| 1. | Applications should run with the least privilege necessary to get the work done 应使用使应用程序正常工作所需的最小特权来运行应用程序。 |
| 2. | Emphasizes controlling access through least privilege and compartmentalization principles 4 and 5 , respectively 强调对通过最小特权(原则4 )和分隔(原则5 )的访问进行控制。 |
| 3. | The exploit allows a cheating player to calculate the exact deck being used for each hand in real time 在这里供应商几乎不会实践最小特权原则,因为他们那方面要花太多的精力。 |
| 4. | You should assign the minimum necessary privileges to a user id that connects to the sql server membership database 应将必需的最小特权分配给连接到sql server成员资格数据库的用户id 。 |
| 5. | We recommend that you assign the minimum necessary privileges to the user id that connects to the sql server profile database 建议为连接到sql server配置文件数据库的用户id分配所需的最小特权。 |
| 6. | Based on analysis of the classical role - management model - rbac , least - privilege management is implemented in seclinux 首先分析了角色管理的经典模型rbac ,在此基础上设计并实现了seclinux的最小特权管理。 |
| 7. | They focused on the principles of least privilege and compartmentalization , both of which can help you design high - quality access models ,他们主要讨论了最小特权原则和分隔的原则,这二者都可以帮助您设计高质量的访问模型。 |
| 8. | Click this check box to implement the principle of least privileges , where sql server services are granted the minimum permissions they need to complete their tasks 单击此复选框将实现最小特权原则,即sql server服务被授予完成其任务所需的最低权限。 |
| 9. | The reasoning behind the upswing in the seed space is exactly the same as with cryptographic keys : the more bits you use , the harder both keys are to break as long as everything is being used properly Unix系统中出现过一些违反最小特权原则的最著名情况。例如,在unix系统上,您一般需要root特权才能在小于1024的端口号上运行服务。 |
| 10. | In the implementation of the blp model , the authority of the credible subject must be controlled . we extended the concepts of the privilege and the role as the second improving to the blp . the rule of the least privilege is applied 在blp模型的具体实现中,还必须控制可信主体的权限,为此,我们提出的对blp模型另一改进方法是特权和角色扩展,增加特权和角色的概念,实施最小特权原则。 |