Administrator’s Guide
Control of access to sensitive information is of concern to managers, information
officers, DBAs, and application developers, among many others. Selective access
control based on a user's level of security clearance can ensure confidentiality
without overbroad limitations. This level of access control enables confidence that
sensitive information will be unavailable to unauthorized persons even while
general users have access to needed information, sometimes in the same tables.