2/28
List of Examples
4-1 Unauthorized User Trying to Create a Table
4-2 Unauthorized User Trying to Use the DELETE ANY TABLE Privilege
4-3 Authorized User Performing DELETE Operation
7-1 Using DVSYS.GET_FACTOR to Retrieve a Factor
14-1 Creating a Realm Using DBMS_MACUTL Constants
14-2 Creating a Rule Set Using DBMS_MACUTL Constants
14-3 Creating a Factor Using DBMS_MACUTL Constants
C-1 Creating a Command Rule to Deny Access to CREATE DATABASE LINK
C-2 Creating a Command Rule to Enable Access to CREATE DATABASE LINK
C-3 Command Rules to Disable and Enable Access to CREATE DIRECTORY
C-4 Adding Rules to the Existing ALTER SYSTEM Command Rule
C-5 Query to Identify Java Stored Procedures with Definers Rights
C-6 Creating a PL/SQL Wrapper
C-7 Identifying Java Stored Procedures with Invoker's Rights
C-8 Testing Oracle Database Vault Protection for Java Stored Procedures
C-9 Identifying External C Callouts That Are Wrapped by PL/SQL Packages
C-10 Creating a PL/SQL Wrapper
C-11 Identifying External C Callouts That Are Wrapped by PL/SQL Packages
C-12 Testing Oracle Database Security for an External C Callout
Scripting on this page enhances content navigation, but does not change the content in any way.