oracle官方文档之数据库用户使用oracle组件或第三方应用程序时所需的权限规定

来源:互联网 发布:怎么做淘宝客推广 编辑:程序博客网 时间:2024/05/16 11:54
Oracle® Database Java Developer's Guide
11g Release 2 (11.2)

E10588-07Go to Documentation Home
HomeGo to Book List
Book ListGo to Index
IndexGo to Master Index
Master IndexGo to Feedback page
Contact Us
Go to next page
NextPDF ·Mobi · ePub

Contents

Expand All ·Collapse All

List of Examples

List of Figures

List of Tables

Title and Copyright Information

Click to expandPreface

Click to expand1 Introduction to Java in Oracle Database

Click to expand2 Java Applications on Oracle Database

Click to collapse3 Calling Java Methods in Oracle Database

  • Invoking Java Methods
    • Using PL/SQL Wrappers
    • JNI Support
    • Utilizing SQLJ and JDBC with Java in the Database
      • JDBC
      • SQLJ
      • Example Comparing JDBC and SQLJ
      • Complete SQLJ Example
      • SQLJ Strong Typing Paradigm
      • Translating a SQLJ Program
      • Running a SQLJ Program in the Server
      • Converting a Client Application to Run on the Server
      • Interacting with PL/SQL
    • Using Command-Line Interface
    • Using the Client-Side Stub
  • Debugging Server Applications
  • How To Tell You Are Running on the Server
  • Redirecting Output on the Server
  • Calling Java in the Database Directly

Click to expand4 Java Installation and Configuration

Click to expand5 Developing Java Stored Procedures

Click to expand6 Publishing Java Classes With Call Specifications

Click to expand7 Calling Stored Procedures

Click to expand8 Java Stored Procedures Application Example

Click to expand9 Oracle Database Java Application Performance

Click to collapse10 Security for Oracle Database Java Applications

  • Network Connection Security
  • Database Contents and Oracle JVM Security
    • Java2 Security
    • Setting Permissions
      • Fine-Grain Definition for Each Permission
      • General Permission Definition Assigned to Roles
    • Debugging Permissions
    • Permission for Loading Classes
  • Database Authentication Mechanisms
  • Secure Use of Runtime.exec Functionality in Oracle Database

Click to expand11 Schema Objects and Oracle JVM Utilities

Click to expand12 Database Web Services

Click to expandA DBMS_JAVA Package

Click to expandB Classpath Extensions and User Classloaded Metadata

Index



================================================================================================




Oracle® Database Security Guide
11g Release 2 (11.2)

E36292-04Go to Documentation Home
HomeGo to Book List
Book ListGo to Table of Contents
ContentsGo to Index
IndexGo to Master Index
Master IndexGo to Feedback page
Contact Us


Go to previous page
PreviousGo to next page
NextPDF ·Mobi · ePub

5 Managing Security for Application Developers

This chapter contains:

  • About Application Security Policies

  • Considerations for Using Application-Based Security

  • Securing Passwords in Application Design

  • Managing Application Privileges

  • Creating Secure Application Roles to Control Access to Applications

  • Associating Privileges with User Database Roles

  • Protecting Database Objects by Using Schemas

  • Managing Object Privileges in an Application

  • Parameters for Enhanced Security of Database Communication

注释:oracle官方文档之数据库用户使用oracle组件(还有第三方应用程序??)时所需的权限规定


0 0
原创粉丝点击