Explain discretionary access control, Database Management System


(a) Given the following relation:

Stats(Name,Sex,Children, Occupation, Salary, Tax, Audits) Write SQL code to define the following security constraints:

(i) User Ford RETRIEVE privileges over the entire relation.

(ii) User Smith INSERT, DELETE privileges over the entire relation.

(iii) User Nash RETRIEVE privileges over the entire relation and UPDATE privileges over the SALARY AND TAX attributes(only).

(iv) User Todd RETRIEVE privileges over NAME, SALARY AND TAX attributes only.

(v) User Pope full privileges(RETRIEVE,UPDATE,INSERT,DELETE) over tuples for preachers only.

(b) In the context of security, demonstrate your understanding on the following terms: (support your answers with appropriate examples wherever possible).

(i) Discretionary Access Control.

(ii) Mandatory Access Control.

(iii) Audit Trail.

Posted Date: 11/13/2013 3:03:31 AM | Location : United States

Related Discussions:- Explain discretionary access control, Assignment Help, Ask Question on Explain discretionary access control, Get Answer, Expert's Help, Explain discretionary access control Discussions

Write discussion on Explain discretionary access control
Your posts are moderated
Related Questions
online eductional management system ke diagram

draw er diagram using entities crop,employee,department,plot,cultivation plan,machinery,seed,fertilizer

Explain the ACID properties of a transaction Ans: ACID properties are a significant concept for databases. The ACID stands for Atomicity, Consistency, Isolation, and Durability

What is the use of unique function? UNIQUE function: If UNIQUE is specified then only unique values are used to computed the mean.

How can you map NULL values to other values while display? IF( ) , IFNULL( ) keywords are used to do so. They are 'LIMIT' is used for the following kinds of problems: 1) Ans

QUESTION (a) Consider a car database consisting of car model, car make, car origin, Engine capacity, color, cost.

SET concept is used in which type of modelling? SET concept is used in Network Model.

You are managing the following database system: • DBMS: Oracle 11g • OS: Sun Solaris • System architecture: Web-based application using ASP.Net • Purpose of Server: HR managem

Find a 3NF decomposition of the following relation scheme: University (Faculty, Dean, Department, Chair, Professor, Rank, Student}. The University relation satisfies the following

Difference between Operating System and Database Security Security within the operating system can be executed at various levels ranging from passwords for access to system, t