CONTENTS Title Page Copyright Page Preface 1 Security Overview 1.1 Effect of VMS and CDD Security 1.2 What Is a Security Schema? 1.2.1 Developing Security Schemas 1.2.2 Incorporating Security Schemas in a Database 1.3 Mapping Users to Security Schemas 1.4 Controlling the User Execution List 1.5 Securing Against Unwanted DBO Access 1.6 Controlling the Command Authorization Lists 1.7 Initial Condition of Command Authorization Lists 2 Developing Security Schemas 2.1 Why Use Security Schemas? 2.2 Coordinating Security Schemas and Subschemas 2.3 Implementing Security Views 2.4 Writing Security Schemas 2.5 Security Schema Structure 2.6 The Default Security Schema 2.7 Writing a Baseline Security Schema 2.8 Defining AREA Permission 2.9 Defining RECORD Permission 2.10 Defining SET Permission 3 Activating Security Schemas 3.1 Putting Security Schemas into a Database 3.2 Assigning Security Schemas to Users 3.2.1 Structure of the User Execution List 3.2.2 Controlling the User Execution List 3.3 Listing UEL Entries 3.4 Adding Entries to the UEL 3.5 Deleting Entries from the UEL 4 Securing DBO Commands 4.1 What Commands Are Securable? 4.2 Structure of a Command Authorization List 4.3 Controlling the Command Authorization List 4.4 Listing CAL Entries 4.5 Adding CAL Entries 4.6 Deleting CAL Entries A Sample Security Schemas A.1 Example of a Default Security Schema A.2 Example of a Working Security Schema FIGURES 2-1 A Sample Default Security Schema 3-1 The User Execution List 4-1 Command Authorization Lists