O'Reilly logo

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java by David Coffin

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security Structures for the HR User

Our working model of application encryption will consist of reading data from the HR schema, with sensitive columns being encrypted as they are transmitted across the network. Part of the responsibility falls to the application developers who must assure that sensitive data is only available to the client in encrypted form. Our application security schema, appsec, can provide the tools, but our application developers, like HR, will need to implement them.

Let's explore what HR does to encrypt his data first. Then We'll look at what the Application Security manager can provide to all application developers as a template for implementing this.

Exploring Privileges That Enable HR Tasks

HR, as provided by Oracle, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required