Explain discretionary access control, Database Management System

Assignment Help:

Problem:

(a) Given the following relation:

Stats(Name,Sex,Children, Occupation, Salary, Tax, Audits) Write SQL code to define the following security constraints:

(i) User Ford RETRIEVE privileges over the entire relation.

(ii) User Smith INSERT, DELETE privileges over the entire relation.

(iii) User Nash RETRIEVE privileges over the entire relation and UPDATE privileges over the SALARY AND TAX attributes(only).

(iv) User Todd RETRIEVE privileges over NAME, SALARY AND TAX attributes only.

(v) User Pope full privileges(RETRIEVE,UPDATE,INSERT,DELETE) over tuples for preachers only.

(b) In the context of security, demonstrate your understanding on the following terms: (support your answers with appropriate examples wherever possible).

(i) Discretionary Access Control.

(ii) Mandatory Access Control.

(iii) Audit Trail.


Related Discussions:- Explain discretionary access control

What is meant by object-oriented data model, What is meant by object-orient...

What is meant by object-oriented data model? The object-oriented paradigm is based on encapsulation of data and code related to an object in to a one unit, whose contents are n

Differentiate between strict and rigorous two phase locking, Differentiate ...

Differentiate between strict two-phase and rigorous two-phase with conversion protocol Ans:  Strict two-phase locking holds all its exclusive that is write locks until commit t

What is the meaning of data independence, What is the meaning of Data indep...

What is the meaning of Data independence? Data independence means a programs that are not dependent on the physical attributes of data and a programs that are not dependent on

What are the features of embedded sql explain, What are the features of emb...

What are the features of embedded SQL? Explain. Embedded SQL - SQL could be implemented within two ways. It can be used interactively or embedded in a host language or throu

Ldb hierarchy there should exist one get statement, It is mandatory that fo...

It is mandatory that for every table in the LDB hierarchy there should exist one GET statement in the report. False.  It is not essential.

What is object containment, What is object containment? References amon...

What is object containment? References among objects can be used to model dissimilar real-world concepts.

How relational calculus is different from relational algebra, How Relationa...

How Relational Calculus is different from Relational Algebra? What do understand by TRC queries and DRC queries?  Ans: Relational calculus contain two calculi, the tuple relati

Why containment is important in oosystems, Why containment is important in ...

Why containment is important in oosystems? Containment is an significant concept in oosystems because it allows dissimilar users to view data at different granularities.

Update anomaly-data redundancy, Update Anomaly : This anomaly is occurred d...

Update Anomaly : This anomaly is occurred due to data redundancy. Redundant information makes updates more complex since, for example, varying the name of the instructor of MCS-014

Define weak and strong entity sets, Define weak and strong entity sets? ...

Define weak and strong entity sets? Weak entity set: entity set that do not have key attribute of their own are known as weak entity sets. Strong entity set: Entity set that

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd