Security-data fragmentation, Database Management System

Assignment Help:

Security: Data not needed by local applications is not stored at the site, therefore no unnecessary security violations may exist.

But how can we carry out fragmentation? Fragmentation may be carried out as per the following rules:

a)      Completeness: This rule makes sure that there is no loss of data while fragmentation. If a relation is decomposed into fragments, then every data item must appear in at least single fragment.

b)      Reconstruction: This rule makes sure preservation of functional dependencies. It should be possible to describe a relational operation that will reconstruct the relation from its fragments.

c)       Disjointness: A data item that shows in a fragment should not show in any other fragment. Though, a typical fragmentation known as vertical fragmentation is an exception to this rule. In vertical fragmentation the primary key attributes must be repeated to permit reconstruction of original relation.

This rule makes sure minimization of data redundancy. What are the dissimilar types of fragmentation?

 


Related Discussions:- Security-data fragmentation

Differentiate between natural join and outer join, Differentiate between na...

Differentiate between natural join and outer join? Natural join is a binary operator which is written as (R * S) where as R and S are relations. The output of the natural join

ERD, online eductional management system ke diagram

online eductional management system ke diagram

What is difference between primary index and secondary index, What is diffe...

What is difference between primary index and secondary index? Primary Index a) It is an ordered file whose records are of fixed length along with two fields. b) Only base

What features relational dbms contribute level of integrity, A well-maintai...

A well-maintained relational DBMS has a high level of data integrity. What features of a relational DBMS contribute towards this level of integrity? Relational DBMS gives high

Eliminate repeating groups, Eliminate Repeating Groups The problem is, ...

Eliminate Repeating Groups The problem is, "Find out the list of employees, who knows DB2". For this problem we require to perform an awkward scan of the list looking for re

What is object containment, What is object containment? References amon...

What is object containment? References among objects can be used to model dissimilar real-world concepts.

Data warehouse, #queDefine a job scheduling strategy that will meet busines...

#queDefine a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a pic

What are aggregate functions, What are aggregate functions? And list the ag...

What are aggregate functions? And list the aggregate functions supported by SQL? Aggregate functions are functions that take a collection of values as input and return a one va

State the step- implement software control designer, Implementing software ...

Implementing software control To implement software control designer must redesign strategy of state event model which is present in dynamic model. There are three basic ap

Illustrate the collaboration and relationship diagram, Illustrate the colla...

Illustrate the collaboration and relationship diagram A collaboration is the society of interfaces, classes and other elements which work together to provide some cooperative b

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd