Methods for enabling database privileges are provided. The methods eliminate strict dependency on tradition password, or "secret" based security systems. Instead, database privileges are enabled based on verifying information stored in one or more frames of a call stack corresponds to trusted security logic. In another embodiment, database privileges are enabled based on policies identified in the trusted security logic. The methods and techniques described herein provide a flexible and extensible mechanisms for verifying that trusted security logic has been executed prior to enabling database privileges.

 
Web www.patentalert.com

< Secure resource access

> Container level access control mechanism

> Framework for providing a security context and configurable firewall for computing systems

~ 00503