Up until this point, we have learned about the large variety of database objects you can create in an Oracle database, as well as how to exploit them in an application. However, if we have no way of making our database objects and applications secure, then their usefulness will be severely limited. If, for example, we developed an application to manage Human Resource information, which allowed any individual to either view all employee salaries, or, even worse, update any employee’s salary, it is doubtful that it would prove popular! In any basic database application, there is usually some subset of information available to the public, some information only available to the author, and a full set of information that is exclusively available to a group of privileged individuals.
KeywordsSecurity Policy Application Context Database Object Database User Grant Option
Unable to display preview. Download preview PDF.