Published at LXer:
Using a trusted context in an application can improve security by placing accountability at the middle-tier, reducing over granting of privileges, and auditing of end-user's activities. Learn how to implement trusted context on DB2 in a command line interface (CLI), XA, or Java Database Connectivity (JDBC)-based application.
Read More...