A basic model of database access control, Database Management System

Assignment Help:

A basic model of Database Access Control

Models of database access control have grown out of previous work on protection in operating systems. Let us talk about one simple model with the help of the following example:

Security problem: Consider the relation:

Employee (Empno, Name,Deptno, Address,  Salary, Assessment)

Suppose there are two users: General user and Personnel manager. What access rights may be approved to each user? One extreme possibility is to approve an unconstrained access or to have a limited access.

 

                1543_A basic model of Database Access Control.png

 

One of the mainly influential protection models was developed by Lampson and extended by Denning and Graham.  This model has 3 components:

1)   A set of objects:  Where objects are the entities to which access must be controlled.

2)   A set of subjects:  Where subjects are entities that request access to objects.

3)   A set of all access rules:  Which can be thought of as forming an access (often referred to as authorisation matrix).

Let us make a sample authorisation matrix for the given relation:

Object

 

 

Subject

Empno

Name

Address

Deptno

Salary

Assessment

Personnel

Manager

Read

All

All

All

All

All

General

User

Read

Read

Read

Read

Not accessible

Not accessible

 

As the over matrix shows, General user and Personnel Manager are the two subjects. Objects of database are Empno, Address, Name,  Deptno, Salary and Assessment.  As per the access matrix, Personnel Manager can do any operation on the database of an employee except for updating the Empno that might be self-generated and once given cannot be changed. The general user can only read the data but cannot update, insert or delete the data into the database. Also the information about the salary and assessment of the employee is not accessible to the general user.

In summary, it can be said that the basic access matrix is the representation of basic access rules. These rules may be executed using a view on which several access rights may be given to the users.

 

 


Related Discussions:- A basic model of database access control

What are the drawbacks of shadow-paging technique, What are the drawbacks o...

What are the drawbacks of shadow-paging technique? The drawbacks of shadow paging is:- a) Commit Overhead b) Data fragmentation c)  Garbage collection

What is a recovery scheme, What is a recovery scheme? An integral part ...

What is a recovery scheme? An integral part of a database system is a recovery scheme that can restore the database to the reliable state that existed before the failure.

Unrepeatable reads-problems of concurrent transactions, Unrepeatable reads ...

Unrepeatable reads : Assume T7 reads X twice during its implementation. If it did not update X itself it could be very disturbing to see a dissimilar value of X in its next read. B

Control as a state machine engine, Control as a State Machine Engine F...

Control as a State Machine Engine First let us define the state machine: "the state machine is a machine which is an object but not an application object. It is a part of lang

Doppler Effectabase Management , #question. Draw a picture of a moving sour...

#question. Draw a picture of a moving source and the waves surrounding it according to what you observed in this experiment. How does the spacing of the wave-fronts in front of the

Define deadlock prevention, Define deadlock prevention. Deadlock preven...

Define deadlock prevention. Deadlock prevention is a set of methods for ensuring that at least one of the four essential conditions like mutual exclusion, hold and wait, no pre

Explain the need of parallel database, Probelm: a) In the context of OO...

Probelm: a) In the context of OODBMS, define the following terms with appropriate examples. (i) Object class. (ii) Abstract class. (iii) Aggregation. (iv)

What is identity, What is Identity? Identity (or AutoNumber) is a colum...

What is Identity? Identity (or AutoNumber) is a column that automatically produces numeric values. A start and increment value can be set, but most DBA leave these at 1. A GUID

What is outer join, What is Outer join?  They can be employed while we ...

What is Outer join?  They can be employed while we want to keep all the tuples in R, or all those in S or all those in both relations in the result of the JOIN in spite of of w

Objectives of data management, The traffic data mgmt. systems infrastructur...

The traffic data mgmt. systems infrastructure plan describes the software, hardware, data network, and other elements that will support the TDMS. The infrastructure plan is based o

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd