O'Reilly logo

The Hidden Corporation: A Data Management Security Novel by David Schlesinger

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Basel sat back. So we would tag databases and data extracts based upon the content of the information they were holding. I understand that, but what about these user-entitlements? Are they what we call user-accounts?

Thats the most interesting part, Nancy said. We call them user-accounts, and the business calls them roles, and some other business folks call them transactions, while yet others call them accesses or views, and the system engineers call them authorizations. We obviously have never spoken to each other regarding them or we would be using the same terms. I am calling them user-entitlements as a neutral term that people can accept and understand.

Explain the term entitlement again, asked Basel ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required