Go to main content
2/29
List of Examples
4-1 Unauthorized User Trying to Create a Table
4-2 Unauthorized User Trying to Use the DELETE ANY TABLE Privilege
4-3 Authorized User Performing DELETE Operation
7-1 Using DVSYS.GET_FACTOR to Retrieve a Factor
14-1 Creating a Realm Using DBMS_MACUTL Constants
14-2 Creating a Rule Set Using DBMS_MACUTL Constants
14-3 Creating a Factor Using DBMS_MACUTL Constants
D-1 Creating a Command Rule to Deny Access to CREATE DATABASE LINK
D-2 Creating a Command Rule to Enable Access to CREATE DATABASE LINK
D-3 Command Rules to Disable and Enable Access to CREATE DIRECTORY
D-4 Adding Rules to the Existing ALTER SYSTEM Command Rule
D-5 Query to Identify Java Stored Procedures with Definers Rights
D-6 Creating a PL/SQL Wrapper
D-7 Identifying Java Stored Procedures with Invoker's Rights
D-8 Testing Oracle Database Vault Protection for Java Stored Procedures
D-9 Identifying External C Callouts That Are Wrapped by PL/SQL Packages
D-10 Creating a PL/SQL Wrapper
D-11 Identifying External C Callouts That Are Wrapped by PL/SQL Packages
D-12 Testing Oracle Database Security for an External C Callout
Scripting on this page enhances content navigation, but does not change the content in any way.