Describe the grant function and explain security, Database Management System

Assignment Help:

Describe the GRANT function and explain, how it associates to security. What kind of privileges may be granted? How are they revoked?

Ans: Since more than one user can aaccess one database, there exists the required to restrict user from using whole database in any way. Setting up access privilege can do this. Any privilege can be granted to or revoked from user along with taken of the GRANT and REVOKE statements. Each privilege could be granted or revoked individually or in a group. Such group of rights is known as ROLE and rights can be granted or revoked within in the similar way as to the user. Access privileges include SELECT, INSERT, UPDATE and DELETE.

GRANT {statement|role_name} ON {object_name} TO {user|role_name_2} [WITH GRANT OPTION]

1038_tablea.png

An example of granting permission to user B for reading EMP table is:

GRANT SELECT ON emp to B;

The REVOKE statement is used to revoke the permissions from the user.
The syntax for REVOKE statement is given as:
REVOKE {statement|role_name} FROM {user|role_name};


Related Discussions:- Describe the grant function and explain security

Define the query optimisation, Define the Query optimisation The query ...

Define the Query optimisation The query parser commonly generates a standard initial tree to correspond to an SQL query, with no doing any optimization. Such type of a canonica

Commercial database architecture, At its most essential level the DBMS arch...

At its most essential level the DBMS architecture can be divide into two parts: the back end and the front end. The back end is responsible for managing the physical database an

Explain the term- collation, What is Collation Collation is a kind of ...

What is Collation Collation is a kind of sort order. There are majorly 3 types of sort orders, namely: i.) Dictionary case insensitive ii.)Dictionary - case sensitive

Datawarehouse, 1) Define a job scheduling strategy that will meet business ...

1) Define a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a pict

Name the metrics for selecting top algorithm, Name the metrics for selectin...

Name the metrics for selecting top algorithm There are a number of metrics for selecting top algorithm: i) Computational complexity: Computational complexity refers to eff

Relational database, Convert the following ER - diagram (Entity Relationsh...

Convert the following ER - diagram (Entity Relationship Diagram) into a relational database (the primary keys are underlined): 2160_Convert the following ER - diagram into a

Illustrate system design of an object oriented approach, System Design: An ...

System Design: An Object Oriented Approach Any software systems always try to change and evolve as technology and business rules evolve. The development of information systems

What is business intelligence, Question A What is operational intelligence...

Question A What is operational intelligence? Question B What is Business Intelligence? Explain the components of BI architecture Question C Differentiate between databas

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd