Authorisation, Database Management System

Authorisation

Authorisation is the culmination of the administrative policies of the organisation.  As the name shows, authorisation is a set of rules that can be used to verify which user has what type of access to which portion of the database. The following forms of authorisation are allowed on database items:

1)   READ:  it permits reading of data object, but not modification, deletion or insertion of data object.

2)   INSERT:  Permits insertion of new data, but not allow the modification of existing data, e.g., insertion of tuple in a relation.

3)   UPDATE:  Permits modification of data, but not its deletion.  But data items like primary-key attributes may not be modified.

 4)   DELETE: Permits deletion of data only.

A user may be assigned all, none or a combination of these types of approval, which are broadly known as access authorisations.

In addition to these manipulation operations, a user might be granted control operations like

1)   Add:  Permits adding new objects such as new relations.

 2)   Drop:  Permits the deletion of relations in a database.

3)   Alter:  Permits addition of new attributes in a relations or deletion of existing attributes from the database.

4)   Propagate Access Control:  This is an additional right that permits a user to propagate the access control or access right which s/he already has to some other, i.e., if user A has access right R over a relation S, then if s/he has propagate access control, s/he can propagate her/his access right R over relation S to one more user B either fully or part of it. In SQL you can use WITH GRANT OPTION for this right.

The crucial form of authority is given to the database administrator.  He is the one who might be authorize new users, restructure the database and so on.  The process of Authorisation includes supplying information known only to the person the user has claimed to be in the identification procedure.

Posted Date: 3/12/2013 5:26:29 AM | Location : United States







Related Discussions:- Authorisation, Assignment Help, Ask Question on Authorisation, Get Answer, Expert's Help, Authorisation Discussions

Write discussion on Authorisation
Your posts are moderated
Related Questions
Define check point and its impact on data base recovery.                  Ans:  There could be hundreds of transactions handled per minute, in a large on-line database system.

The objectives of this assignment are:  - to develop skills in the design of database driven applications  - to develop skills in applying SQL to implement the relational and


1) Define a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a pict

how to write tables and drow E-R diagrams for hosiptal management system and how to normalize and cardinalities?

What is assertion? Mention the forms available. An assertion is a predicate expressing a condition that we wish the database always to satisfy. Domain integrity constraints.

What is Foreign Key Foreign Key: Sometimes we may have to work with an attribute that does not have a primary key of its own. To recognize its rows, we have to use the primar

Define weak and strong entity sets? Weak entity set: entity set that do not have key attribute of their own are known as weak entity sets. Strong entity set: Entity set that

Write short notes on tuple relational calculus. The tuple relational calculation is anon procedural query language. It defines the desired information without giving a particul

What it creates while a primary key is combined with a foreign key? It creates Parent-Child relation ship between the tables that connect them while a primary key is combined w