Jeloka et al. - Google Patents
Oracle Label Security Administrator's Guide 10g Release 2 (10.2) B14267-02Jeloka et al.
View PDF- Document ID
- 16848415602001046029
- Author
- Jeloka S
- Smith R
External Links
Snippet
Oracle Label Security Administrator’s Guide Page 1 Oracle® Label Security Administrator’s
Guide 10g Release 2 (10.2) B14267-02 May 2006 Page 2 Oracle Label Security Administrator’s
Guide 10g Release 2 (10.2) B14267-02 Copyright © 2000, 2006, Oracle. All rights reserved …
- 238000000034 method 0 description 39
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30477—Query execution
- G06F17/30507—Applying rules; deductive queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30389—Query formulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30289—Database design, administration or maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ferrari | Access Control in Data Management Systems: A Visual Querying Perspective | |
Baldwin | Naming and Grouping Privileges to Simplify Security Management in Large Databases. | |
US8306999B2 (en) | Computer-implemented systems, methods, and computer program product for providing row-level security in a database network | |
US7836078B2 (en) | Techniques for managing access to physical data via a data abstraction model | |
US20040181544A1 (en) | Schema server object model | |
US7284265B2 (en) | System and method for incremental refresh of a compiled access control table in a content management system | |
US20100185678A1 (en) | Query conditions-based security | |
US7873631B2 (en) | Abstractly mapped physical data fields | |
Muppala | SQL Database Mastery: Relational Architectures, Optimization Techniques, and Cloud-Based Applications | |
Rosenthal et al. | Administering permissions for distributed data: Factoring and automated inference | |
WO2015005765A2 (en) | Security model switching for database management system | |
Jeloka et al. | Oracle Label Security Administrator’s Guide 10g Release 2 (10.2) B14267-02 | |
Jeloka et al. | Oracle Label Security Administrator’s Guide 10g Release 2 (10.2) B14267-01 | |
Jeloka et al. | Oracle Label Security Administrator’s Guide, 11g Release 1 (11.1) B28529-01 | |
Jeloka et al. | Oracle Label Security Administrator's Guide, 11g Release 2 (11.2) E10745-02 | |
Jeloka et al. | Oracle Label Security Administrator's Guide, 11g Release 2 (11.2) E10745-03 | |
Jeloka et al. | Oracle Label Security Administrator's Guide, 11g Release 2 (11.2) E10745-04 | |
Guide | Oracle® Label Security | |
Goyal et al. | Access control in distributed heterogeneous database management systems | |
Huey | Oracle Database Vault Administrator's Guide 11g Release 2 (11.2) E16544-01 | |
Badnar et al. | Oracle Database Vault Administrator’s Guide 10g Release 2 (10.2) B25166-09 | |
Huey | Oracle Database Vault Administrator's Guide 11g Release 2 (11.2) E10576-02 | |
Huey | Oracle Database Vault Administrator's Guide 11g Release 2 (11.2) E10576-01 | |
Huey | Oracle Database Vault Administrator's Guide 11g Release 2 (11.2) E23090-13 | |
Huey | Oracle Database Vault Administrator's Guide 11g Release 2 (11.2) E23090-12 |