Explain discretionary access control, Database Management System

Assignment Help:

Problem:

(a) Given the following relation:

Stats(Name,Sex,Children, Occupation, Salary, Tax, Audits) Write SQL code to define the following security constraints:

(i) User Ford RETRIEVE privileges over the entire relation.

(ii) User Smith INSERT, DELETE privileges over the entire relation.

(iii) User Nash RETRIEVE privileges over the entire relation and UPDATE privileges over the SALARY AND TAX attributes(only).

(iv) User Todd RETRIEVE privileges over NAME, SALARY AND TAX attributes only.

(v) User Pope full privileges(RETRIEVE,UPDATE,INSERT,DELETE) over tuples for preachers only.

(b) In the context of security, demonstrate your understanding on the following terms: (support your answers with appropriate examples wherever possible).

(i) Discretionary Access Control.

(ii) Mandatory Access Control.

(iii) Audit Trail.


Related Discussions:- Explain discretionary access control

What is relational algebra, What is Relational Algebra? Relational algebr...

What is Relational Algebra? Relational algebra is a Procedural query Language?

Example of primary key, Suppose that in an organisation, an employee may do...

Suppose that in an organisation, an employee may do different roles in dissimilar projects. Say, RAM is doing coding in one project and doing designing in another. Suppose that the

Information infrasctructure., what factors might influence a company to out...

what factors might influence a company to outsource its IT infrascture.

Describe the storage structure of indexed sequential file, Describe the sto...

Describe the storage structure of indexed sequential files and their access method. Ans: Index offers a lookup capability to rapidly reach the vicinity of the desired record.

Differentiate between a unique key and a primary key, Differentiate between...

Differentiate between a unique key and a primary key. - By default, clustered index on column are created by primary key while nonclustered index are created by unique key.

Need for a database management system, NEED FOR A DATABASE MANAGEMENT SYSTE...

NEED FOR A DATABASE MANAGEMENT SYSTEM A Database is a structured, persistent collection of data of an organisation. The database management system (DBMS) manages the database o

Extended star schema, Northwind Pty Ltd sells a variety of food products th...

Northwind Pty Ltd sells a variety of food products throughout the world.  They want to use the reporting features of SAP's Business Information Warehouse to better understand their

What is a candidate key, What is a candidate key? Minimal super keys ar...

What is a candidate key? Minimal super keys are known as candidate keys.

Differentiate between primary and secondary storage, Differentiate between ...

Differentiate between Primary and secondary storage? Primary and secondary storage - Primary storage device stores the data temporarily. Primary storage is commonly used thro

Explain different addressing modes of 8086, 1. Explain different addressing...

1. Explain different addressing modes of 8086 Explanation of all addressing modes 2. Write a sequence of instructions to exchange two register contents using stack

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd