3/32
List of Figures
1-1 Oracle Label Security Label-Based Security
1-2 Oracle Label Security Architecture
1-3 Using Enterprise Manager to Configure Oracle Label Security Policies
2-1 Data Categorization with Levels, Compartments and Groups
2-2 Label Matrix
2-3 Group Example
2-4 Example: Data Labels and User Labels
2-5 How Label Components Interrelate
3-1 Relationships Between Users, Data, and Labels
3-2 User Session Label
3-3 Setting Up Authorized Compartments In Enterprise Manager
3-4 Setting Up Authorized Groups in Enterprise Manager
3-5 Subgroup Inheritance of Read/Write Access
3-6 Label Evaluation Process for Read Access
3-7 Label Evaluation Process for Write Access
3-8 Label Evaluation Process for Read Access with COMPACCESS Privilege
3-9 Label Evaluation Process for Write Access with COMPACCESS Privilege
3-10 Stored Program Unit Execution
5-1 Compartments in a Label
5-2 Group Example
7-1 Diagram of Oracle Label Security Metadata Storage in Oracle Internet Directory
7-2 Oracle Label Security Policies Applied through Oracle Internet Directory
8-1 Label Evaluation Process for LABEL_UPDATE
11-1 Using Oracle Label Security with a Distributed Database
11-2 Label Tags in a Distributed Database
11-3 Label Components in a Distributed Database
11-4 Use of Materialized Views for Replication
13-1 Read Access Label Evaluation with Inverse Groups
13-2 Write Access Label Evaluation with Inverse Groups
13-3 Read Access Label Evaluation: COMPACCESS Privilege and Inverse Groups
13-4 Write Access Label Evaluation: COMPACCESS Privilege and Inverse Groups
Scripting on this page enhances content navigation, but does not change the content in any way.