O'Reilly logo

Apache Derby—Off to the Races: Includes Details of IBM® Cloudscape™ by Dan Scott, George Baklarz, Paul C. Zikopoulos

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Introduction

Security is an important consideration whenever data is stored in a relational database management system. In this chapter, we discuss controlling data access using many different methods.

Security for a database can be configured at a physical or a logical level:

  • Physical— Physical security refers to the underlying disk and file structures on which the database depends. Access to these objects is typically restricted by the operating system. Access to the system might also be limited by the connectivity that is allowed from outside clients. The system could be configured to restrict use to local users or applications only.

  • Logical— Logical security refers to security that is implemented within the database or an outside security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required