Describe the grant function and explain security, Database Management System

Assignment Help:

Describe the GRANT function and explain, how it associates to security. What kind of privileges may be granted? How are they revoked?

Ans: Since more than one user can aaccess one database, there exists the required to restrict user from using whole database in any way. Setting up access privilege can do this. Any privilege can be granted to or revoked from user along with taken of the GRANT and REVOKE statements. Each privilege could be granted or revoked individually or in a group. Such group of rights is known as ROLE and rights can be granted or revoked within in the similar way as to the user. Access privileges include SELECT, INSERT, UPDATE and DELETE.

GRANT {statement|role_name} ON {object_name} TO {user|role_name_2} [WITH GRANT OPTION]

1038_tablea.png

An example of granting permission to user B for reading EMP table is:

GRANT SELECT ON emp to B;

The REVOKE statement is used to revoke the permissions from the user.
The syntax for REVOKE statement is given as:
REVOKE {statement|role_name} FROM {user|role_name};


Related Discussions:- Describe the grant function and explain security

Cascading, what is cascading? what is rollback cascading? please explain in...

what is cascading? what is rollback cascading? please explain in detail

Explain the togaf framework for enterprise architectures, Question: (a)...

Question: (a) With the help of a diagram, explain the TOGAF framework for enterprise architectures. (b) Where would you position enterprise architectures in an enterpri

What is catalog in dbms, What is catalog in DBMS? Catalog - A relationa...

What is catalog in DBMS? Catalog - A relational DBMS maintains information about every table and index in which it contains. A catalog is a collection of special tables that st

Analyzing association traversal, Analyzing Association Traversal Assoc...

Analyzing Association Traversal Association Traversal shall be understood properly for the association design explanation.  Analyzing association traversal means analyzing tra

Explain the object-oriented decomposition, Explain the Object-oriented deco...

Explain the Object-oriented decomposition Object-oriented decomposition targets at identifying individual sovereign objects that encapsulate both a state and certain behavio

What is the use of keyword isa, What is the use of keyword ISA? The use...

What is the use of keyword ISA? The use of keyword ISA is to show that a class is a specialization of another class.

Define transitive dependencies, What do you understand by transitive depend...

What do you understand by transitive dependencies? Define with an example any two problems that can take place in the database if transitive dependencies are available in the datab

Write the motivations led to development of oo-dbms, Write the motivations ...

Write the motivations led to development of OO-DBMS? 1.  Programmer frustration with RDBMSs. 2.  Requirement for special features.

In case of entity integrity the primary key may be declared, In case of ent...

In case of entity integrity, the primary key may be declared? In a case of entity integrity primary key may be not Null.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd