Jeloka et al. - Google Patents
Oracle Label Security Administrator's Guide, 11g Release 2 (11.2) E10745-03Jeloka et al.
View PDF- Document ID
- 5259308865269395402
- Author
- Jeloka S
- Sirmukaddam H
- Huey P
- Kamani M
- Tbeileh K
- Kethana L
External Links
Snippet
Oracle Label Security Administrator’s Guide Page 1 Oracle® Label Security Administrator’s
Guide 11g Release 2 (11.2) E10745-03 June 2012 Page 2 Oracle Label Security Administrator's
Guide, 11g Release 2 (11.2) E10745-03 Copyright © 2000, 2012, Oracle and/or its affiliates. All …
- 238000000034 method 0 description 41
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30289—Database design, administration or maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Baldwin | Naming and Grouping Privileges to Simplify Security Management in Large Databases. | |
Ferraiolo et al. | A role-based access control model and reference implementation within a corporate intranet | |
US8306999B2 (en) | Computer-implemented systems, methods, and computer program product for providing row-level security in a database network | |
Downs et al. | Issues in discretionary access control | |
US6202066B1 (en) | Implementation of role/group permission association using object access type | |
US6976023B2 (en) | System and method for managing application specific privileges in a content management system | |
EP2059881B1 (en) | Method for managing simultaneous modification of database objects during development | |
US7284265B2 (en) | System and method for incremental refresh of a compiled access control table in a content management system | |
US20020083059A1 (en) | Workflow access control | |
US20030200443A1 (en) | System and method for configurable binding of access control lists in a content management system | |
WO2015005765A2 (en) | Security model switching for database management system | |
Jeloka et al. | Oracle Label Security Administrator's Guide, 11g Release 2 (11.2) E10745-03 | |
Jeloka et al. | Oracle Label Security Administrator's Guide, 11g Release 2 (11.2) E10745-02 | |
Jeloka et al. | Oracle Label Security Administrator’s Guide, 11g Release 1 (11.1) B28529-01 | |
Jeloka et al. | Oracle Label Security Administrator's Guide, 11g Release 2 (11.2) E10745-04 | |
Jeloka et al. | Oracle Label Security Administrator’s Guide 10g Release 2 (10.2) B14267-01 | |
Jeloka et al. | Oracle Label Security Administrator’s Guide 10g Release 2 (10.2) B14267-02 | |
Guide | Oracle® Label Security | |
Goyal et al. | Access control in distributed heterogeneous database management systems | |
Carter | SQL Server Security Model | |
Huey | Oracle Database Vault Administrator's Guide 11g Release 2 (11.2) E23090-13 | |
Huey | Oracle Database Vault Administrator's Guide 11g Release 2 (11.2) E23090-12 | |
Huey | Oracle Database Vault Administrator's Guide 11g Release 2 (11.2) E16544-01 | |
Huey | Oracle Database Vault Administrator's Guide 11g Release 2 (11.2) E10576-02 | |
Huey | Oracle Database Vault Administrator's Guide 11g Release 2 (11.2) E10576-01 |