Uploaded by tanishkamayekar942

ADBMS CHP 2

advertisement
DBMS CHP 2
ACCESS PROTOCOL
Access control is the procedure by which users are identified and granted
specific privileges to information, systems, or resources.
Access control is the ability to allow or deny the use of a specific resource by a
specific entity.
1. DAC :
DAC is identity-based access control. DAC mechanisms will be controlled by user
identification such as username and password. DAC is discretionary because the owners
can transfer objects or any authenticated information to other users. In simple words,
the owner can determine the access privileges.
Attributes of DAC –
1. Users can transfer their object ownership to another user.
2. The access type of other users can be determined by the user.
3. Authorization failure can restrict the user access after several failed attempts.
4. Unauthorized users will be blind to object characteristics called file size,
directory path, and file name.
Examples- Permitting the Linux file operating system is an example of DAC.
2. MAC :
The operating system in MAC will provide access to the user based on their identities
and data. For gaining access, the user has to submit their personal information. It is very
secure because the rules and restrictions are imposed by the admin and will be strictly
followed. MAC settings and policy management will be established in a secure network
and are limited to system administrators.
Attributes of MAC –
1. MAC policies can help to reduce system errors.
2. It has tighter security because only the administrator can access or alter
controls.
3. MAC has an enforced operating system that can label and delineate incoming
application data.
4. Maintenance will be difficult because only the administrator can have access
to the database.
Examples- Access level of windows for ordinary users, admins, and guests are some of
the examples of MAC.
Role Based Access Control
Role Based Access Control (RBAC), also known as Non discretionary Access
Control, takes more of a real world approach to structuring access control. Access
under RBAC is based on a user's job function within the organization to which the
computer system belongs.
Essentially, RBAC assigns permissions to particular roles in an organization. Users
are then assigned to that particular role. For example, an accountant in a company
will be assigned to the Accountant role, gaining access to all the resources permitted
for all accountants on the system. Similarly, a software engineer might be assigned
to the developer role.
Roles differ from groups in that while users may belong to multiple groups, a user
under RBAC may only be assigned a single role in an organization. Additionally,
there is no way to provide individual users additional permissions over and above
those available for their role. The accountant described above gets the same
permissions as all other accountants, nothing more and nothing less.
Differences between DAC, MAC, and RBAC in ADBMS
Feature
DAC
MAC
RBAC
Definition
User-controlled
Centrallycontrolled
Role-based
Implementation
Permissions on
objects
Security labels
Roles with
permissions
Flexibility
High
Low
Moderate
Security
Low
High
Moderate
Ease of
implementation
Easy
Difficult
Moderate
Management
complexity
Low
High
Moderate
Suitable for
Small
organizations,
collaborative
environments
High-security
environments,
sensitive data
Organizations with
defined roles and
responsibilities
Mobile database
A Mobile database is a database that can be connected to a mobile computing device
over a mobile network (or wireless network). Here the client and the server have
wireless connections. In today’s world, mobile computing is growing very rapidly, and
it is huge potential in the field of the database. It will be applicable on differentdifferent devices like android based mobile databases, iOS based mobile databases, etc.
Common examples of databases are Couch base Lite, Object Box, etc.
Features of Mobile database :



Mobile databases are physically separate from the central database server.
Mobile databases resided on mobile devices.
A mobile database is used to analyze and manipulate data on mobile devices.
Mobile Database typically involves three parties :
1. Fixed Hosts –
It performs the transactions and data management functions with the help of
database servers.
2. Mobiles Units –
These are portable computers that move around a geographical region that
includes the cellular network that these units use to communicate to base
stations.
3. Base Stations –
These are two-way radios installation in fixed locations, that pass
communication with the mobile units to and from the fixed hosts.
Temporal database
A temporal database is a database that needs some aspect of time for the organization of
information. In the temporal database, each tuple in relation is associated with time. It
stores information about the states of the real world and time. The temporal database does
store information about past states it only stores information about current states.
Whenever the state of the database changes, the information in the database gets updated.
In many fields, it is very necessary to store information about past states. For example, a
stock database must store information about past stock prizes for analysis. Historical
information can be stored manually in the schema.
There are various terminologies in the temporal database:


Valid Time: The valid time is a time in which the facts are true with respect to
the real world.
Transaction Time: The transaction time of the database is the time at which
the fact is currently present in the database.

Decision Time: Decision time in the temporal database is the time at which the
decision is made about the fact.
DBMS CHP 3
SERCH INSERT DELETE B PLUS TREE
https://www.javatpoint.com/b-plus-tree
YOUTUBE
B ND B PLUS TREE DIFFERENCE
INDEXING ND TYPES -BOOK,YT
Types of Indexes: Single Level Ordered Indexes; Multilevel Indexes;
https://www.scaler.com/topics/dbms/indexing-in-dbms/
OVERVIEW
https://www.geeksforgeeks.org/difference-between-b-tree-and-b-tree/
Download