Difference between operating system and database security, Database Management System

Difference between Operating System and Database Security

Security within the operating system can be executed at various levels ranging from passwords for access to system, to the isolation of concurrent implementing processes with the system. Though, there are a few differences among security measures taken at operating system level as compared to those that of database system. These are:

  •  Database system defends more objects, as the data is persistent in nature. Also database security is concerned with dissimilar levels of granularity such as tuple, file an attribute value or an index. Operating system security is primarily concerned with the use of resources and management.
  • Database system objects can be difficult logical structures such as views, a number of which can map to the similar physical data objects. Moreover dissimilar architectural levels by internal, conceptual and external levels, have dissimilar security requirements. Therefore, database security is concerned with the semantics - meaning of data and also with its physical representation. Operating system can give security by not allowing any operation to be performed on the database unless the user is approved for the operation concerned.

Figure shows the architecture of a database security subsystem that can be found in any commercial DBMS.

                                                                      1357_Difference between Operating System and Database Security.png

                                                                                                         Figure: Database Security subsystem

Posted Date: 3/12/2013 5:25:34 AM | Location : United States







Related Discussions:- Difference between operating system and database security, Assignment Help, Ask Question on Difference between operating system and database security, Get Answer, Expert's Help, Difference between operating system and database security Discussions

Write discussion on Difference between operating system and database security
Your posts are moderated
Related Questions
Guidelines for creation of table: Table name should begin with an alphabet. In table name, single quotes and blank spaces are not allowed. Reserve words of that DBM

A B-tree of order how much children m has maximum ? m has maximum m mchildren in a B tree.

Define Timestamp ordering Ans In timestamp-based method, a serial order is made among the concurrent transaction by assigning to every transaction a unique nondecreasing number

what are the states of transaction?

crete a data base relationship model Entity: Students; Professors; Dormitories buildings; Attributes of students: Name; Address; Dorm;

(a) Explain briefly the three parts of a relational Model. (b) Contrast the following terms with an appropriate example: (i) stored attribute v/s derived attribute (ii) en

Define shadow paging. An alternative to log-based crash recovery method is shadow paging. This technique requires fewer disk accesses than do the log-based methods.

Assume that you are responsible for selecting a new DBMS product for Sohar Hospital

What is inheritance? Inheritance is an object orientation concept that allows reusability of code / design. Basic sense of inheritance is that if one class is predefined than a

The Structured Query Language INTRODUCTION Database is an organised set of information about an entity having controlled redundancy and serves numerous applications. DBMS