System, method and article of manufacture for securing data. Queries are
analyzed to detect security violation efforts. In one embodiment, algorithms for
detecting selected security violation patterns are implemented. Generally, patterns
may be detected prior to execution of a query and following execution of a query.
Illustrative patterns include union query analysis, pare down analysis, non-overlapping
and others.