Abstract

Security Issues in Relational Databases Management System

Rohit Kumar

117-140

Vol: 1, Issue: 2, 2011

Security models, developed for databases, differ in many aspects because they focus on different features of the database security problem or because they make different assumptions about what constitutes a secure database. This leads to disjointed and incomplete understanding of the organizational security strategy. This makes it difficult to reconcile different security requirements Access control mechanisms of current relational database management systems are based on discretionary policies governing the accesses of a subject to data based on the subject’s identity and authorization rules. Common administration policies include centralized administration, by which only some privileged subjects may grant and revoke authorizations, and ownership administration. Ownership-based administration is often provided with features for administration delegation, allowing the owner of a data object to assign other subjects the right to grant and revoke authorizations. More sophisticated administration mechanisms can be devised such as joint administration, by which several subjects are jointly responsible for authorization administration.

Download PDF
Back

Disclaimer: Indexing of published papers is subject to the evaluation and acceptance criteria of the respective indexing agencies. While we strive to maintain high academic and editorial standards, International Journal of Research in Science and Technology does not guarantee the indexing of any published paper. Acceptance and inclusion in indexing databases are determined by the quality, originality, and relevance of the paper, and are at the sole discretion of the indexing bodies.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.