Security-data fragmentation, Database Management System

Security: Data not needed by local applications is not stored at the site, therefore no unnecessary security violations may exist.

But how can we carry out fragmentation? Fragmentation may be carried out as per the following rules:

a)      Completeness: This rule makes sure that there is no loss of data while fragmentation. If a relation is decomposed into fragments, then every data item must appear in at least single fragment.

b)      Reconstruction: This rule makes sure preservation of functional dependencies. It should be possible to describe a relational operation that will reconstruct the relation from its fragments.

c)       Disjointness: A data item that shows in a fragment should not show in any other fragment. Though, a typical fragmentation known as vertical fragmentation is an exception to this rule. In vertical fragmentation the primary key attributes must be repeated to permit reconstruction of original relation.

This rule makes sure minimization of data redundancy. What are the dissimilar types of fragmentation?

 

Posted Date: 3/13/2013 8:36:06 AM | Location : United States







Related Discussions:- Security-data fragmentation, Assignment Help, Ask Question on Security-data fragmentation, Get Answer, Expert's Help, Security-data fragmentation Discussions

Write discussion on Security-data fragmentation
Your posts are moderated
Related Questions
What is meant by software and hardware RAID systems? RAID can be executed with no change at the hardware level, using only software modification. Such RAID implementations are

Explain natural join? Natural Join - Similar as equi-join except in which the join attributes (having similar names) are not involved in the resulting relation. Only one sets

Determine object representation As a designer, we must choose properly that when to use primitive types in representing objects and when to combine groups of related objects,

Problem: ‘Users and Information system specialists need to spend inordinate amounts of time locating and gathering data' (Watson and Hal, 1998) Recent developments in the ar

folding method and mid square method using visual basic

What is persistency? Persistency ensures which data is stored and that after the object is no longer available (program stops running) the data will be available to other users

The Maximum no of key fields that can be used in a header is?? 50

There are many simple and complex approaches to implement. These reports are based on some views or certain query. The following number of reports can be built. 1. The averag

What are composite attributes? Composite attributes can be separated in to sub parts.

What is called a query evaluation plan? A sequence of primitive operations that can be used to assess a query is a query evaluation plan or a query implementation plan.