Dominant approach for Data
Authenticate Customer
Validate query against database schema
If both ok, process query and ship results
database access &
authorization agent
sources
customer
result
query
authentication
firewall
Previous slide
Next slide
Back to first slide
View graphic version