Implementing Database Security and Auditing: Using Granular Access Control

Implementing Database Security and Auditing: Using Granular Access Control

Cover

In this white paper you’ll see that granular access control can only be achieved through aligning the application user model with the database security system. You’ll see why this is so important, what methods exist to communicate the application user information to the database security system, and how to use this information to implement granular access control. You’ll also read some of the broader issues pertaining to the user directories and identity management.

Vendor:
Guardium, an IBM Company
Posted:
27 Sep 2010
Published:
27 Sep 2010
Format:
PDF
Length:
27 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy