A basic model of database access control, Database Management System

Assignment Help:

A basic model of Database Access Control

Models of database access control have grown out of previous work on protection in operating systems. Let us talk about one simple model with the help of the following example:

Security problem: Consider the relation:

Employee (Empno, Name,Deptno, Address,  Salary, Assessment)

Suppose there are two users: General user and Personnel manager. What access rights may be approved to each user? One extreme possibility is to approve an unconstrained access or to have a limited access.

 

                1543_A basic model of Database Access Control.png

 

One of the mainly influential protection models was developed by Lampson and extended by Denning and Graham.  This model has 3 components:

1)   A set of objects:  Where objects are the entities to which access must be controlled.

2)   A set of subjects:  Where subjects are entities that request access to objects.

3)   A set of all access rules:  Which can be thought of as forming an access (often referred to as authorisation matrix).

Let us make a sample authorisation matrix for the given relation:

Object

 

 

Subject

Empno

Name

Address

Deptno

Salary

Assessment

Personnel

Manager

Read

All

All

All

All

All

General

User

Read

Read

Read

Read

Not accessible

Not accessible

 

As the over matrix shows, General user and Personnel Manager are the two subjects. Objects of database are Empno, Address, Name,  Deptno, Salary and Assessment.  As per the access matrix, Personnel Manager can do any operation on the database of an employee except for updating the Empno that might be self-generated and once given cannot be changed. The general user can only read the data but cannot update, insert or delete the data into the database. Also the information about the salary and assessment of the employee is not accessible to the general user.

In summary, it can be said that the basic access matrix is the representation of basic access rules. These rules may be executed using a view on which several access rights may be given to the users.

 

 


Related Discussions:- A basic model of database access control

ER diagrams, explain exhaustively the problems associated with ER diagrams....

explain exhaustively the problems associated with ER diagrams. include illustrations in your answer

Descrine an data dictionary, Describe an data dictionary? A data dictio...

Describe an data dictionary? A data dictionary is a data structure which keeps meta data about the structure of the database ie. the schema of the database.

What is a select operation, What is a SELECT operation? The select oper...

What is a SELECT operation? The select operation selects tuples that please a given predicate. We use the lowercase letter σ to denote selection.

State the step- implement software control designer, Implementing software ...

Implementing software control To implement software control designer must redesign strategy of state event model which is present in dynamic model. There are three basic ap

horizontal fragmentation, Horizontal Fragmentation- Horizontal fragmentati...

Horizontal Fragmentation- Horizontal fragmentation groups together the tuples in a relation that are collectively used by the main transactions. A horizontal fragment is produced b

Whenever the limit clause will be used, Whenever the LIMIT clause will be u...

Whenever the LIMIT clause will be used? LIMIT is used for the following kinds of problems: 1) Answering questions about first or last and largest or smallest 2) Splitting

Data storage and retrieval services, An Enterprising group of Entrepreneurs...

An Enterprising group of Entrepreneurs introduced a new business named StoreItRite which is based on data storage and retrieval services. It provides the services and the company c

Update operations in dbms - insert operation, Update Operations and Dealing...

Update Operations and Dealing with Constraint Violations There are three basic operations to be executes on relations: Insertion Deletion Update The INSER

Software failures-database recovery and security, Software failures :  In s...

Software failures :  In such cases, a software error abruptly stops the implementation of the current transaction (or all transactions), therefore leading to losing the state of pr

Erds, What are the various symbols used to draw an E-R diagram (any 3)?

What are the various symbols used to draw an E-R diagram (any 3)?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd