Table VI presents an excerpt of the fine-grain gap
analysis for all the security mechanisms of the benchmark
against the seven packages (the number of the package can
be found in Table V). The full analysis reveals several very
important aspects. As expected, most “common sense”
mechanisms are present in all the packages. For instance, file
system access privileges, partitioning, table level privileges,
among others. However, several “types” of mechanisms that
could be used to support the implementation of important