Explain discretionary access control, Database Management System

Assignment Help:

Problem:

(a) Given the following relation:

Stats(Name,Sex,Children, Occupation, Salary, Tax, Audits) Write SQL code to define the following security constraints:

(i) User Ford RETRIEVE privileges over the entire relation.

(ii) User Smith INSERT, DELETE privileges over the entire relation.

(iii) User Nash RETRIEVE privileges over the entire relation and UPDATE privileges over the SALARY AND TAX attributes(only).

(iv) User Todd RETRIEVE privileges over NAME, SALARY AND TAX attributes only.

(v) User Pope full privileges(RETRIEVE,UPDATE,INSERT,DELETE) over tuples for preachers only.

(b) In the context of security, demonstrate your understanding on the following terms: (support your answers with appropriate examples wherever possible).

(i) Discretionary Access Control.

(ii) Mandatory Access Control.

(iii) Audit Trail.


Related Discussions:- Explain discretionary access control

Describe physical data independence, Describe Physical Data independence ? ...

Describe Physical Data independence ? Physical Data Independence - It is capacity to modify the internal schema without having to change conceptual schema. Therefore, the exter

What is hashing file organization, What is hashing file organization? ...

What is hashing file organization? In the hashing file organization, a hash function is computed on some attribute of every record. The result of the hash function specify in

Visio diagram - database, The database depicted in the Visio diagram descri...

The database depicted in the Visio diagram describes Proceeding , Article , Researcher , article PublishedIn a proceeding, article WrittenBy researchers and proceedings Edi

How can you connect to the mysql server, How can you connect to the MySQL S...

How can you connect to the MySQL Server? In order to connect to the MySQL server it is necessary to give the username and password so this be able to done with The following

Greater potential for bugs and increased processing overhead, Greater poten...

Greater potential for bugs: Since the sites of a distributed system operate simultaneously, it is more complex to ensure the correctness of algorithms. The art of constructing dis

Explain the term- data flows, Explain the term- Data Flows Data Flows:...

Explain the term- Data Flows Data Flows: A data flow connects output of an object or process to input of another process or object. It represents an in-between data value wit

Normalise data to third normal form, A software contract and consultancy fi...

A software contract and consultancy firm maintains details of all the various projects in which its employees are currently involved. These details comprise: Employee Numbe

Give example of relational schema, An instance of relational schema R (A, B...

An instance of relational schema R (A, B, C) has distinct values of A including NULL values. then A is a candidate key or not? If relational schema R (A, B, C) has distinct val

Describe the composite key, Describe the Composite Key Composite Key: ...

Describe the Composite Key Composite Key: Sometimes one key is not enough to uniquely recognize a row. E.g. in a single class Roll is enough to search a student, but in the w

find a non-redundant cover and canonical cove, Given the following set of ...

Given the following set of functional dependencies {cf→ bg, g → d, cdg → f, b → de, d → c} defined on R(b,c,d,e,f,g) a. Is cf→ e implied by the FDs? b. Is dg a superkey?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd