Authorisation, Database Management System

Authorisation

Authorisation is the culmination of the administrative policies of the organisation.  As the name shows, authorisation is a set of rules that can be used to verify which user has what type of access to which portion of the database. The following forms of authorisation are allowed on database items:

1)   READ:  it permits reading of data object, but not modification, deletion or insertion of data object.

2)   INSERT:  Permits insertion of new data, but not allow the modification of existing data, e.g., insertion of tuple in a relation.

3)   UPDATE:  Permits modification of data, but not its deletion.  But data items like primary-key attributes may not be modified.

 4)   DELETE: Permits deletion of data only.

A user may be assigned all, none or a combination of these types of approval, which are broadly known as access authorisations.

In addition to these manipulation operations, a user might be granted control operations like

1)   Add:  Permits adding new objects such as new relations.

 2)   Drop:  Permits the deletion of relations in a database.

3)   Alter:  Permits addition of new attributes in a relations or deletion of existing attributes from the database.

4)   Propagate Access Control:  This is an additional right that permits a user to propagate the access control or access right which s/he already has to some other, i.e., if user A has access right R over a relation S, then if s/he has propagate access control, s/he can propagate her/his access right R over relation S to one more user B either fully or part of it. In SQL you can use WITH GRANT OPTION for this right.

The crucial form of authority is given to the database administrator.  He is the one who might be authorize new users, restructure the database and so on.  The process of Authorisation includes supplying information known only to the person the user has claimed to be in the identification procedure.

Posted Date: 3/12/2013 5:26:29 AM | Location : United States







Related Discussions:- Authorisation, Assignment Help, Ask Question on Authorisation, Get Answer, Expert's Help, Authorisation Discussions

Write discussion on Authorisation
Your posts are moderated
Related Questions
Failures and Recovery In practice various things might occur to prevent a transaction from completing. Recovery methods are used to bring database, which does not satisfy consi

Example: RELATIONAL SCHEMA for PERSON: PERSON (PERSON_ID: integer, NAME: string, AGE: integer, ADDRESS: String) RELATION INSTANCE In this instance, m = 3 and n = 4

construct a B+ tree for the following set of key value (2,3,5,7,11,19,23,29,31) in ascending order where the pointers that will fit in one node is as follows:A. four B. six C. eigh

Define the term- Actors and Data Stores Actors: An actor is the active object which drives data flow graph by producing or consuming values. Actors are attached to inputs a

Multi-list file Organisation Multi-list file organisation is a multi-index linked file organisation. A linked file organisation is a logical organisation where physical orderin

Explain the concept of a data model ? Data Model - Model is an abstraction procedure which hides irrelevant details although highlighting details relevant to the application

Explain how you can define an object model of a system. A list of terms that shall be used by end users to describe state and behaviour of objects in system.   Different use

explain exhausitively the problems associated with er diagrams with ellustrations

Can you help me with the following: Drop statements for all objects in the lab project. Create statements for all objects of the lab project Create indexes for foreign keys Cre

Explain weak and strong entity sets? Weak and Strong entity sets: A physically powerful entity set has a primary key. All tuples in the group are distinguishable through that k