Security model for relational database systems

Assignment Help Basic Computer Science
Reference no: EM133985396

Discussion

In this forum, you are to choose a security model for relational database systems (Discretionary Access Control models: System R Authorization Model, Content-Based and Fine-Grained Access Control, RBAC, or Mandatory Access Control model). Then use an example of a real-life application (healthcare system, military system, school system, banking system, etc..), and discuss how features from this model can be used to support complex policies. Please give examples of such policies, (e.g. "Doctors cannot read patients information unless they are their primary care provider") and indicate which current (or older) commercial database systems implement the discussed features.

For example, if you select the multilevel model, you can take the example of a military database system, in which users' security level can be based on their military rank (General are granted a Top Secret Clearance, while Lieutenants are granted a Confidential clearance, etc.), and in which categories can correspond to the continent where they are deployed. Relations in the database are also labeled with a security level (Top Secret, Secret,...) and a category. Policies such as "Lieutenants cannot read Top Secret Documents", or "Lieutenants can read Confidential documents only for the continent where they are deployed. " can be supported by this model. The label security mechanism in Oracle implements these feature

 

Reference no: EM133985396

Questions Cloud

Data for human heights or for human weights : When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data.
Different challenges that are faced in digital forensics : Provide a summary of two real-life scenario case studies for two different challenges that are faced in digital forensics,
Discuss both sides of the fence : Discuss both sides of the fence. Offer examples of behaviors where there is an evident lack of buy-in for various security compliance requirements.
Variety of cyber threat actors : As a professional in field of cybersecurity, you should be aware of best-practice tactics and methods necessary for responding to variety of cyber threat actors
Security model for relational database systems : You are to choose a security model for relational database systems (Discretionary Access Control models: System R Authorization Model,
Compare the time taken for encryption and decryption : Measure and compare the time taken for encryption and decryption using DES, 3DES and AES, with different input sizes
Breaches in information security : breaches in Information security. What techniques were used to carry out the breach? What could have been done to prevent the breach?
What is the purpose of virtualization technology : What is the purpose of Virtualization technology? Here you should write the benefits of Virtualization technology.
Introduction to intrusion detection : Since our first session serves as our introduction to intrusion detection,

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd