One thing i would like to know is if we go with the built in scalar function 
encrypt/decrypt  for the tables, does that need any kind of application level 
changes? is there any kind of limitation with this approach?

Regards
Ron

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to