Skip to content

Latest commit

 

History

History
28 lines (14 loc) · 3.6 KB

securable.md

File metadata and controls

28 lines (14 loc) · 3.6 KB

securable

Please help us improve the quality of example sentences! Edit on Github

所有的安全资源有一个比空安全描述符更好的描述符。All the securable resources have a better than null security descriptor.

最后综合考虑确定出各个区块的合理安全泥浆密度窗口。Eventually, reasonable and securable drilling mud destiny of different blocks can be ascertained.

每个可保护对象都具有可使用权限语句授予主体的权限。Every securable object has permissions that can be granted to a principal using permission statements.

模拟允许此线程与安全对象交互时用客户端的安全上下文。Impersonation allows the thread to interact with securable objects using the client's security context.

默认情况下,系统用主令牌当一个进程的线程与一个安全对象相互作用时。By default, the system uses the primary token when a thread of the process interacts with a securable object.

每一类的安全物件都有一组对应至该类物件专属作业的存取权限。Each type of securable object has a set of access rights that correspond to operations specific to that type of object.

此内置函数将测试当前主体对于指定的安全对象是否具有特定的有效权限。This built-in function tests whether the current principal has a particular effective permission on a specified securable.

实际运行表明,该一体化管理结构安全可靠,完全满足ACR的一体化管理要求。Experimental results show that the INMF is reliable, securable and can fully satisfy the integrated management requirement of the ACR.

授权是指决定主体可存取哪些安全性实体资源,以及允许针对这些资源进行哪些作业的程序。Authorization is the process of determining which securable resources a principal can access, and which operations are allowed for those resources.

结果分析表明,传统可靠度分析结果偏于不安全,而利用模糊随机可靠度来评价边坡稳定状况更趋于合理性。It is found that results of the traditional reliability method are less securable and those of fuzzy-random reliability method are more reasonable.

其次,可持续发展首先是一种发展,对于发展中国家来说,经济持续稳定增长是可持续发展的必要条件。Sustainable development is a dynamic course, to constitute the indicator system must be provided with administrative levels and securable attribution.

除了这些对象特定的访问权限外,还有一组标准访问权限,这些权限与大多数安全对象类型所共有的操作相对应。In addition to these object-specific access rights, there is a set of standard access rights that correspond to operations common to most types of securable objects.