Procedures for tailored security

While views restrict data access, procedures restrict the actions a user may take. A user can have EXECUTE permission on a procedure without having any permissions on the table or tables on which the procedure acts. See Procedure permissions.

 Strict security