Protected Storage[转]
2004-08-01 12:46
302 查看
PStore
Protected Storage provides applications with an interface to store user data that must be kept secure or free from modification.Units of data stored are called Items. The structure and content of the stored data is opaque to the Protected Storage system. Access to Items is subject to confirmation according to a user-defined Security Style, which specifies what confirmation is required to access the data, such as whether a password is required. In addition, access to Items is subject to an Access rule set. There is an Access rule for each Access Mode: for example, read/write. Access rule sets are composed of Access Clauses. Two kinds of Access Clauses are currently supported: Authenticode and Binary Check of caller. Typically at application setup time, a mechanism is provided to allow a new application to request from the user access to Items that may have been created previously by another application.
Items are uniquely identified by the combination of a Key, Type, Subtype, and Name. The Key is a constant that specifies whether the Item is global to this computer or associated only with this user. The Name is a string, generally chosen by the user. Type and Subtype are GUIDs, generally specified by the application. Additional information about Types and Subtypes is kept in the system registry and include attributes such as Display Name and UI hints. For Subtypes, the parent Type is fixed and included in the system registry as an attribute. The Type group Items is used for a common purpose: for example, Payment or Identification. The Subtype group Items share a common data format.
相关文章推荐
- 千年零一虫
- 用Ole Automation实现Delphi和AutoCad之间的数据交换
- 如何用VB获得机器的MAC地址
- Struts tags (2) ----Bean(1)
- ofbiz(open for business),银弹?人狼?
- 一个画图类,类似ms_chart的线图,适用于科学仿真数据分析(二)
- 一个画图类,类似ms_chart的线图,适用于科学仿真数据分析(一)
- 纯编码实现数据库的建立或压缩
- 移居csdn,今天想到自己的写shell的能力需要提高~
- What is System Administration?
- Industry Leaders Using Internet EDI
- Industry Standards
- Intermidiate EDI--CPFR
- Intermidiate EDI--Web Services
- 利用hook截获进程的API调用
- TCP/IP与ATM设计(二)
- 通过SDK函数实现WIN32应用程序的唯一实例。
- WIN32 SDK - 捕获鼠标离开和滞留等事件
- 一种新颖的技术:Delphi for DOS!!!
- PowerShell 修复 Robocopy的权限问题