Relationship between security and integrity, Database Management System

Assignment Help:

Relationship between Security and Integrity:Database security usually refers to access, while database integrity refers to avoidance of accidental loss of consistency. But usually, the turning point or the dividing line among security and integrity is not always clear. Figure shows the relationship among data security and integrity.

             1929_Relationship between Security and Integrity.png

 

                                        Figure: Relationship between security and Integrity


Related Discussions:- Relationship between security and integrity

In oracle what is system global area and how is it organized, In Oracle wha...

In Oracle what is system global area and how is it organized? The SGA is a collection of shared memory fields which along with the Oracle processes constitute an Oracle instan

Candidate keys, Super keys of a relation can have extra attributes. Candida...

Super keys of a relation can have extra attributes. Candidate keys are minimal super key, i.e. such a key have no extraneous attribute. An attribute is known as extraneous if even

Differance between join and outer join, Differentiate between join and oute...

Differentiate between join and outer join? Outer joins return all rows from at least one of the tables or views mentioned within the FROM clause, as long as those rows get toge

Describe the algorithm for updating indices, Describe the algorithm for upd...

Describe the algorithm for updating indices for a single level index when a record is    (i) Inserted  (ii)  deleted What will be the modification if there are multilevel in

What is dag, What is DAG? The class-subclass relationship is shown by a...

What is DAG? The class-subclass relationship is shown by a directed acyclic graph.eg: employees can be temporary or permanent. We might be create subclasses temporary \and perm

Text mining, Text Processing: Use readLines to read SOU.txt into R. Cr...

Text Processing: Use readLines to read SOU.txt into R. Create a vector called Pres containing the names of the presidents giving each speech. To do this, rst identify the lin

Oracle fusion middleware, Oracle Fusion Middleware: Key Skills: Consul...

Oracle Fusion Middleware: Key Skills: Consulting,Architect, Oracle Fusion Middleware,ECM, UCM, Stellent,Identity Management, SOA Suites, BPEL, ESB,OAM,OIM,J2ee, Java, Livelink

Draw an e-r diagram and convert it to a relational schema, In an organizati...

In an organization several projects are undertaken. Each project can employ one or more employees. Each employee can work on one or more projects. Each project is undertaken on the

Explain the two types of participation constraint., Explain the two types o...

Explain the two types of participation constraint. 1. Total: The participation of an entity set E in a relationship set R is said to be total if each entity in E participates i

Describe the grant function and explain security, Describe the GRANT functi...

Describe the GRANT function and explain, how it associates to security. What kind of privileges may be granted? How are they revoked? Ans: Since more than one user can aacce

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd