2/37
List of Examples
4-1 Privilege Analysis of Database-Wide Privileges
4-2 Privilege Analysis of Privilege Usage of Two Roles
4-3 Privilege Analysis of Privileges During SQL*Plus Use
4-4 Privilege Analysis of PSMITH Privileges During SQL*Plus Access
5-1 Unauthorized User Trying to Create a Table
5-2 Unauthorized User Trying to Use the DELETE ANY TABLE Privilege
5-3 Authorized User Performing DELETE Operation
8-1 Using DVSYS.GET_FACTOR to Retrieve a Factor
19-1 Creating a Realm Using DBMS_MACUTL Constants
19-2 Creating a Rule Set Using DBMS_MACUTL Constants
19-3 Creating a Factor Using DBMS_MACUTL Constants
D-1 Creating a Command Rule to Deny Access to CREATE DATABASE LINK
D-2 Creating a Command Rule to Enable Access to CREATE DATABASE LINK
D-3 Command Rules to Disable and Enable Access to CREATE DIRECTORY
D-4 Adding Rules to the Existing ALTER SYSTEM Command Rule
E-1 Low Level Oracle Database Vault Realm Violations in a Trace File
E-2 High Level Trace Enabled for Oracle Database Vault Authorization
E-3 Highest Level Traces on Violations on Realm-Protected Objects
Scripting on this page enhances content navigation, but does not change the content in any way.