Application Development and Databases

College
Essay
Miscellaneous
Pages 17 (4267 words)
Download 0
All issues will be thoroughly reviewed and al possible solutions will be provided in the light of the case study. At last the recommendation as to which the report can be further improved will also be discussed.
Access control in these IT systems, is one of the cornerstones of any Information Security Policy…

Introduction

Permissions and authorization of users or processes are defined according to the policies of the business. An access control policy basically specifies a set of rules that describe the methods in which a client can access a server.
Access control Matrix: An access control matrix is a simple method for the storage of access control information. It is a table in which each row represents a subject (user), each column represents an object (the object can be a file or a record etc.) and each entry is the set of access rights for that subject to that object. In general the access control matrix will be sparse, because most users will not have access rights to most objects. Every subject will, however, be mapped with every object (subject, object, rights).
This approach can provide very fine grained security control. The problem is the more fine grained the control becomes the more entries are required in the table. In a big system the table can quickly become very big and difficult to manage and slow to search.
Access control list: A different approach is to use capabilities and access control lists. The first method is to specify only the objects that a user may access. This approach is called a capability. It can be seen as a token giving the possessor certain rights to an object. The capability can be stored with the subject.
A second method is to create a list that specifies which subjects can ...
Download paper
Not exactly what you need?

Related papers

Personal Development Admission/Application Essay
The human resource is one of the factors that causes the current developments that the country is experiencing. Labor force is considered to be one of the country's most valuable resources, as reflected in the importance that is being given to the educational system. The education that Jordanians receive is very much at par with international standards, and this particular aspect that I have seen…
Ethics Development, Understanding & Application
Ethics too considers the psychophysical behavior of human beings, but always with reference to some standard of what behavior ought to be. Behavior considered in terms of a moral situation is called conduct. A psychologist who tried to use the technique of the mathematician or physicist would find that his results bore little relation to the qualitative variety of people's minds. Similarly, the…
Understanding of internal factors influencing customer behavior with application of theory in a given business situation and development marketing strategies
This product-centric view of market segments has been long discarded as being inadequate for very logical and plausible reasons. For any given product or service, there are usually at least four or five different segments of prospective customers that may utilize that product to solve a particular problem or satisfy a specific need. Each one of these segments will have different needs and values.…
Application Development and Databases
Permissions and authorization of users or processes are defined according to the policies of the business. An access control policy basically specifies a set of rules that describe the methods in which a client can access a server.…
Use of Databases in Our Organization
Hence, designing and establishing a firm's database, which is generally defined as a collection of records or related files stored systematically in a computer ("Computer Desktop Encyclopedia," 2004), are considered major factors in contributing to the productivity of the company. …
The Use of Databases
While selecting a database for a small organization like real estate business, Microsoft Access is the best. It gives an easy layout to design a database of our own, with wizard facility.…
ECommerce application for Computer Hardware Sale
It likewise details what prior investigations have proven and how the current research relates or differs from past efforts. Unanticipated consequences may also be indicated by previous research, whose one's own investigation can investigate (Cooper, 1998, p. 3).…