learn linux and unix commands - unix shell scripting

Implementing Row-Level Security in Java Applications


 
Thread Tools Search this Thread
# 1  
Old 04-06-2008
Implementing Row-Level Security in Java Applications

Learn how to enforce row-level security across your JEE application, from database to cache. From Oracle Fusion Middleware Regional Director Lonneke Dikmans.

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

4 More Discussions You Might Find Interesting

1. Programming

Java Applications and Xterm

I spent a ton of time developing a java application as an interface to a unix file system. We use xterm and I use a lot of swing elements to make the interface user friendly. The user will start the java application from the command-line in xterm and the application opens in its own JFrame. ... (1 Reply)
Discussion started by: nwboy74
1 Replies

2. Programming

Berkeley database + row level locking

Hello all, Any idea with which release of BDB row/record level locking was introduced? Am sure many/somebody are working with BDB. I tried searching the forum and this what I could get. https://www.unix.com/software-releases-rss-news/88232-berkeley-db-java-edition-3-3-74-default-branch.html... (1 Reply)
Discussion started by: matrixmadhan
1 Replies

3. Cybersecurity

Ubuntu folder level security

I have installed ubuntu. And I have create users ans groups. Suppose if the user enter into through Putty SSH. He should have access only to home folder and cannot move to other than $HOME. User should not able to root files and /$ files. Kindly provide solution. Regards Vasanth kumar (3 Replies)
Discussion started by: vasanthrj
3 Replies

4. UNIX for Dummies Questions & Answers

What kind of security applications UNIX and Windows have in common?

Hi guys, may I know what kind of security applications do UNIX and Windows have in common? This is related to a project that is approaching its deadline, so would you all please be kind enough to help me? Thank You. (0 Replies)
Discussion started by: austintham
0 Replies
Login or Register to Ask a Question
SECMOD.DB(5)						     Network Security Services						      SECMOD.DB(5)

NAME
secmod.db - Legacy NSS security modules database DESCRIPTION
secmod.db is an NSS security modules database. The security modules database is used to keep track of the NSS security modules. The NSS security modules export their services via the PKCS #11 API which NSS uses as its Services Provider Interface. The command line utility modutil is used for managing PKCS #11 module information both within secmod.db files and within hardware tokens. For new applications the recommended way of tracking security modules is via the pkcs11.txt configuration file used in conjunction the new sqlite-based shared database format for certificate and key databases. FILES
/etc/pki/nssdb/secmod.db SEE ALSO
modutil(1), cert8.db(5), cert9.db(5), key3.db(5), key4.db(5), pkcs11.txt(5) AUTHORS
The nss libraries were written and maintained by developers with Netscape, Red Hat, Sun, Oracle, Mozilla, and Google. Authors: Elio Maldonado <emaldona@redhat.com>. LICENSE
Licensed under the Mozilla Public License, v. 2.0. If a copy of the MPL was not distributed with this file, You can obtain one at http://mozilla.org/MPL/2.0/. nss 3.15.4 17 June 2014 SECMOD.DB(5)