Explain discretionary access control, Database Management System

Assignment Help:

Problem:

(a) Given the following relation:

Stats(Name,Sex,Children, Occupation, Salary, Tax, Audits) Write SQL code to define the following security constraints:

(i) User Ford RETRIEVE privileges over the entire relation.

(ii) User Smith INSERT, DELETE privileges over the entire relation.

(iii) User Nash RETRIEVE privileges over the entire relation and UPDATE privileges over the SALARY AND TAX attributes(only).

(iv) User Todd RETRIEVE privileges over NAME, SALARY AND TAX attributes only.

(v) User Pope full privileges(RETRIEVE,UPDATE,INSERT,DELETE) over tuples for preachers only.

(b) In the context of security, demonstrate your understanding on the following terms: (support your answers with appropriate examples wherever possible).

(i) Discretionary Access Control.

(ii) Mandatory Access Control.

(iii) Audit Trail.


Related Discussions:- Explain discretionary access control

What are composite attributes, What are composite attributes? Composite...

What are composite attributes? Composite attributes can be separated in to sub parts.

Convert encrypted hsql database into csv format, Project Description: We...

Project Description: We have an encrypted HSQL Database which we want to change into csv format. HSQL DB . We have java application (jar file) which reads that database but n

How can you terminate the mysql server, How can you terminate the MySQL Ser...

How can you terminate the MySQL Server? Typing the following in Command prompt will shut down the server completely as root user % mysqladmin -u root -p shutdown

Define the concept of aggregation, Define the concept of aggregation.  Give...

Define the concept of aggregation.  Give two examples where this concept is useful. Ans: Aggregation transforms a relationship among the objects into a higher-level object. A

Relation schema for student, Example RELATION SCHEMA for STUDENT: STU...

Example RELATION SCHEMA for STUDENT: STUDENT (Roll No: string, name: string, login: string, age: integer) RELATION INSTANCE

What are the reasons of bucket overflow, What are the reasons of bucket ove...

What are the reasons of bucket overflow? Explain any two methods for solving this problem. Ans:  It is general for file structures to be divided into equal-length partitions, k

Abap/4 program, It is not possible to make an ABAP/4 program, which having ...

It is not possible to make an ABAP/4 program, which having only Subroutines. False. We can make ABAP/4 program, which having only Subroutines.

Attribute preservation, Attribute Preservation This is a easy and obvio...

Attribute Preservation This is a easy and obvious necessity that includes preserving all the attributes that were there in the relation that is being decomposed.

Whenever the limit clause will be used, Whenever the LIMIT clause will be u...

Whenever the LIMIT clause will be used? LIMIT is used for the following kinds of problems: 1) Answering questions about first or last and largest or smallest 2) Splitting

How many types of users works on database, How many types of users works on...

How many types of users works on database? Users are differentiated through the way they expect to interact along with the system (i) Application programmers-interact with

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd