Go to main content
2/30
List of Figures
1-1 Scope of Data Security Needs
1-2 Oracle Label Security Architecture
1-3 Oracle Label Security Label-Based Security
1-4 Oracle Database Enterprise Edition Virtual Private Database Technology
2-1 Data Categorization with Levels, Compartments and Groups
2-2 Label Matrix
2-3 Group Example
2-4 Example: Data Labels and User Labels
2-5 How Label Components Interrelate
3-1 Relationships Between Users, Data, and Labels
3-2 User Session Label
3-3 Setting Up Authorized Levels In Enterprise Manager
3-4 Setting Up Authorized Compartments In Enterprise Manager
3-5 Setting Up Authorized Groups in Enterprise Manager
3-6 Subgroup Inheritance of Read/Write Access
3-7 Label Evaluation Process for Read Access
3-8 Label Evaluation Process for Write Access
3-9 Label Evaluation Process for Read Access with COMPACCESS Privilege
3-10 Label Evaluation Process for Write Access with COMPACCESS Privilege
3-11 Stored Program Unit Execution
6-1 Diagram of Oracle Label Security Metadata Storage in Oracle Internet Directory
6-2 Oracle Label Security Policies Applied through Oracle Internet Directory
7-1 Using Enterprise Manager to Configure Oracle Label Security Policies
9-1 Label Evaluation Process for LABEL_UPDATE
13-1 Using Oracle Label Security with a Distributed Database
13-2 Label Tags in a Distributed Database
13-3 Label Components in a Distributed Database
13-4 Use of Materialized Views for Replication
15-1 Read Access Label Evaluation with Inverse Groups
15-2 Write Access Label Evaluation with Inverse Groups
15-3 Read Access Label Evaluation: COMPACCESS Privilege and Inverse Groups
15-4 Write Access Label Evaluation: COMPACCESS Privilege and Inverse Groups
Scripting on this page enhances content navigation, but does not change the content in any way.