Security-drawbacks of data distribution, Database Management System

Security: In a centralised system, access to the data can be simply controlled. Though, in a distributed DBMS not only does access to replicated data have to be controlled in many locations, but also the network required to be secured. Networks over a period have become more secure, still there is a long way to go.

Posted Date: 3/12/2013 6:03:08 AM | Location : United States







Related Discussions:- Security-drawbacks of data distribution, Assignment Help, Ask Question on Security-drawbacks of data distribution, Get Answer, Expert's Help, Security-drawbacks of data distribution Discussions

Write discussion on Security-drawbacks of data distribution
Your posts are moderated
Related Questions
Submit SQL INSERT Statements that will populate the database with sample data.  You must insert at least 5 records into each table in your database.Submit your SQL INSERT Statement

Higher Normal Forms Is there more normal forms beyond BCNF? Yes, though, these normal forms are not based on the concept of functional dependence. More normalisation is needed if

why shadow copy technique is used?

What is database Trigger? A database trigger is a PL/SQL block that can explained to automatically execute for insert, update, and delete statements against a table. The trigge

What is the need for triggers? Triggers are useful mechanisms for alerting humans or for starting particular tasks automatically when particular conditions are met.

Define union compatibility? Explain why INTERSECTION of two relations cannot be performed if they are not union compatible? Two relations R(A1, A2,-------, An) and S(B1, B2,--

what is attribute is attribute inheritance in dbms?

What are the disadvantages of file processing system? The drawbacks of file processing systems are a) Data redundancy and inconsistency b) Complexity in accessing data

Why 'AS' clause is used in SQL ? 'As' clause is used for Rename operation. ‘AS' clause is used in SQL for rename operation. (e.g., SELECT ENO AS EMPLOYEE_NO FROM EMP)

Compare three clustering algorithms in Weka. For this comparison, you will need to use at least two different datasets. Run the algorithms on the datasets, and use the visual