A basic model of database access control, Database Management System

Assignment Help:

A basic model of Database Access Control

Models of database access control have grown out of previous work on protection in operating systems. Let us talk about one simple model with the help of the following example:

Security problem: Consider the relation:

Employee (Empno, Name,Deptno, Address,  Salary, Assessment)

Suppose there are two users: General user and Personnel manager. What access rights may be approved to each user? One extreme possibility is to approve an unconstrained access or to have a limited access.

 

                1543_A basic model of Database Access Control.png

 

One of the mainly influential protection models was developed by Lampson and extended by Denning and Graham.  This model has 3 components:

1)   A set of objects:  Where objects are the entities to which access must be controlled.

2)   A set of subjects:  Where subjects are entities that request access to objects.

3)   A set of all access rules:  Which can be thought of as forming an access (often referred to as authorisation matrix).

Let us make a sample authorisation matrix for the given relation:

Object

 

 

Subject

Empno

Name

Address

Deptno

Salary

Assessment

Personnel

Manager

Read

All

All

All

All

All

General

User

Read

Read

Read

Read

Not accessible

Not accessible

 

As the over matrix shows, General user and Personnel Manager are the two subjects. Objects of database are Empno, Address, Name,  Deptno, Salary and Assessment.  As per the access matrix, Personnel Manager can do any operation on the database of an employee except for updating the Empno that might be self-generated and once given cannot be changed. The general user can only read the data but cannot update, insert or delete the data into the database. Also the information about the salary and assessment of the employee is not accessible to the general user.

In summary, it can be said that the basic access matrix is the representation of basic access rules. These rules may be executed using a view on which several access rights may be given to the users.

 

 


Related Discussions:- A basic model of database access control

Select statement-data manipulation language, SELECT Statement This stat...

SELECT Statement This statement is used for retrieving information from the databases. It can be coupled with many clauses. Let us talk about these clauses in more detail:

Types of locks, Types of Locks There are two necessary types of locks: ...

Types of Locks There are two necessary types of locks: Binary lock : This locking mechanism has two states for to a data item: locked or unlocked Multiple-mode loc

Explain physical and logical independence, Define Physical and Logical inde...

Define Physical and Logical independence  Ans: Physical data independence: The ability to modify physical level without causing application program to be rewritten. Logic

Define the term- control as state within program, Control as State within P...

Control as State within Program 1.  The term control exactly means to check effect of input within a program. For illustration, in Figure, after the ATM card is inserted (a

How can we classify the operations on classes, How can we Classify the oper...

How can we Classify the operations on classes  This step fundamentally means all three models functional, object and dynamic (studied in last section) must be combined so that

Er diagram, a publishing company produce scientific books on various subjec...

a publishing company produce scientific books on various subjects. the books are written by authors who specialize in one particular subject. the company employs editors who, not n

Describe hashing in dbms, Describe Hashing in DBMS? Hashing: Hashing ...

Describe Hashing in DBMS? Hashing: Hashing is a technique to store data within an array so which storing, searching, inserting and deleting data is fast (in theory it's O(1))

List some security violations, List some security violations (or) name any ...

List some security violations (or) name any forms of malicious access. A) Unauthorized reading of data B) Unauthorized modification of data C) Unauthorized destruction of

Determine candidate and primary key, A video rental company has several bra...

A video rental company has several branches. The data held on each branch is the branch address made up of street, city, state, and zip code, and the telephone number. Ea

What are called journaling file systems, What are called journaling file sy...

What are called journaling file systems? File systems that support log disks are known as journaling file systems.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd