security policy lies with a class called SecurityManager. 由一个名为SecurityManager的类负责实施系统安全策略。 www.ibm.com 9. This Client offers Endpoint Policy Enforcement for monitoring the centrally specified security policy. 此客户端提供端点政策执行监测中心指定的安全策略。 www.opda.net.cn 10. Explains how the security policy of the. NET Compact works for devices. 解释.NETCompact的安全策略如何对设备发生作用。 msdn2.microsoft.com 1. There can be a maximum of 16 unique security components in a security policy. 一个安全策略中最多可以有16个不同的安全组件。 www.ibm.com 2. Code groups are the building blocks of code access security policy. 代码组是代码访问安全策略的构造块。 msdn2.microsoft.com 3. Enables administrators to configure security policy by associating sets of permissions with groups of code (code groups). 使管理员能够通过将权限集与代码组关联来配置安全策略。 msdn2.microsoft.com 4. Improved security allowing administrators to enforce security policy across devices. 改进的安全性,管理员可以跨越设备强制应用安全策略 www.infoq.com 5. Security policy levels: enterprise, machine, user, and sometimes application domain. 安全策略级别:企业、计算机、用户,有时还有应用程序域。 technet.microsoft.com 6. Full trust. Full-trust applications are granted unrestricted code access permissions by code access security policy. 代码访问安全策略为完全信任级别的应用程序授予的代码访问权限是没有限制的。 msdn2.microsoft.com 7. Trust-Management uses a uniform "Security Policy Specification Language" to describe security policy. 它使用一种统一的“安全策略说明语言”来描述应用的安全策略。 www.fabiao.net 8. Security policy is the configurable set of rules that the common language runtime follows when it decides what it will allow code to do. 安全策略是一组可配置的规则,公共语言运行库在决定允许代码执行的操作时遵循此规则。 msdn2.microsoft.com 9. Object that contains evidence mapped through the security policy to establish a top-of-stack permission set. 对象,包含通过安全策略映射的证据,这些证据用于建立堆栈顶层的权限集。 msdn2.microsoft.com 10. Evidence is the set of information that constitutes input to security policy decisions, such as what permissions can be granted to code. 证据是组成安全策略决策的输入(如可授予代码什么权限)的信息集。 msdn2.microsoft.com 1. Hosts can set both code-access security policy and role-based security policy for a domain. 宿主可以为域设置代码访问安全策略和基于角色的安全策略。 technet.microsoft.com 2. We need a new immigration policy that complements our national security policy as well as our economic policy. 我们所需要的移民政策应当是能够对国家安全政策和经济政策起到补充作用的。 www.chinaelections.org 3. Operational support for logging, tracing message exchanges, and enforcement of security policy. 为日志记录、跟踪消息交换以及安全性策略实施提供操作支持。 www.ibm.com 4. The default security policy provides adequate security for your computer, and you should change it only when necessary. 预设安全性原则为您的电脑提供足够的安全性,而您应该只在有必要时才变更它。 technet.microsoft.com 5. Improved installation packages, and added support for group security policy installation. 改善安装包,并增加对小组安全政策安装的支持。 www.cnfan.org 6. Through the noninterference theory, it is proved that the model meets multilevel security policy. 通过不干扰原理对模型的安全性进行了证明。 www.ceps.com.tw 7. The abstract class java. security. Policy is used to represent a security policy for an application. 抽象类java.security.Policy被用于表示应用程序的安全性策略。 www.ibm.com 8. Tivoli Access Manager contains a security policy which defines access to a domain. TivoliAccessManager包含一个安全策略,它定义了对域的访问。 www.ibm.com 9. Describes. NET Framework code access security, role-based security, security policy, and security tools. 描述.NETFramework代码访问安全性、基于角色的安全性、安全策略和安全工具。 msdn2.microsoft.com 10. Although this provides relevant security through the end-to-end communication link, the books-seller's security policy is violated. 虽然这种方法在端对端通信链路中提供了适当的安全性,但违反了图书销售商的安全性策略。 www.ibm.com 1. Visual Studio Tools for Office then makes the appropriate changes to the security policy for the new location. VisualStudioToolsforOffice然后对新位置的安全策略做适当更改。 msdn2.microsoft.com 2. The runtime helps ensure that code can access only the resources and call only the code allowed by security policy. 运行库帮助确保代码只能访问或调用安全策略允许的资源或代码。 msdn2.microsoft.com 3. Thus, each version of the. NET Framework has separate security policy configuration files. 因此,每个.NETFramework版本都具有单独的安全性策略配置文件。 msdn2.microsoft.com 4. A fourth type of policy rule, called an authorization rule, in the Security Policy Editor specifies the query execution privilege. 在SecurityPolicyEditor中,第四种策略规则类型是授权规则,它们指定查询执行权限。 www.ibm.com 5. You might want to add booleans so your end user could modify the security policy depending on his security goals for the application. 你可以添加布尔值让你的终端用户可以按照他们的安全目标修改安全策略。 dictsearch.appspot.com 6. Specifies an evidence object that represents the security policy permissions to grant the compiled assembly. 指定一个证据对象,该对象表示要授予已编译的程序集的安全策略权限。 msdn2.microsoft.com 7. Visual Studio Tools for Office automatically changes your security policy to trust the solution in the temporary location. VisualStudioToolsforOffice将自动更改安全策略以信任临时位置中的解决方案。 msdn2.microsoft.com 8. Also, WLAN security policy elements can be correlated to WLAN security layers. 而且,无线局域网安全策略要素与无线局域网安全层相关。 blog.sina.com.cn 9. Implement, configure, manage, and troubleshoot local security policy. 配置和管理本地安全策略及故障排除。 xzc.2000y.net 10. Use none of the security policy components. 不使用其中任何一个安全策略组件。 msdn2.microsoft.com 1. This value is defined by security policy and is configurable by administrators. 这个值由安全性原则定义,并可由系统管理员设定。 technet.microsoft.com 2. Describes the factors that would influence your decision to modify the default security policy. 描述会影响修改预设安全性原则决定的因素。 technet.microsoft.com 3. Tell security policy what code should be granted to your custom permission. 通知安全策略应当向您的自定义权限授予什么代码。 msdn2.microsoft.com 4. Security policy is expressed using three policy levels: machine policy, user policy, and enterprise policy. 安全策略使用三个策略级别来表示:计算机策略、用户策略和企业策略。 msdn2.microsoft.com 5. The settings are local because they are not published as part of the security policy of the service and do not affect the client's binding. 这些设置并非作为安全策略的组成部分而发布,而且不影响客户端绑定,因此是本地的。 technet.microsoft.com 6. Specifies the security policy components to be used by the host security manager. 指定将由宿主安全管理器使用的安全策略组件。 msdn2.microsoft.com 7. The configuration file that contains security policy settings for the named security level. 包含指定安全级别的安全策略设置的配置文件。 msdn2.microsoft.com 8. In contrary, it encourages site administrators to carefully choose the security policy and use one that fits their needs best. 相反它鼓励站点系统管理员小心的选择安全策略并且使用一个最适合他们需求的策略。 wiki.ubuntu.org.cn 9. Defines a collection of mappings between security policy files and the trust level names for the security policy files. 定义一个安全策略文件与其信任级别名称之间的映射的集合。 msdn2.microsoft.com 10. The granted permissions are determined by both the requested permissions and what is allowed by the security policy configuration. 授予的权限由所请求的权限和安全策略配置所允许的权限来确定。 msdn2.microsoft.com 1. Code signing is the next essential element in J2ME's application security policy. 代码签名是J2ME应用程序安全性策略中下一个重要元素。 www.ibm.com 2. After the security policy is modified in this manner, the highly trusted control will receive sufficient permission to execute. 以此方式修改安全策略后,高度信任控件将收到足够的权限以便执行。 msdn2.microsoft.com 3. Configuring security policy to the system. 正在给系统配置安全策略。 www.fan6.net 4. Security penalties for not complying with all of the security policy's terms and conditions. 对不遵守安全策略的条款和条件的处罚。 www.ibm.com 5. Check to determine whether the security policy has been already set. 检查以确定是否已设置安全策略。 msdn2.microsoft.com 6. Facebook made a change in its security policy last week. 上周脸书在安全策略上做了改变。 eng.daniel-gu.ws 7. View and modify security policy for the Domain Controllers organizational unit. 为域控制器组织单位查看并更改安全性策略。 angel.w15.5tom.cn 8. Depending on what your code does, you may also need to adjust the code access security policy so the assembly code can execute successfully. 根据代码的任务,您可能还需要调整代码访问安全策略,以便程序集代码可以顺利执行。 msdn2.microsoft.com 9. Administrators and developers can define custom evidence and extend security policy to recognize and use it. 管理员和开发人员可以定义自定义证据,并可通过扩展安全策略来识别和使用该证据。 msdn2.microsoft.com 10. The permissions that managed code receives are determined by the security policy in effect. 属性传递。托管代码接收的权限由有效的安全策略确定。 msdn2.microsoft.com 1. Each security policy level has a set of permission sets that can be associated with code groups on that level. 每一个安全性原则层级都有一组使用权限集合,可以在那层级与程式码群组产生关联。 technet.microsoft.com 2. His "democratic security" policy has seen the government take control of territory that was in the grip of these illegal armies. 他的「民主安全」政策已经使政府掌控了过去由这些非法部队控制的领土。 club.topsage.com 3. Even a more autonomous security policy, out from under America's wing, is almost a non-starter. 即使是在美国庇护的前提下,做出一个更为自主的国土安全问题的决议,也是不可能的。 www.bing.com 4. Congress has appointed a bipartisan commission to examine the role of nuclear weapons in future U. S. security policy. 美国国会已任命了一个两党委员会,就核武器对美国未来安全政策的作用进行审查。 www.america.gov 5. The ultimate arbiters of foreign and security policy in Pakistan have long been the army and intelligence services. 长久以来,巴基斯坦的军队和情报机关一直是外交和安全政策的决定者。 www.ecocn.org 6. Describes several factors influencing security policy for devices. 描述影响设备安全策略的若干因素。 msdn2.microsoft.com 7. The security requirements mentioned in the previous scenario can be realized using the Security Policy Editor as follows. 可以按照下面的说明使用SecurityPolicyEditor实现前面场景中的安全需求。 www.ibm.com 8. A cloud security policy focuses on managing users, protecting data, and securing virtual machines. 云安全策略主要关注用户管理、数据保护和虚拟机保护。 www.ibm.com 9. Adds a mapping between a security level name and the associated policy file to the collection of security policy mappings. 向安全策略映射集合添加安全级别名称与关联策略文件之间的映射。 msdn2.microsoft.com 10. Update the security policy on the computer to grant full trust to the assembly, and any dependent assemblies. 更新计算机上的安全策略,向该程序集和任何关联的程序集授予完全信任权限。 msdn2.microsoft.com 1. Discusses the best manner for deploying security policy changes. 讨论部署安全策略更改的最佳方式。 msdn2.microsoft.com 2. You must grant appropriate trust in the security policy of each end user to the assembly that contains the typed dataset. 必须在最终用户的安全策略中为包含类型化数据集的程序集授予合适的信任级别。 msdn2.microsoft.com 3. Evidence mapped through the security policy to establish a top-of-stack permission set. 通过安全策略映射的证据,用于建立堆栈顶层的权限集。 msdn2.microsoft.com 4. Based on the evidence, the common language runtime security manager maps the assembly to a code group based on security policy. 根据证据,公共语言运行库安全管理器基于安全策略将程序集映射到代码组。 msdn2.microsoft.com 5. For more information about evidence, code groups, and permission sets, see Security Policy Model. 有关证据、代码组和权限集的更多信息,请参见安全策略模型。 technet.microsoft.com 6. For more information on adding custom permissions to your security policy, see Updating Security Policy. 有关将自定义权限添加到安全策略的更多信息,请参见更新安全策略。 technet.microsoft.com 7. College can notice the importance of this would-be accident and carry out some make up security policy as soon as possible. 学院能够注意到这个事件的重要性并且尽快实施安全政策。 www.0580club.com 8. Gets or sets a value indicating whether permission to alter or manipulate domain security policy is declared. 获取或设置一个值,该值指示是否声明了改变或操作域安全策略的权限。 msdn2.microsoft.com 9. The wizard will make adjustments to the portion of your computer's security policy reserved for you, the current user. 向导将对计算机上为您(即当前用户)保留的安全策略部分进行调整。 www.ok06.com 10. For more information about default security settings, see Default Security Policy. 如需预设安全性设定的详细资讯,请参阅预设安全性原则。 technet.microsoft.com 1. Security policy also determines which permissions to grant to application domains. 安全策略还确定授予应用程序域的权限。 msdn2.microsoft.com 2. Open Local Security Policy, select the Local Policies folder, and then double-click User Rights Assignment. 打开“本地安全策略”,选择“本地策略”文件夹,然后双击“用户权利指派”。 technet.microsoft.com 3. Custom assembly evidence and field- replaceable security policy . 自定义程序集证据和可以现场更换的安全策略。 www.bing.com 4. Establishes the security policy level for this application domain. 为此应用程序域确定安全策略级别。 msdn2.microsoft.com 5. Administrators can use named permission sets to establish or modify the security policy for code groups. 系统管理员可以使用具名使用权限集合来建立或修改程式码群组的安全性原则。 technet.microsoft.com 6. Deploying Client Security policy at the site level is not supported. 不支持在站点级别部署ClientSecurity策略。 technet.microsoft.com 7. You will update your security policy to grant full trust permission to the assembly in a later step. 您将在稍后的步骤中更新安全策略以授予该程序集完全信任权限。 msdn2.microsoft.com 8. Migrates security policy between two compatible versions of the. NET Framework. 在两个相兼容的.NETFramework版本之间迁移安全策略。 msdn2.microsoft.com 9. Security policy and personnel were responsible for numerous human rights abuses . 这些安全政策和人员对众多人权侵犯负责。 dictsearch.appspot.com 10. For more information about default Internet security policy, see Security Policy. 有关默认Internet安全策略的更多信息,请参见安全策略。 msdn2.microsoft.com 1. Always establish a security policy before you perform a vulnerability assessment. 在您执行漏洞评估之前,一定要确立一条安全策略。 www.ibm.com 2. Before configuring security policy, you should become familiar with the concepts described in Security Policy Management. 在设定安全性原则之前,您应该熟悉描述于安全性原则管理中的概念。 technet.microsoft.com 3. Describes some basic guidelines to use when administering security policy. 描述管理安全策略时使用的一些基本准则。 msdn2.microsoft.com 4. You can view, add, remove, and change code groups for a security policy. 您可以查看、添加、移除和更改一个安全策略的代码组。 msdn2.microsoft.com 5. Sugroups provides one method of implementing and managing the security policy on your systems. sugroup提供一种在系统上实现和管理安全策略的方法。 www.ibm.com 6. Update security policy to be aware of the custom permission. 更新安全策略以便识别自定义权限。 msdn2.microsoft.com 7. All users must quit and then restart all Office applications before security policy changes are enforced. 所有用户必须退出并重新启动所有Office应用程序,对安全策略所做的更改才会生效。 msdn2.microsoft.com 8. These run time policy decisions are made through the java. security. Policy class. 这些运行时策略决策是通过java.security.Policy类作出的。 www.ibm.com 9. Do not change the security policy in your computer. 不要更改计算机中的安全策略。。 msdn2.microsoft.com 10. The Visual Studio Tools for Office Project Wizard modifies security policy at the User level. “VisualStudioToolsforOffice项目向导”在用户级别上修改安全策略。 msdn2.microsoft.com 1. Default settings in the local security policy prevent samples from running across machines. 本地安全策略中的默认设置阻止示例跨计算机运行。 msdn2.microsoft.com 2. Note that you must have a domain controller present on your network to deploy security policy using Group Policy. 注意,您的网络中必须有一个域控制器,才能使用组策略部署安全策略。 msdn2.microsoft.com 3. Represents the event code indicating that the security policy file has changed. 表示的是指示安全策略文件已更改的事件代码。 msdn2.microsoft.com 4. Some people suggest using random passwords for ordinary user accounts is good security policy. 一些人认为对于普通用户账户使用随机密码是良好的安全策略。 www.ibm.com 5. Represents the security policy levels for the common language runtime. 表示公共语言运行库的安全策略级别。 msdn2.microsoft.com 6. Gets or sets a value indicating whether permission to view and manipulate security policy is declared. 获取或设置一个值,该值指示是否声明了查看并操作安全策略的权限。 msdn2.microsoft.com 7. After you've got a security policy, define personae and workflows. 获得安全策略后,就要定义角色和工作流。 www.ibm.com 8. Describes several factors that influence security policy for devices. 介绍影响设备安全策略的若干因素。 msdn2.microsoft.com 9. The Add GPO button allows the administrator to choose an existing GPO to merge the Client Security policy into. “添加GPO”按钮允许管理员选择要将ClientSecurity策略合并到的现有GPO。 technet.microsoft.com 10. Code that is not verifiably type-safe can attempt to execute if security policy allows the code to bypass verification. 如果安全策略允许未被验证为类型安全的代码跳过验证,则可尝试执行此类代码。 msdn2.microsoft.com |
||||||||||||||||
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。