This section addresses:
Defining security
Overriding security
Conversation-level security
View this book as PDF