StudentShare solutions
Triangle menu

Application Development and Databases - Essay Example

Nobody downloaded yet
Permissions and authorization of users or processes are defined according to the policies of the business. An access control policy basically specifies a set of rules that describe the methods in which a client can access a server.
Access control Matrix: An access control matrix is a simple method for the storage of access control information. It is a table in which each row represents a subject (user), each column represents an object (the object can be a file or a record etc.) and each entry is the set of access rights for that subject to that object. In general the access control matrix will be sparse, because most users will not have access rights to most objects. Every subject will, however, be mapped with every object (subject, object, rights).
This approach can provide very fine grained security control. The problem is the more fine grained the control becomes the more entries are required in the table. In a big system the table can quickly become very big and difficult to manage and slow to search.
Access control list: A different approach is to use capabilities and access control lists. The first method is to specify only the objects that a user may access. This approach is called a capability. It can be seen as a token giving the possessor certain rights to an object. The capability can be stored with the subject.
A second method is to create a list that specifies which subjects can...
The first method is to specify only the objects that a user may access. This approach is called a capability. It can be seen as a token giving the possessor certain rights to an object. The capability can be stored with the subject.

A second method is to create a list that specifies which subjects can access an object, including their access rights. This approach is called an access control list (ACL). The ACL can be stored with the object or the resource.

View based security: Currently, authorization mechanisms in SQL permit access control at the level of complete tables or columns, or on views. It is also possible to create views for specific users, restricting access to data by granting rights only to certain views & tables for each user. These allow those users access to only selected tuples of a table. However, complex role based access control conditions are difficult to implement. In some cases view security can be bypassed (if users have access to base tables).

Also, management of security policy becomes complex by views. When a security policy is added, changed, or removed, it's difficult to determine what exactly to do with each view. An administrator cannot tell whether, by changing security policies through altering or dropping a view, he/she is breaking an application.

Enforcing Access control privileges:

i. Discretionary privileges: It is usually based on the granting and revoking of privileges.

It is further divided into two classifications:
1. The Account level: At this level, the DBA specifies the particular privileges that each account holds independently of the relations in the database.
Example: As the PMS is based on a centralized Oracle server, it must implement all the ...Show more


All issues will be thoroughly reviewed and al possible solutions will be provided in the light of the case study. At last the recommendation as to which the report can be further improved will also be discussed.
Access control in these IT systems, is one of the cornerstones of any Information Security Policy…
Author : winnifred96
Application Development and Databases
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Application Development and Databases"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

The article provides an overview of what databases are, how they are used, and their advantages and disadvantages. Table of Contents Abstract 1 Introduction 3 Types of Databases 3 Databases Management Systems 4 Use and Roles of Databases in Organisations 5 References 7 Databases Introduction Different experts define the term database differently.
4 pages (1000 words) Essay
This is especially in the case of databases. One of the solutions that is put forth in this case is the development of a relational database. There are various models of developing databases but the one, which is in focus, in this case is that to do with the relational database.
4 pages (1000 words) Essay
Some of these include flat databases and a relational databases. A flat database contains only one table. A database which contains one or several related tables is referred to as a relational database (Harrington, 2002). In a relational database, symbols are organized into a collection of relations.
4 pages (1000 words) Essay
History in Distributed Databases
The development of a database normally encompasses dealing with both the logical and physical designs of software and hardware devices that are used to store and handle an organization’s data storage. In addition, organizations can adopt any one of the several available techniques to develop a database.
10 pages (2500 words) Essay
Project 3: Databases
MSQL is a relational database management system developed by Microsoft. Database primary function is to retrieve and store data as requested by other software applications (Roza, 2011). There are different versions of MSQL which are targeted different audiences and different workloads.
3 pages (750 words) Essay
Ethics Development, Understanding & Application
Both ethics and psychology deal largely with human behavior, but they differ in the kind of question they raise about it, and consequently in method of investigation. Psychology, being a science, deals with the facts of psychophysical behavior, seeking to discover the causal laws by which behavior is governed and its predictable effects.
5 pages (1250 words) Essay
Are DNA Databases crossing the Line
This has followed a recent announcement by the American Federal Courts which claimed to be about to “cross a line” in criminal prosecution by expanding the realms within which this
8 pages (2000 words) Essay
The Semantic Web and Relational Databases essay
It has been integrated via the previous web technology The Semantic Web was thought up by Tim Berners-Lee, inventor of the WWW, URIs, HTTP, and HTML and has described it as a component of Web 3.0 (Impetus, 2008). Tim Berners-Lee has described Web 3.0 as, “People keep asking what Web 3.0 is.
8 pages (2000 words) Essay
E-Commerce Application Development
Having an online deal also requires the online payment. In pervious few years this concern has turned out to be great confront for the online customers. There are lots of cases regarding the online business that have been registered; these embrace
8 pages (2000 words) Essay
Critically analyse the significance, both strategically and operationally, of the use of databases in an area of administrative, or economic, or social activity 01292
Such information is later on utilized by managers to take important business decisions and to control business activities. Databases are particularly used for formulating reports and communicating the same to external stakeholders. The current research paper is
14 pages (3500 words) Essay
Comments (0)
Click to create a comment
Let us find you another Essay on topic Application Development and Databases for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
Join us:
Contact Us