Relationship between security and integrity, Database Management System

Relationship between Security and Integrity:Database security usually refers to access, while database integrity refers to avoidance of accidental loss of consistency. But usually, the turning point or the dividing line among security and integrity is not always clear. Figure shows the relationship among data security and integrity.

             1929_Relationship between Security and Integrity.png

 

                                        Figure: Relationship between security and Integrity

Posted Date: 3/12/2013 5:23:59 AM | Location : United States







Related Discussions:- Relationship between security and integrity, Assignment Help, Ask Question on Relationship between security and integrity, Get Answer, Expert's Help, Relationship between security and integrity Discussions

Write discussion on Relationship between security and integrity
Your posts are moderated
Related Questions
SELECT Statement This statement is used for retrieving information from the databases. It can be coupled with many clauses. Let us talk about these clauses in more detail:

Define Atom of domain relational calculus An atom has the outline 1 , x 2 , ... , x n > -> r , in which r stands for a relation on n attributes and x 1 , x 2 , ... , x n ar

Create an index for the table Client, field CLIENT_NO of Q ? Command:   CREATE INDEX client_client_no ON client(client_no);

At its most essential level the DBMS architecture can be divide into two parts: the back end and the front end. The back end is responsible for managing the physical database an

Mention the purpose of SID and SOD lines SID (Serial input data line): It is an input line by which the microprocessor accepts serial data. SOD (Serial output data line)

Q.  Define a weak entity set and its identifying relationship. List the necessary conditions for a meaningful identifying relationship set of a weak entity set.    Entity is a t

What are the different kinds of database end users? Discuss the major activities of each? End-Users - End-users are the people whose jobs need access to the database for que

Define Deadlock recovery measures                   To recover from deadlock, the cycle in the wait-for-graph should be broken. The common technique of doing this is to rollbac

What is SQL, and why is it important? SQL stands for Structured Query Language, and is the most significant data processing language in use today. It is not a complete programm

Example:  //REVOKE ALL ON EMP FROM MCA12;                              (All permissions will be cancelled) You can also cancel only some of the permissions. Drop: A user-