Part 2 of this series describes setting up column level / row level security of data through custom built views, and a critical review on the creation and maintenance of procedures for truncating tables in third party schemas.

This story continues at http://www.databasejournal.com/featu...le.php/3647816