Methods for enabling database privileges are provided. The methods
eliminate strict dependency on tradition password, or "secret" based
security systems. Instead, database privileges are enabled based on
verifying information stored in one or more frames of a call stack
corresponds to trusted security logic. In another embodiment, database
privileges are enabled based on policies identified in the trusted
security logic. The methods and techniques described herein provide a
flexible and extensible mechanisms for verifying that trusted security
logic has been executed prior to enabling database privileges.