Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tags Database Design, Security Rss

   Items 1 to 10 of 10   
 

Row Oriented Security Using Triggers

Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.  Read more...
By R Glen Cooper 2010/04/23 (first published: 2010/04/06) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 6,298 reads

Row Oriented Security Using Triggers

Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.  Read more...
By R Glen Cooper 2010/04/23 (first published: 2010/04/06) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 6,298 reads

Using a Parent Child Hierarchy in SQL Server to Implement a Custom Security Scheme

I have a requirement to implement a custom security scheme where roles and the user's place in the organization hierarchy are used to determine which customers a user can access. In particular the requirements are that a sales person can only access their customers and any other role can access any customer in their level of the organization hierarchy and below. We have a simple hierarchy that is made up of regions and offices. Can you provide us with an example of how to do this?  Read more...
By Additional Articles 2010/03/01 | Source: MSSQLTips.com | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 2,853 reads

What Data Should You Protect?

Perhaps we need to protect more data, according to Steve Jones. With the ability to identify most people with 10 digits of information, Steve Jones asks you to really think about what you need to store.  Read more...
By Steve Jones 2009/08/31 | Source: SQLServerCentral.com | Category: editorial - mp3
Rating: (not yet rated)  Rate this |   Briefcase | 379 reads

What Data Should You Protect?

Perhaps we need to protect more data, according to Steve Jones. With the ability to identify most people with 10 digits of information, Steve Jones asks you to really think about what you need to store.  Read more...
By Steve Jones 2009/08/31 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 139 reads

What Data Should You Protect?

Perhaps we need to protect more data, according to Steve Jones. With the ability to identify most people with 10 digits of information, Steve Jones asks you to really think about what you need to store.  Read more...
By Steve Jones 2009/08/31 | Source: SQLServerCentral.com | Category: editorial - wmv
Rating: (not yet rated)  Rate this |   Briefcase | 300 reads

What Data Should You Protect?

Perhaps we need to protect more data, according to Steve Jones. With the ability to identify most people with 10 digits of information, Steve Jones asks you to really think about what you need to store.  Read more...
By Steve Jones 2009/08/31 | Source: SQLServerCentral.com | Category: editorial - ipod
Rating: (not yet rated)  Rate this |   Briefcase | 288 reads

SQL Stored Procedure to Log Updates, Independent of Database Structure

How many DBAs need a solution to track those changes made for multiple systems? Auditing is becoming more and more prevalent in all systems and having a good solution can really make your DBA job interesting. New author Keren Ramot brings us his technique that works indepedent of the database structure.   Read more...
By Keren Ramot 2007/02/12 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 17,639 reads

SQL Stored Procedure to Log Updates, Independent of Database Structure

How many DBAs need a solution to track those changes made for multiple systems? Auditing is becoming more and more prevalent in all systems and having a good solution can really make your DBA job interesting. New author Keren Ramot brings us his technique that works indepedent of the database structure.   Read more...
By Keren Ramot 2007/02/12 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 17,639 reads

Implementing Row- and Cell-Level Security in Classified Databases Usin

This paper describes how SQL Server 2005 can be used to support row- and cell-level security (RLS/CLS). The examples provided in this white paper show how RLS and CLS can be used to meet classified database security requirements.  Read more...
By Additional Articles 2006/02/02 | Source: MSDN Communities | Category: advanced
Rating:  Rate this |   Briefcase | 2,381 reads
   Items 1 to 10 of 10   
 
Tags
advanced (2)    
editorial (1)    
editorial - ipod (1)    
editorial - mp3 (1)    
editorial - wmv (1)    
sql server 2005 (1)    
strategies (1)