摘要 |
Methods, systems, data structures and articles of manufacture are provided for monitoring access to a database. In one embodiment, a data access trigger, or read trigger, is adapted to monitor accesses to a database. In general, a data access trigger is invoked when predefined events occur. Specifically, a data access trigger is executed to take some action due to any attempt to access a database. When a specified access attempt is determined, the trigger can instruct the system to take any number of actions, such as modify the data being requested.In one embodiment, a log is provided in which accesses to the database are recorded. The log may subsequently reviewed to ascertain whether a particular record was accessed and by whom. In addition, the particular information accessed and/or modified can be contained in the log.
|