BLP java program, JAVA Programming

Assignment Help:
could you please help me with my assignment.

My program need to implement a multi{level role based database script SQL-like generation program. Or part of one anyway. Start with a data fi le Input.txt of the form.

Levels:0:1:2:3:4:
Relation:R1:0:R2:1:R3:0:R4:3:
User:alice:0:bob:3:carol:2:
User:user1:1:

There could be multiple lines for User and for Relation. The levels are security levels to be used in a BLP
sense, but with reading being replaced by SELECT and writing being replaced with INSERT. Assume the levels are in order of domination so that, in the example, 0 is dominated by 1, 1 is dominated by 2 etc.
The Java program, should generate a script for generating and assigning
roles appropriately in accordance with the Input.txt file.

You should assume the relations and users already exist.
You need to use views and roles to group relations and users together appropriately.
The output should appear in a file Output.txt

Related Discussions:- BLP java program

Carbon Footprint Applications, 10.13 (CarbonFootprint Interface: Polymorphi...

10.13 (CarbonFootprint Interface: Polymorphism) Using interfaces, as you learned in this chapter, you can specify similar behaviors for possibly disparate classes. Governments and

Create a link list iterator, In this assignment, you will gain experience i...

In this assignment, you will gain experience implementing the java.util.List interface. This includes writing an inner class called Node and another inner class called CS228LinkedL

For in statement, It is a distinct type of loop, used to iterate through th...

It is a distinct type of loop, used to iterate through the properties of an object or the elements of an array. For instance assume the following statement that loops through th

Collections, Write a program to proove that HashSet maintains random order

Write a program to proove that HashSet maintains random order

How dos attack is a cyber crime what cyber crime can be used, How DoS attac...

How DoS attack is a cyber crime? For what cyber crime can be used? DoS stands for Decline of Service and it is a cyber crime as it jams and within a few cases shut down the goa

How many bits are used to show unicode and ascii, How many bits are used to...

How many bits are used to show Unicode, ASCII, UTF-16, and UTF-8 characters? Unicode requires 16 bits and ASCII require 7 bits although the ASCII character set uses only 7 bits

Design and implement online food delivery system, You are required to desig...

You are required to design & implement online food delivery system using Java RMI technology. This involves writing both the server and the client program(s). Client programs can u

Package diagrams , To simplify complex class diagrams you may group classes...

To simplify complex class diagrams you may group classes into packages.

Determine the types of object oriented programme, Determine the types of ob...

Determine the types of object oriented programme Classes - Prototypes for objects - Definition or a blueprint of a user-defined datatype - Think of it as a ma

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd