veil2 0.9.1

This Release
veil2 0.9.1
Date
Status
Stable
Latest Stable
veil2 0.9.3 —
Other Releases
Abstract
An extension for implementing relational security systems.
Description
Provides a framework for implementing Virtual Private Databases using a relational security model.
Released By
marcmunro
License
BSD
Resources
Special Files

Extensions

veil2 0.9.1

Documentation

query_8d
Veil2: src/query.d File Reference
pt03
Part III. Implementation Details
variables_0
variables_0
functions_0
functions_0
all_b
all_b
veil2_8d
Veil2: src/veil2.d File Reference
pr01
Introduction to Veil2
pt02
Part II. Creating Your Veil2-based VPD Step By Step
apc
Appendix C. Veil2 Functions and Triggers
query_8c
Veil2: src/query.c File Reference
structContextPrivs
Veil2: ContextPrivs Struct Reference
ch14
Chapter 14. Create Initial Privileges (STEP 7)
ch17
Chapter 17. Secure Your Views (STEP 10)
functions_3
functions_3
ch07
Chapter 7. Setting Up A Veil2 Virtual Private Database - Overview
veil2_8h
Veil2: src/veil2.h File Reference
ch04
Chapter 4. Veil2 Concepts
classes_1
classes_1
ch27
Chapter 27. Contact Links
README_8md
Veil2: docs/README.md File Reference
ch24
Chapter 24. Tips and Guidelines
all_6
all_6
classes_0
classes_0
classes_2
classes_2
ape
Appendix E. Veil2 Authentication Protocols
functions_5
functions_5
ch09
Chapter 9. Identify and Define Your Scope Types (STEP 2)
defines_0
defines_0
functions_7
functions_7
files
Veil2: File List
ch08
Chapter 8. Getting Started With Veil2 (STEP 1)
ch18
Chapter 18. Assign Initial Roles (STEP 11)
ch19
Chapter 19. Setup Housekeeping Tasks STEP 12
ch03
Chapter 3. Why Use Veil2
ch06
Chapter 6. How Difficult Is This?
functions_1
functions_1
ch10
Chapter 10. Setting Up Authentication and Session Management (STEP 3)
ch23
Chapter 23. How Veil2 Relates to the Original Veil
ch26
Chapter 26. Security
all_4
all_4
ch16
Chapter 16. Secure Your Tables (STEP 9)
ch13
Chapter 13. Define Your Scope Hierarchy (STEP 6)
ch20
Chapter 20. Exploring The Veil2 Demos
functions_8
functions_8
ch02
Chapter 2. How Is Relational Security Different?
all_7
all_7
functions_6
functions_6
ch22
Chapter 22. For Developers
veil2_8d_source
Veil2: src/veil2.d Source File
apf
Appendix F. Veil2 Changes History
files_1
files_1
files_0
files_0
globals_vars
Veil2: Globals
ch12
Chapter 12. Link Your Scopes and Security Contexts (STEP 5)
globals_type
Veil2: Globals
structtuple__2ints
Veil2: tuple_2ints Struct Reference
files_2
files_2
annotated
Veil2: Data Structures
all_5
all_5
functions_vars
Veil2: Data Fields - Variables
variables_1
variables_1
variables_4
variables_4
graph_legend
Veil2: Graph Legend
pages_0
pages_0
veil2_8h_source
Veil2: src/veil2.h Source File
dir_68267d1309a1af8e8297ef4c3efbcdba
Veil2: src Directory Reference
veil2_8c
Veil2: src/veil2.c File Reference
functions_2
functions_2
variables_2
variables_2
ch21
Chapter 21. The Veil2 Implementation: What You Need To Know
all_1
all_1
ch01
Chapter 1. What Is A Relational Security System?
README
Veil2
functions
Veil2: Data Fields
globals_func
Veil2: Globals
ch11
Chapter 11. Link Your Users To Veil2's Accessors (STEP 4)
all_9
all_9
veil2_8c_source
Veil2: src/veil2.c Source File
defines_1
defines_1
structSessionPrivs
Veil2: SessionPrivs Struct Reference
classes
Veil2: Data Structure Index
apd
Appendix D. Veil2 C Implementation
typedefs_0
typedefs_0
pt01
Part I. Understanding Veil2 And Relational Security
index
Veil2 0.9.1 (beta) Documentation
ch25
Chapter 25. Performance
globals_defs
Veil2: Globals
ch05
Chapter 5. What is Veil2 And What Does It Provide?
apa
Appendix A. Veil2 ERD and Database Objects
ch15
Chapter 15. Integrate And/Or Create Roles (STEP 8)
index
Veil2: Veil2
all_0
all_0
all_8
all_8
variables_3
variables_3
variables_5
variables_5
all_a
all_a
all_3
all_3
all_2
all_2
globals
Veil2: Globals
query_8d_source
Veil2: src/query.d Source File
apb
Appendix B. Veil2 Views, Materialized Views and Caches
query_8c_source
Veil2: src/query.c Source File
nomatches
nomatches
README_8md_source
Veil2: docs/README.md Source File
functions_4
functions_4