A basic model of database access control, Database Management System

Assignment Help:

A basic model of Database Access Control

Models of database access control have grown out of previous work on protection in operating systems. Let us talk about one simple model with the help of the following example:

Security problem: Consider the relation:

Employee (Empno, Name,Deptno, Address,  Salary, Assessment)

Suppose there are two users: General user and Personnel manager. What access rights may be approved to each user? One extreme possibility is to approve an unconstrained access or to have a limited access.

 

                1543_A basic model of Database Access Control.png

 

One of the mainly influential protection models was developed by Lampson and extended by Denning and Graham.  This model has 3 components:

1)   A set of objects:  Where objects are the entities to which access must be controlled.

2)   A set of subjects:  Where subjects are entities that request access to objects.

3)   A set of all access rules:  Which can be thought of as forming an access (often referred to as authorisation matrix).

Let us make a sample authorisation matrix for the given relation:

Object

 

 

Subject

Empno

Name

Address

Deptno

Salary

Assessment

Personnel

Manager

Read

All

All

All

All

All

General

User

Read

Read

Read

Read

Not accessible

Not accessible

 

As the over matrix shows, General user and Personnel Manager are the two subjects. Objects of database are Empno, Address, Name,  Deptno, Salary and Assessment.  As per the access matrix, Personnel Manager can do any operation on the database of an employee except for updating the Empno that might be self-generated and once given cannot be changed. The general user can only read the data but cannot update, insert or delete the data into the database. Also the information about the salary and assessment of the employee is not accessible to the general user.

In summary, it can be said that the basic access matrix is the representation of basic access rules. These rules may be executed using a view on which several access rights may be given to the users.

 

 


Related Discussions:- A basic model of database access control

Data warehouse, #queDefine a job scheduling strategy that will meet busines...

#queDefine a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a pic

Using column aliases-data manipulation language, Using Column aliases E...

Using Column aliases Example: To print column names as NAME and ANNUAL SALARY SELECT ENAME "NAME", SAL*12 "ANNUAL SALARY" FROM EMP;

Describe graphical user interface, Describe Graphical User Interface? ...

Describe Graphical User Interface? Graphical User Interfaces (GUIs) - A GUI typically displays a schema to the user in diagrammatic form. The user can then specify a query th

How can you start mysql server, How can you Start MySQL Server? To star...

How can you Start MySQL Server? To start the mysql program type it is name in the command- line prompt. After starting mysql program just display A welcome letter using the

What is candidate key, What is Candidate Key Super Key or Candidate Ke...

What is Candidate Key Super Key or Candidate Key: It is such an attribute of a table that can uniquely recognize a row in a table. Generally they have unique values and can n

Define deadlock avoidance, Define Deadlock avoidance These protocols a...

Define Deadlock avoidance These protocols as well ensure that the system will never enter a deadlock state although the way it is done is different from deadlock prevention. I

Write query to select student from math department, Consider the table stud...

Consider the table student and list names of students in the departments other than maths and computer. SELECT std_name FRM student WHERE dept_name NOT IN (‘Maths','Computer);

Increased parallelism-data replication, Increased parallelism : Since the r...

Increased parallelism : Since the replicated date has several copies a query can be distributed or can be answered from the smallest loaded site. Also, with more replicas you have

Explain natural join, Explain natural join? Natural Join - Similar as...

Explain natural join? Natural Join - Similar as equi-join except in which the join attributes (having similar names) are not involved in the resulting relation. Only one sets

What are referential integrity constraints, What are referential integrity ...

What are referential integrity constraints? A value that appears in single relation for a given set of attributes also appears for a particular set of attributes in another rel

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd