Describe the grant function and explain security, Database Management System

Assignment Help:

Describe the GRANT function and explain, how it associates to security. What kind of privileges may be granted? How are they revoked?

Ans: Since more than one user can aaccess one database, there exists the required to restrict user from using whole database in any way. Setting up access privilege can do this. Any privilege can be granted to or revoked from user along with taken of the GRANT and REVOKE statements. Each privilege could be granted or revoked individually or in a group. Such group of rights is known as ROLE and rights can be granted or revoked within in the similar way as to the user. Access privileges include SELECT, INSERT, UPDATE and DELETE.

GRANT {statement|role_name} ON {object_name} TO {user|role_name_2} [WITH GRANT OPTION]

1038_tablea.png

An example of granting permission to user B for reading EMP table is:

GRANT SELECT ON emp to B;

The REVOKE statement is used to revoke the permissions from the user.
The syntax for REVOKE statement is given as:
REVOKE {statement|role_name} FROM {user|role_name};


Related Discussions:- Describe the grant function and explain security

Inheritance, what is relationship inheritance and attribute inheritance

what is relationship inheritance and attribute inheritance

Explain the five levels of capability maturity models, Question 1 What is ...

Question 1 What is data mining? Write Data Mining applications Question 2 What is OLAP? Write the benefits of OLAP Question 3 What is Business Intelligence? Explai

Explain key benefits of a content management system, Question: (a) What...

Question: (a) What do you meant by content management and briefly describe four major components of a Content Management System? (b) Explain key benefits of a Content Manage

Describe the storage structure of indexed sequential files, Describe the st...

Describe the storage structure of indexed sequential files and their access method.  Ans:   Storage structure of Indexed Sequential files and their access: To achieve fast rand

Explain the exec statement in sql, Explain the EXEC statement in SQL  A...

Explain the EXEC statement in SQL  Ans: All statements which start with EXEC SQL are embedded SQL database statements. High level languages such as C can be employed to write a

Candidate keys, Super keys of a relation can have extra attributes. Candida...

Super keys of a relation can have extra attributes. Candidate keys are minimal super key, i.e. such a key have no extraneous attribute. An attribute is known as extraneous if even

Describe physical data independence, Describe Physical Data independence ? ...

Describe Physical Data independence ? Physical Data Independence - It is capacity to modify the internal schema without having to change conceptual schema. Therefore, the exter

Architectural standard, Architectural standard: Designation : Archit...

Architectural standard: Designation : Architect , Consultant Job Profile : As a part of Oracle Fusion Middleware at Satyam, I am involved with Presales, Delivery, A

Normalization, in case of functional dependencies how we get the higher nor...

in case of functional dependencies how we get the higher normal form.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd