Part 5: Building Robust and Secure Temporal Solutions
You already know, for sure, that integrity and overall state consistency are secured by transactions in relational systems. Each transaction creates a transaction log, consisting, among other critical information stored there, of change vectors storing original and new values for each changed data row. Thus, by extracting relevant transactional data using Flashback Technology, table content as it existed in the past can be obtained and reconstructed.
Chapter 14 highlights a significant security issue, SQL injection. This threat is formed of SQL code concatenation, which is then treated as a character string. You may have thought that working with date and time is safe, with the whole process secured by constructor and conversion functions, but that's not quite the case. You will come to understand the issue of complexity, as well as techniques to create secure solutions.
This part has the following chapters:
-
...