Security-drawbacks of data distribution, Database Management System

Security: In a centralised system, access to the data can be simply controlled. Though, in a distributed DBMS not only does access to replicated data have to be controlled in many locations, but also the network required to be secured. Networks over a period have become more secure, still there is a long way to go.

Posted Date: 3/12/2013 6:03:08 AM | Location : United States







Related Discussions:- Security-drawbacks of data distribution, Assignment Help, Ask Question on Security-drawbacks of data distribution, Get Answer, Expert's Help, Security-drawbacks of data distribution Discussions

Write discussion on Security-drawbacks of data distribution
Your posts are moderated
Related Questions
Advantages of Database management system Let us summarize the advantages. Reduction of Redundancy: This is perhaps the most important advantage of using DBMS. Redundancy i

Partial Key : It is a group of attributes that can uniquely identify small entities and that are related to same base entity. It is sometime named as Discriminator.  Altern

Describe log based recovery The most usably structure for recording data base modification is the LOG the log is a sequence of log records recording all the update activities i

What is conceptual model ? A conceptual model is a independent of both hardware and software.

statical data

Ways for Selecting Data Structure Algorithms operate on data structure. Therefore, selection of the best algorithm means selecting the best data structure from whole bunch. Th

These permit the user to unload a database or parts of a database and reload the data on the similar machine, or on another machine in a dissimilar location. This can be useful in

What are two special events? The two special events are as "entry" and "exit". Any action which is marked as linked to entry event is executed whenever given state is entered v

Project Description: Critical Project for VMware Technical support. VMWare ESXi 5.1 support for upgradation and migration problem. Technical expert of Vmware needed. Sk

The Proliferation of Object-Oriented Methods The first few years of the 1990s saw blossoming of around fifty various object oriented methods. This proliferation is a sign of g