Authorisation, Database Management System

Authorisation

Authorisation is the culmination of the administrative policies of the organisation.  As the name shows, authorisation is a set of rules that can be used to verify which user has what type of access to which portion of the database. The following forms of authorisation are allowed on database items:

1)   READ:  it permits reading of data object, but not modification, deletion or insertion of data object.

2)   INSERT:  Permits insertion of new data, but not allow the modification of existing data, e.g., insertion of tuple in a relation.

3)   UPDATE:  Permits modification of data, but not its deletion.  But data items like primary-key attributes may not be modified.

 4)   DELETE: Permits deletion of data only.

A user may be assigned all, none or a combination of these types of approval, which are broadly known as access authorisations.

In addition to these manipulation operations, a user might be granted control operations like

1)   Add:  Permits adding new objects such as new relations.

 2)   Drop:  Permits the deletion of relations in a database.

3)   Alter:  Permits addition of new attributes in a relations or deletion of existing attributes from the database.

4)   Propagate Access Control:  This is an additional right that permits a user to propagate the access control or access right which s/he already has to some other, i.e., if user A has access right R over a relation S, then if s/he has propagate access control, s/he can propagate her/his access right R over relation S to one more user B either fully or part of it. In SQL you can use WITH GRANT OPTION for this right.

The crucial form of authority is given to the database administrator.  He is the one who might be authorize new users, restructure the database and so on.  The process of Authorisation includes supplying information known only to the person the user has claimed to be in the identification procedure.

Posted Date: 3/12/2013 5:26:29 AM | Location : United States







Related Discussions:- Authorisation, Assignment Help, Ask Question on Authorisation, Get Answer, Expert's Help, Authorisation Discussions

Write discussion on Authorisation
Your posts are moderated
Related Questions
#quesDefine a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a pi

Difference between Operating System and Database Security Security within the operating system can be executed at various levels ranging from passwords for access to system, t

Atomicity : Either all functions are laid out or none are. Users could not have to think about the effect of incomplete operations. DBMS ensures this by undoing the functions

How does a query tree represent a relational algebra expression?  Discuss any three rules for query optimisation, giving example as to when should each rule be applied.     Ans

What is a view in SQL? When can views be updated? A view is a virtual table which consists of columns from one or more tables. Through it is same to a table; it is stored in

Design Of Distributed Databases: The distributed databases are mainly relational at local level. So a local database schema is the similar as that of a centralised database design

What is an E-R model? Draw an E-R Diagram for the company database with following Descriptions? The company is organized within departments. Each department has a unique name a

Define a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a pictori

Describe the Menu based interfaces for web clients or browsing? Menu-Based Interfaces for Web Clients or Browsing - These interfaces present the user along with lists of option

what is the need of a log in dbms