Joseph Field

Data Security in a Distributed Network

With networks becoming more common in today's places of business, the need for tighter data security is becoming more critical. Users must be provided with the tools they need to perform their jobs without being permitted to alter or destroy core data. Data security can and should be handled from many angles.

This paper describes an approach toward data security that involves the use of Librarian/ArcStorm, relational database security, system permissions, and AML/Avenue scripts.


Joseph Field
GIS Technology, Inc.
220 Orange St.
Redlands, CA 92374
Telephone: 909-798-8030
Fax: 909-798-6310