StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Application Development and Databases - Essay Example

Cite this document
Summary
All issues will be thoroughly reviewed and al possible solutions will be provided in the light of the case study. At last the recommendation as to which the report can be further improved will also be discussed.
Access control in these IT systems, is one of the cornerstones of any Information Security Policy…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.2% of users find it useful
Application Development and Databases
Read Text Preview

Extract of sample "Application Development and Databases"

Download file to see previous pages

Permissions and authorization of users or processes are defined according to the policies of the business. An access control policy basically specifies a set of rules that describe the methods in which a client can access a server. Access control Matrix: An access control matrix is a simple method for the storage of access control information. It is a table in which each row represents a subject (user), each column represents an object (the object can be a file or a record etc.) and each entry is the set of access rights for that subject to that object.

In general the access control matrix will be sparse, because most users will not have access rights to most objects. Every subject will, however, be mapped with every object (subject, object, rights). This approach can provide very fine grained security control. The problem is the more fine grained the control becomes the more entries are required in the table. In a big system the table can quickly become very big and difficult to manage and slow to search. Access control list: A different approach is to use capabilities and access control lists.

The first method is to specify only the objects that a user may access. This approach is called a capability. It can be seen as a token giving the possessor certain rights to an object. The capability can be stored with the subject. A second method is to create a list that specifies which subjects can. The first method is to specify only the objects that a user may access. This approach is called a capability. It can be seen as a token giving the possessor certain rights to an object. The capability can be stored with the subject.

A second method is to create a list that specifies which subjects can access an object, including their access rights. This approach is called an access control list (ACL). The ACL can be stored with the object or the resource. View based security: Currently, authorization mechanisms in SQL permit access control at the level of complete tables or columns, or on views. It is also possible to create views for specific users, restricting access to data by granting rights only to certain views & tables for each user.

These allow those users access to only selected tuples of a table. However, complex role based access control conditions are difficult to implement. In some cases view security can be bypassed (if users have access to base tables).Also, management of security policy becomes complex by views. When a security policy is added, changed, or removed, it's difficult to determine what exactly to do with each view. An administrator cannot tell whether, by changing security policies through altering or dropping a view, he/she is breaking an application.

Enforcing Access control privileges:i. Discretionary privileges: It is usually based on the granting and revoking of privileges. It is further divided into two classifications: 1. The Account level: At this level, the DBA specifies the particular privileges that each account holds independently of the relations in the database.Example: As the PMS is based on a centralized Oracle server, it must implement all the

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Application Development and Databases Essay Example | Topics and Well Written Essays - 4250 words”, n.d.)
Application Development and Databases Essay Example | Topics and Well Written Essays - 4250 words. Retrieved from https://studentshare.org/miscellaneous/1517746-application-development-and-databases
(Application Development and Databases Essay Example | Topics and Well Written Essays - 4250 Words)
Application Development and Databases Essay Example | Topics and Well Written Essays - 4250 Words. https://studentshare.org/miscellaneous/1517746-application-development-and-databases.
“Application Development and Databases Essay Example | Topics and Well Written Essays - 4250 Words”, n.d. https://studentshare.org/miscellaneous/1517746-application-development-and-databases.
  • Cited: 0 times

CHECK THESE SAMPLES OF Application Development and Databases

What are referential integrity constraints Provide an example

Provide an example Referential integrity is an important feature of databases that ensures consistent associations among database tables.... When one database table comprises a FK (foreign key) to any other table, the idea of referential integrity outlines that we cannot insert a record to the… Additionally, it also comprises methods for example cascading delete and cascading update; to make sure transformations are formulated to the associated tables are revealed in the ID # What are “referential integrity constraints”?...
1 Pages (250 words) Admission/Application Essay

Computer forensics: admissibility of evidence in criminal cases

DNA Technology in Forensic Science (1992) Committee on DNA Technology in Forensic Science, Washington, DC, National Academies PressGenetic profiling and databases are not a new concept.... However, the personal and sensitive information that DNA produces, requires strict… The Committee also shows how databases have created an evolution in forensics.... The Committee also shows how databases have created an evolution in forensics....
2 Pages (500 words) Admission/Application Essay

Assessment and Training as Critical Activities

Whether one is a specialist or a human resource generalist, he or she should impress training and assessment as a tool to achieving success in a company.... For one to come up with a… These steps are classified into five groups.... They include evaluation, need assessment, design, instructional objective, and implementation....
9 Pages (2250 words) Admission/Application Essay

Education Major in Child Development

This paper "Education Major in Child development" focuses on the fact that the author's passion for teaching young children towards their development of being responsible adults led the author of this paper to the desire to become one of the faculty members in school.... As attached in my resume, I have recently gained my Associate Degree in Education major in Child development.... In response to this need, I am back to studying at San Jose State University, continuing my major in Child development, along with the Chinese language....
1 Pages (250 words) Admission/Application Essay

Human Development

n conclusion, adolescence is a very critical stage in human development and therefore those in the stage should be assisted to comprehend the changes and challenges within adolescent stage.... The transition period from the late childhood to adulthood is… Adolescence is a challenging stage of human development mainly characterised by unique physical, social and emotional changes. Adolescence commences with the onset of puberty between the age of about 12 and 20 years although it may extend Human development Human development: Adolescent Stage Human development is the process of broadening the freedoms of the people and opportunities in order to improve their wellbeing....
1 Pages (250 words) Admission/Application Essay

MS in Real Estate Development

My family owns more than one thousand acres of land with a lot of development projects.... Our current real estate collection ranges from residential to commercial and industrial properties… My family's next large scale development project will be to construct a small town a few miles outside East of Jakarta Region.... The project is planned to have five stages of development in the course of However, the recent economic slump in Indonesia has caused the postponement of our expansion plan....
4 Pages (1000 words) Admission/Application Essay

Personal Development Plan

In this paper, the writer would like to explain his personal development plan with the help of his current position and future aspirations in his professional life.... Career development is one of the main objectives of any enthusiastic professional who wants to capture the heights in his profession.... Career aspiring professionals must develop a personal development plan in order to make them capable of accepting bigger challenges in their future professional life....
12 Pages (3000 words) Admission/Application Essay

Personal Development Plan for the Master's Skills

The author of the paper “Personal development Plan for the Master's Skills” resumes that received master's skills and abilities can help him to get further knowledge to develop businesses so that he continues to deliver quality products to the consumers to satisfy their wants and needs.... hellip; A personal development plan for the masters' skill is an arrangement in advance that is conducted to ensure that the set targets are achieved.... These are therefore well discussed in the paper concerning the ideal as that would assist me in the development of the masters' plan....
12 Pages (3000 words) Admission/Application Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us