Research Article

A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

Box 15

(01) CREATE USER ALICE IDENTIFIED BY ALICE DEFAULT TABLESPACE SYSTEM
TEMPORARY TABLESPACE TEMP;
(02) CREATE USER BOB IDENTIFIED BY BOB;
(03) CREATE USER CHARLES IDENTIFIED BY CHARLIE;
(04) CREATE USER MARIE IDENTIFIED BY MARIE;
(05) CREATE USER PAUL IDENTIFIED BY PAUL;
(06)
(07) CREATE ROLE SYSTEMUSER;
(08) CREATE ROLE SUPERVISOR;
(09) CREATE ROLE SYSTEMADMINISTRATOR;
(10) CREATE ROLE DIRECTOR;
(11) CREATE ROLE COSUPERVISOR;
(12)
(13) GRANT SYSTEMADMINISTRATOR TO DIRECTOR;
(14) GRANT SYSTEMUSER TO DIRECTOR;
(15) GRANT SYSTEMUSER TO SUPERVISOR;
(16) GRANT SUPERVISOR TO COSUPERVISOR;
(17)
(18) GRANT SYSTEMUSER TO ALICE;
(19) GRANT SUPERVISOR TO ALICE;
(20) GRANT SYSTEMUSER TO BOB;
(21) GRANT DIRECTOR TO BOB;
(22) GRANT SYSTEMUSER TO CHARLES;
(23) GRANT SYSTEMADMINISTRATOR TO MARIE;
(24) GRANT COSUPERVISOR TO PAUL;
(25)
(26) GRANT INSERT ON MEETING TO SYSTEMUSER;
(27) GRANT SELECT ON MEETING TO SYSTEMUSER;
(28) GRANT UPDATE ON MEETING TO SYSTEMUSER;
(29) GRANT DELETE ON MEETING TO SYSTEMUSER;
(30) GRANT EXECUTE ON MEETINGCANCEL TO SUPERVISOR;
(31) GRANT EXECUTE ON MEETINGNOTIFY TO SUPERVISOR;
(32) GRANT SELECT ON MEETING TO SYSTEMADMINISTRATOR;
(33) GRANT FULLACCESS ON PERSON TO SYSTEMADMINISTRATOR;
(34) GRANT EXECUTE ON MEETINGCANCEL TO SYSTEMADMINISTRATOR;
(35) GRANT SELECT ON PERSON TO BOB;