[go: up one dir, main page]

Jeloka et al. - Google Patents

Oracle Label Security Administrator's Guide, 11g Release 2 (11.2) E10745-03

Jeloka et al.

View PDF
Document ID
5259308865269395402
Author
Jeloka S
Sirmukaddam H
Huey P
Kamani M
Tbeileh K
Kethana L

External Links

Snippet

Oracle Label Security Administrator’s Guide Page 1 Oracle® Label Security Administrator’s Guide 11g Release 2 (11.2) E10745-03 June 2012 Page 2 Oracle Label Security Administrator's Guide, 11g Release 2 (11.2) E10745-03 Copyright © 2000, 2012, Oracle and/or its affiliates. All …
Continue reading at ksj.myds.me (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30289Database design, administration or maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/468Specific access rights for resources, e.g. using capability register

Similar Documents

Publication Publication Date Title
Baldwin Naming and Grouping Privileges to Simplify Security Management in Large Databases.
Ferraiolo et al. A role-based access control model and reference implementation within a corporate intranet
US8306999B2 (en) Computer-implemented systems, methods, and computer program product for providing row-level security in a database network
Downs et al. Issues in discretionary access control
US6202066B1 (en) Implementation of role/group permission association using object access type
US6976023B2 (en) System and method for managing application specific privileges in a content management system
EP2059881B1 (en) Method for managing simultaneous modification of database objects during development
US7284265B2 (en) System and method for incremental refresh of a compiled access control table in a content management system
US20020083059A1 (en) Workflow access control
US20030200443A1 (en) System and method for configurable binding of access control lists in a content management system
WO2015005765A2 (en) Security model switching for database management system
Jeloka et al. Oracle Label Security Administrator's Guide, 11g Release 2 (11.2) E10745-03
Jeloka et al. Oracle Label Security Administrator's Guide, 11g Release 2 (11.2) E10745-02
Jeloka et al. Oracle Label Security Administrator’s Guide, 11g Release 1 (11.1) B28529-01
Jeloka et al. Oracle Label Security Administrator's Guide, 11g Release 2 (11.2) E10745-04
Jeloka et al. Oracle Label Security Administrator’s Guide 10g Release 2 (10.2) B14267-01
Jeloka et al. Oracle Label Security Administrator’s Guide 10g Release 2 (10.2) B14267-02
Guide Oracle® Label Security
Goyal et al. Access control in distributed heterogeneous database management systems
Carter SQL Server Security Model
Huey Oracle Database Vault Administrator's Guide 11g Release 2 (11.2) E23090-13
Huey Oracle Database Vault Administrator's Guide 11g Release 2 (11.2) E23090-12
Huey Oracle Database Vault Administrator's Guide 11g Release 2 (11.2) E16544-01
Huey Oracle Database Vault Administrator's Guide 11g Release 2 (11.2) E10576-02
Huey Oracle Database Vault Administrator's Guide 11g Release 2 (11.2) E10576-01