Planning Security

From InterBase
Jump to: navigation, search

Go Up to Data Definition Guide


This chapter discusses the following topics:

  • SQL access privileges
  • Granting access to a table
  • Granting privileges to execute stored procedures
  • Granting access to views
  • Revoking access to tables and views
  • Using views to restrict data access
  • Additional security measures
Note: For information about the InterBase encryption feature, which enables encryption at the database and column levels, and about the privileges needed to grant and revoke encrypt and decrypt permissions, see Encrypting Your Data.

Topics


Advance To: