Security-drawbacks of data distribution, Database Management System

Security: In a centralised system, access to the data can be simply controlled. Though, in a distributed DBMS not only does access to replicated data have to be controlled in many locations, but also the network required to be secured. Networks over a period have become more secure, still there is a long way to go.

Posted Date: 3/12/2013 6:03:08 AM | Location : United States







Related Discussions:- Security-drawbacks of data distribution, Assignment Help, Ask Question on Security-drawbacks of data distribution, Get Answer, Expert's Help, Security-drawbacks of data distribution Discussions

Write discussion on Security-drawbacks of data distribution
Your posts are moderated
Related Questions
WHERE and HAVING clause in SQL ? The WHERE clause is commonly used for implementing conditions on each tuple of the relation. The HAVING clause is used in combination along wi

Give Concurrent sub states diagram for the classroom and exam held. In Figure, simultaneous substrates have been taken. After passing Minor 1 test you could give Minor 2 test. T

Need for Multiple Access Paths In practice, most of the online information systems need the support of multi-key files. For example, consider a banking database application hav

Process of Adjustment of inheritance During object design, inheritance is readjusted by rearranging classes and operations, and abstracting common behaviour.

Consistency: This property makes sure that a complete transaction implementation takes a database from one consistent state to another consistent state. If the transaction fails e

This assignment concerns the Research database. The database ER model is shown above, where attributes are omitted for clarity. The relational model for the database is: Departm

What are the aggregate objects in the data dictionary? Views Match codes Lock objects.

Write A short note on temporary tables? Temporary Tables - Temporary tables exists solely for a particular session, or whose data persists for the duration of the transaction

Record based Logical Models: Use records as the key data representation components Examples: Relational Model: It shows data as well as relationship between data in the form

List out various user authorization to modify the database schema. a)  Index authorization b)  Resource authorization c)  Alteration authorization d)  Drop authorizat