dcsimg

Oracle Row Level Security: Part 2

November 18, 2003

[From SecurityFocus]

Continuing from Part One In part one of this short article series we looked at some of the advantages of Oracle's row level security, what it can be used for, and looked at a simple example of how it works. We'll conclude this series by testing the policies that have been setup, demonstrate a few of the data dictionary views that allow for management and monitoring, cover some other issues and features, and then see if the data can be viewed by hackers or malicious users through the use of trace files.

Please take a look at part one before continuing on, review the example that was previously created and you'll see where we left off.

Looking around
Now we will demonstrate a few of the data dictionary views that allow management and monitoring of policies and contexts.

The article continues at http://www.securityfocus.com/infocus/1744








The Network for Technology Professionals

Search:

About Internet.com

Legal Notices, Licensing, Permissions, Privacy Policy.
Advertise | Newsletters | E-mail Offers