Security-data fragmentation, Database Management System

Assignment Help:

Security: Data not needed by local applications is not stored at the site, therefore no unnecessary security violations may exist.

But how can we carry out fragmentation? Fragmentation may be carried out as per the following rules:

a)      Completeness: This rule makes sure that there is no loss of data while fragmentation. If a relation is decomposed into fragments, then every data item must appear in at least single fragment.

b)      Reconstruction: This rule makes sure preservation of functional dependencies. It should be possible to describe a relational operation that will reconstruct the relation from its fragments.

c)       Disjointness: A data item that shows in a fragment should not show in any other fragment. Though, a typical fragmentation known as vertical fragmentation is an exception to this rule. In vertical fragmentation the primary key attributes must be repeated to permit reconstruction of original relation.

This rule makes sure minimization of data redundancy. What are the dissimilar types of fragmentation?

 


Related Discussions:- Security-data fragmentation

Production management, create an er diagram for production management in fi...

create an er diagram for production management in film industry

Which operations need the participating relations to union, Which operation...

Which operations need the participating relations to be union compatible? A UNION, INTERSECTION and DIFFERENCE operations need the participating relations to be union compatibl

Normalization database, I need some help with my normalization database hom...

I need some help with my normalization database homework.

In the architecture of a database system which external leve, In the archit...

In the architecture of a database system which external level used? In the architecture of a database system view external level used.

Discuss the types of integrity constraints with example, Discuss the types ...

Discuss the types of integrity constraints in which must be checked for the update operations - Insert and Delete. Give examples. Insert operation can violet any of the subse

What is a primary index, What is a primary index? A primary index is an...

What is a primary index? A primary index is an index whose search key also explains the sequential order of the file.

State the steps of object design, State the Steps of Object Design ...

State the Steps of Object Design Object design is a very iterative process in which various classes, relationships among objects are added when you move from one level to

By which techniquestransaction processing is associated, By which technique...

By which techniquesTransaction processing is associated? Transaction processing is associated by producing detail, summary, or exception reports and recording a business activi

What is meant by log-based recovery, What is meant by log-based recovery? ...

What is meant by log-based recovery? The most widely used structures for recording database changes is the log. The log is a sequence of log records, recording all the update a

Dbms, You are managing the following database system: • DBMS: Oracle 11g ...

You are managing the following database system: • DBMS: Oracle 11g • OS: Sun Solaris • System architecture: Web-based application using ASP.Net • Purpose of Server: HR managem

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd