Describe the grant function and explain security, Database Management System

Assignment Help:

Describe the GRANT function and explain, how it associates to security. What kind of privileges may be granted? How are they revoked?

Ans: Since more than one user can aaccess one database, there exists the required to restrict user from using whole database in any way. Setting up access privilege can do this. Any privilege can be granted to or revoked from user along with taken of the GRANT and REVOKE statements. Each privilege could be granted or revoked individually or in a group. Such group of rights is known as ROLE and rights can be granted or revoked within in the similar way as to the user. Access privileges include SELECT, INSERT, UPDATE and DELETE.

GRANT {statement|role_name} ON {object_name} TO {user|role_name_2} [WITH GRANT OPTION]

1038_tablea.png

An example of granting permission to user B for reading EMP table is:

GRANT SELECT ON emp to B;

The REVOKE statement is used to revoke the permissions from the user.
The syntax for REVOKE statement is given as:
REVOKE {statement|role_name} FROM {user|role_name};


Related Discussions:- Describe the grant function and explain security

Perform an exploratory analysis on the entire dataset, Australian Bureau of...

Australian Bureau of Statistics (ABS) provides retail data for different groups and different states as well as the aggregate numbers. Table 11 " Retail Turnover, State by Industry

Column constraints-on delete cascade, CREATE TABLE prodtrans ( pno ...

CREATE TABLE prodtrans ( pno number (4) ptype char (1) CHECK (ptype in ('I','R','S')), qty number (5) FOREIGN KEY pno REFERENCES product (pno) ON DELETE CASCADE);

Logical design part 1, create an e-r diagram usuing graphical dipicted soft...

create an e-r diagram usuing graphical dipicted software that could theoritically be used in resturant application

Security-data fragmentation, Security: Data not needed by local applicatio...

Security: Data not needed by local applications is not stored at the site, therefore no unnecessary security violations may exist. But how can we carry out fragmentation? Fragm

Describe analysis of access paths, Describe analysis of access paths To...

Describe analysis of access paths To describe analysis of access paths, consider an example of the design of a company's employee skills database. A part of the object model fr

Briefly explain the state diagram by taking one example, Briefly explain th...

Briefly explain the state diagram by taking one example. State Diagram - An object can be given a sequence of input instructions. The state of the object can vary depending u

Visio diagram - database, The database depicted in the Visio diagram descri...

The database depicted in the Visio diagram describes Proceeding , Article , Researcher , article PublishedIn a proceeding, article WrittenBy researchers and proceedings Edi

What is called query processing, What is called query processing? Query...

What is called query processing? Query processing refers to the range of activities included in extracting data from a database.

Explain the concept of a data model, Explain the concept of a data model ? ...

Explain the concept of a data model ? Data Model - Model is an abstraction procedure which hides irrelevant details although highlighting details relevant to the application

Explain the term- collation, What is Collation Collation is a kind of ...

What is Collation Collation is a kind of sort order. There are majorly 3 types of sort orders, namely: i.) Dictionary case insensitive ii.)Dictionary - case sensitive

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd