BLP java program, JAVA Programming

Assignment Help:
could you please help me with my assignment.

My program need to implement a multi{level role based database script SQL-like generation program. Or part of one anyway. Start with a data fi le Input.txt of the form.

Levels:0:1:2:3:4:
Relation:R1:0:R2:1:R3:0:R4:3:
User:alice:0:bob:3:carol:2:
User:user1:1:

There could be multiple lines for User and for Relation. The levels are security levels to be used in a BLP
sense, but with reading being replaced by SELECT and writing being replaced with INSERT. Assume the levels are in order of domination so that, in the example, 0 is dominated by 1, 1 is dominated by 2 etc.
The Java program, should generate a script for generating and assigning
roles appropriately in accordance with the Input.txt file.

You should assume the relations and users already exist.
You need to use views and roles to group relations and users together appropriately.
The output should appear in a file Output.txt

Related Discussions:- BLP java program

Javaserver faces event and listener model, What is JavaServer Faces event a...

What is JavaServer Faces event and listener model? Ans) A mechanism for verifying how events emitted by JavaServer Faces UI components are handled. This model is based on the Ja

Taking in command line arguments, Taking in Command Line Arguments In J...

Taking in Command Line Arguments In Java, the program can be written to accept command-line-arguments. Example Code:  command-line arguments /*  This

Want a page to store emails when click as save, Want a page to store emails...

Want a page to store emails when click as save, then pass along to another page with the emails in the URL Project Description: I have a page that populates with listing; the

The tic-tac-toe program, Instructions Modify the program so that the co...

Instructions Modify the program so that the computer will generate moves for the ‘O' player (it must continue to accept user input for ‘X'). A simple way to do this is to use a

Confidentiality and privacy - security, The confidentiality and privacy may...

The confidentiality and privacy may be accomplished through encryption. Encryption may be: Private-key or symmetric: This is based on a single key. This needs the sender and the

Convert string to super ascii, A string S is said to be "Super ASCII", if i...

A string S is said to be "Super ASCII", if it contains the character frequency equal to their ascii values. String will contain only lower case alphabets (''''a''''-''''z'''') and

Application of server clustering? , An application server cluster has of a ...

An application server cluster has of a number of application servers loosely coupled on a network. The server group or server cluster is usually distributed over a number of nodes

Give an example for passing arguments to methods, Give an example for Passi...

Give an example for Passing Arguments to Methods ? class Car { String licensePlate = ""; // e.g. "New York 543 A23" double speed = 0.0; // in kilometers per h

Explain the applet in java, Explain The Applet in java? The reason peo...

Explain The Applet in java? The reason people are excited about Java as more than just another OOP language is because it allows them to write interactive applets on the web.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd