DATABASE CONTROLS Chapter 14

advertisement
DATABASE CONTROLS
Chapter 14
Access Controls

Discretionary Access Controls
Types of Restrictions :
1. Name-dependent restrictions
2. Content-dependent restrictions
3. Context-dependent restrictions
4. History-dependent restrictions
Horizontial propagation of privileges limited to three users :
User B
User A
User C
privileges
User D
privileges
privileges
User F
User E
Vertical propagation of privileges limited to three users :
User B
User A
privileges
User F
User C
privileges
privileges
User E
User D


Mandatory Access Controls
- Classification level
- Clearance level
- Polyinstantiation Approach
Some Implementation Issues
Integrity Controls

Entity-Relationship Model Integrity Constraints
1. Uniqueness
2. Maximum cardinality
3. Minimum cardinality
4. Entity identifier
5. Value type of identifier
6. Value set of identifier


Relational Data Model Integrity Constraints
1. Key
2. Entity
3. Referential
Object Data Model Integrity Constraints
1. Unique identifier
2. Unique key
3. Value type of attribute
4. Value set of attribute
5. Types and inheritance
Application Software Controls
Update protocols :
 Sequence check transaction and master
files
 Ensure all records on files are processed
 Process multiple transactions for a single
record in the correct order
 Maintain a suspense account
Report Protocols :
 Print control data for internal tables
 Print run-to-run control totals
 Print suspense account entries
Concurrency Controls


Nature of the shared data resource problem
The problem of Deadlock :
1. Lockout
2. Concurrency
3. Additional request
4. No preemption
5. Circular wait



Solutions to Deadlock
Preventing Deadlock
1. Atomicity
2. Consistency
3. Isolation
4. Durability
Distributed Database Concurrency Controls
1. Schedulers are replicated and stored with
each version of the data item.
2. One version of the data item and its
associated scheduler is designated as the
primary copy.
Cryptographic controls




File Key
Secondary Key
Master Key
Access to the key
Several disadvantages arise
File Handling Controls


Internal data item :
1. Internal label
2. Generation Number
3. Retention date
4. Control totals
Several hardware controls
Audit Trail Controls


Accounting Audit Trail :
1. It must attach a unique time stamp to all
transaction applied against the database.
2. The database subsystem must attach
beforeimages and afterimages.
3. The database subsystem must provide
facilities to define, create, modify, delete, and
retrive data in the audit trail.
Operations Audit Trail.
Download