#$% &'( ) *+)$,-./ $., (Logical DB Sec.) (2 )6 7 )8 #$% ) 9-: ;.*< 34$7 (2 6#$% -6#$;61 = '6, 9; > $A.
|
|
- Marcus Booth
- 5 years ago
- Views:
Transcription
1 #$% 1 &'( ) *+)$,-./ $., (Logical DB Sec.) (2 )6 7 )8 #$% ) 9-: ;.*< 34$7 (2 6#$% -6#$;61 = '6, 9; > ;7?.?&7:$@ $A. = #$% )B1'
2 2-&'( $6A 7 DE #$% )=: ', :'? &7:$@ (Analysis)- (Conceptual design)g+ #$% (Detailed design)h3 #$% (Implementation))= (Test) (Maintenance))'G 3 1-; DBMS#$%.'$@ K OS DBMSJ2 $ G3E ', ;7?)$,.$4 ;$= OSM, )$, &8 > LK &, DBMS &, L : 1 $= DN &, L 7 )G$ $A = DBMS OS L )G+ :? )', & -: J2 OS )',&&... ': 9$2 9&2,J2 DBMS $3)', && DBMS L 8 O, DBMS ) $:.'? A: D'? &, ', '7 #, $: TT ' $: R S PQ8 OS DBMS OS? (file)-:-ue3:? OS (view)'-u (2? DBMS
3 2-; DBMS#$% DBMS OSL 7 ) D+ & DBMS ) R ;'W )X 1# 7$' 1# ' $7 R;'W M.71, ) R ;'W DBMS XR9W $7 1# & E3: $7 )$, OSJ2 7 )? DBMS'-,( OSE3: )? )? )$, $7<, A: &, = 2 'W )G<4$.'$@ $ ; DN &, ', &4 '4 $@ 7 Z7[ \2 DBMS Y4$ 67 J26 >6 &&4'< $ execute write9read' )& DK ]8, G OSJ2.' $/ (Data Life cycle) D# &^$W LX D6# 6% 6GX = 6_+# '6, DBMS '6)', D# &^$W >.';] 5 1-DBMS 7 ) 3E :'4;', DBMS&4 7 ) 3E $7 )$, )', & Z7[ D 9 G 9 &2,:)&2,) )$, Z7[ $7 DQ# '$@ Ka ', -K R &, &, Z7[ )G $7 $74.'?-H/ 3 ', (write);7? (read)l'^ L PbU $7 ^ > )$, G $7 $74 Z7[ R &7,?* &, $7 $74:(Name-dependant)* &,&7, &7,?)7&, $7 $74 :(Data-Dependant) &, &7,... LE9L= &,&7,:(Context-Dependant)&= &,&7, (History-Dependant)&c[ &, &7, $ e7&, &7,:(Result-Dependant)&d7 &,&7,
4 2-DBMS 7 ) 3E )?=d 6K &E;# L$,4 )G?=d D$f ', DBMS.'.7< 2 'W _+# GK? &, GX g[ 7 )G.W$, ;7:$@ $A. g[ Z7[ )G.W$, Z7[ ) &, L 9? $ :(Covert Channel) LG )G14 = )K 6, =6d $6h D6Kb% LX 6 ', LE '. L$,4 &4 8 ; &,.'4 ' *(7 $h %. )'7 = +7 (Inference Control)i77 $74 M, ; >4 &, L &4 aggregation M, )$@E, PK.$4 ' = )$)G77 &, 7 3-DBMS 7 ) 3E (Poly-instantiation) 'W.D+7 7 J2, */ > = & ;'W (Auditing))$=,.'?, '+ 3 i77 $74 )$, )$=, &, j,$ DKb% back door R $..'?, $l LE DBMSk$% = $7 G (Uniformity of Mechanisms) G3E 7^E 6^$, 76, 6 6, O.$ ) $74 Z7[ ) < O^.7< )$,.$@ $/ +7 m$7< )G3E 0 4 6# $6 &, 'W$.'' $/ R8? ^ *7 4 ', 7 ) $74. n7 -,/ $h 4 :
5 1-DKb% N )& N k6$% = 6G 6 $6f:(Well-formed Transactions) Z$8 o^ ) Y4$ (Arbitrary Procedures) )7^)& )&, $: o^ )G<4$ (Authenticated Users) '? k' L$,4.? d =d L$,4 &, ', G D$f (Least Privilege)=d -/'# )$6, =6 6 M, =d &4 &Kd, L$44 )$, L$,4 )= ' )$, -N > L<4 d.'4 n$^ '7 G &, $,4 >:(Separation of duties)z_ >E+ (Continuity of Operation) DK ' (Replication)) $E *+ >4, (Reconstruction of Events)M/ )= =,.? +7 b, '? k# Z<4 ',.7? 7: before-image after-image auditing*+ >4, 9 2-DKb% N )& N 8/, L$4 >W 6 6 $( = )'G )$, M/ ) ), E$ DN &, L$4 >W *7 ; +7 r@.'?, * ;$ ; L3 ', *7 = +7 o ;$ (Delegation of Authority)$' s+.< = &4 '?, ) &, # ;K Z28 ', s+ d
6 1-System R)?=d '! &N K = /' LK &, 9IBM)DBMS;7[ = '$@ $/ _+# &4'7?LK&, ' '?, ' & )G1'' ' ;.'E ' $7 DB*7 &,&4'7*7 L$,4 L GK ::$@ $A ' $= $7 DQ# ' > = G L'^ )$,:Read ' &, G L$4 &:v)$,:insert ' > = G ]8, wl# )$,:Delete ' > )G ]8, $f )$,:Update = ' > -4 wl# )$,:Drop >6 &6,&64 update$6 '4 4 DN &, ' > &, $7 DQ#.? R ' * L System R)?=d '.'E.7< (Decentralized) '? M=DN &, )?=d $' 9'. '' '> d LE r$,4 $ LX )$6, )=dr $=d Pb4 DN &,' ' d 1' $,4 > $@.'?,&7? ' '?,'> ' ;&4 2$? $.'2K =d ]8, L$,4 $ &,&4 k# ;(LX '4 d) ' >1 >6? )'G*7 &4 G?=d &Kd&, $ $,4 &, k# > )2K,.? &:v)?=d $6 &6, =6d )2K k#l )$, grant option $ &,' )?=d > )2K.'?, $ L$,
7 3-System R)?=d ' (s, p, t, ts, g, go) :$8 'W > DN &, '7 )?=d $? 2K =d > &, &4 4 -K:s.? 2K &4 )=d k# L:p? R LX &, )?=d &4 1':t. '? d 2K -K L= LX &4 = :ts. $4 2K =d &4 K:g '?, {yes,no}$( = E &4 grant option L:go <B, select, T, 10, A, yes> <C, select, T, 20, B, no> :U.'?, g[< ', 3 &%,$ L7 9'?, update)?=d -K $@ Jv P'8,) * d revoke-k *7,&4* &-1;&, L= (.* 13 4-System R)?=d ' :,'^ $= DN &, SQL grant7 &4' +7 PUBLIC= ' user-list) &,' '4 2K -K '6^ 2K &%,$ ' )$, k# ; L$,4 &, DN ;.'? 6G -6K $ 'W$. * )$@ y=, k# '?, &7? 2K k# &4 $,4 $.$, y=, 9' '? 2K O &4 )?=d k#, '^ $= DN &, SQL revoke
8 5-System R)?=d ' revoke-k 3E (Recursive) DN &, y=, -K System R.' d (Cascading))<,X 06$ ;6&6, x$,4 &, y$,4 = t)$, p)$@ y =, xo '? 2K t)$, p)g?=d &4? Z$8. '< 2K 3@$ y&,. ;, = ', 2K ; $z )'8, 'b U 15 6-System R)?=d ' A 10 B 30 D 40 E 70 G 20 C B has granted a privilege to D, who has passed it to E, who has passed it to G F 10 B A D B revokes D s privilege C F 16 8
9 7-System R)?=d ' & ')$, ' ]8, &4' L$,4 &, LE ;System R.' Z$8 ' $.'?.7&,&7,)?=d.7< )$, 4 o > ; :U )$, '6', G &, $7 =d G A$,4 &,'^ = B' B$,4 salary>1000&4 2K A&, )?=d' LX )$, =, LX )$,' > ' DN ; ' ' 17 8-System R)?=d ' ' & ' ) {(# L &( 6 ;6E '6 >61 96W (View Semantics)' )8 &4 ; &, &7,.'?, &7? & ' &,. )$' )=d 6 & ' )$, k# ; X &4 ; &, Pb4 ' > )$, k# > ;7?. 7, & =6d ;6 9'6?, &7? grant option, )=d& ' )$, $,4 $@.?'^grant option, * &%,$')$,. ' Z$8 L= w$8 (Time Stamp) = 0W$,.$@ Z$8 &%,$ = 0W$, L= ' >1 {(#
10 9-System R)?=d ' 1-' )= &6, &62, ' &, $7 )$, L$,4 &, j,$ )?=d DKb%.? $^ SYSCOLAUTH SYSAUTH) : $= D+N SYSAUTH '?, )?=d&4)$,4:userid.? d LX )$, )?=d &4 1':Tname ('=V& '=R).'4 g[< Tname ' R:Type. $4 2K k# userid&, &4)$,4:Grantor ( 0~$: Y '() '? $,4 &, read=d &4 = ''<:Read ( 0~$: Y '() '? $,4 &, insert=d &4 = ''<:Insert ( 0~$: Y '() '? $,4 &, delete=d &4 = ''<:Delete '? L7 LX $,4 &, update=d &4 G7 ''<:Update $^ grant option, '? =d X &4 LX ''<:Grantopt System R)?=d ' 2-' )= L76-6 > SYSAUTH' &4 = = SYSCOLAUTH '.< $_ G ' ; DN ;.'?, 'X some&4 Update : $= D+N SYSCOLAUTH '?, update)?=d &4)$,4:UserId. '? Z$8 LX )$,update k# &4 1' ''<:Table. '? Z$8 LX )$,update k# &4 7 :Column. $4 2K k# ;&4)$,4 :Grantor $^ '? grant option, =d ; X &E ''<:Grantopt
11 12-System R)?=d ' ' $, L$ $, O 1993 non-cascadable revoke cascadable revoke )'8,'b non-cascadable revoke = )& ;7? System R)?=d ' A 10 B 30 D 40 E 70 G 20 C F B has granted a privilege to D, who has passed it to E, who has passed it to G A 10 B C D E F G B revokes D s privilege 22 11
12 ; ) )8 N )G@ :'E 4 N 1#, ' SDBMS System-High.? ;E 7 J2 ;$Q, L$,4 &, o ; E6?X 7 &,&4 $ L.G > )= E?X.'? 1# ; Q, 7 > &3 4 ^$, &7.1, '^ $l LE )DBMS= +7 Multilevel -66,/ $66h 66 (Trusted) 667K 66 )66DBMS = $, (Untrusted)7K Trusted Subject Arch. 7K OS DBMS> = +7,» Woods Hole Arch. :v 7K )$7:, 7K -,/ $h DBMS> = +7 Replicated 9kernelized 9Integrity Lock: R & $,»» 23 ; ) )8 R Architecture Research prototype Commercial DBMS Integrity Lock Mitre TRUDATA Kernelized SeaView Oracle Replicated NRL Trusted Subject A1 Secure DBMS Sybase Informix Ingres Oracle DEC 24 12
13 Trusted Subject Arch )$6, L $/ O )$, 7K -,/ $h )front-end=) &Kd (high low) D+7 7 \2 -E6< (Trusted Computer Base) TCB> TOS TDBMS.' 2 'W)? = _+# DBMS {+ ; J2 $, Q, J2.' J2 )G.W$,)$@E,, -# ; = Sybase 25 High user 2-Trusted Subject Arch low user Untrusted Front end Untrusted Front end Trusted DBMS Trusted OS Database (DBMS & NON-DBMS DATA) 26 13
14 1-Woods Hole Archs 7K -,/ $h )front-end = )&Kd & K O > &Kd ; = y.= LX L d DA -K &62, 7K -,/ $h back-end >, y $_ ; Woods Hole Archs High user low user Untrusted Front end Untrusted Front end Trusted front end (reference monitor) UnTrusted DBMS Database 28 14
15 1- Integrity Lock Arch 6?=$ y Y K &4-7 (Untrusted Front-end) UFE> &,.'' d $ )$, 67K -,/ $h DBMS UFEL &4 3 (Trusted Front-end) TFE>.'4 -K (Trusted Filter)7K $7: > LK &,&Q;. $/ 67 06W$, &, j,$ DKb% &4? > )$, ƒ[ ': > stamp. & 9'?3 $: > 1$74 ) $.'E '1 TFE&, stamp.'?, i77 % ; =d $h DKb% < N -E< projection selection= +7 K &, DBMS & UFE TFE -H;-# 29 High user low user Untrusted Front end Untrusted Front end Trusted Filter Cryptographic Unit Append Check Stamp Stamp Query Store Response UnTrusted DBMS Database 30 15
16 Kernelized Arch. 6 $7 6 &64 $6@ 6 $6/ +7 7K OS> ). $7 $74 Ka DB E3: 67K 6 OS '? $^ &,< 7 )G.W$,) DB)?.'?, 6 -'6. 26 > ) $7 &, 2 'W $7 d.'4 31 High user Kernelized Arch. low user Trusted front end Trusted front end High DBMS Low DBMS Trusted OS Database (High & Low) data 32 16
17 Replicated Arch. )8 ; '< )= L4 8/ O )'8, 'b -E? 33 High user low user Trusted front end Trusted front end High DBMS Low DBMS Database (High & Low) data Database (Low data) 34 17
18 $E<,
Multilevel relations: Schema and multiple instances based on each access class. A multilevel relation consists of two parts:
The Jajodia & Sandhu model Jajodia & Sandhu (1991), a model for the application of mandatory policies in relational database systems. Based on the sec classifications introduced in BLP. It extends the
More informationTrusted DBMS Architecture. Trusted DBMS Architecture featuring Trusted OS
Trusted DBMS Architecture featuring Trusted OS KIM, Hyung Chan Security Research Group, New Wave Computing Lab. Dept. of Information and Communications, Gwangju Institue of Science and Technology (GIST)
More informationDiscretionary Vs. Mandatory
Discretionary Vs. Mandatory Discretionary access controls (DAC) Privilege propagated from one subject to another Possession of an access right is sufficient to access the object Mandatory access controls
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 12: Database Security Department of Computer Science and Engineering University at Buffalo 1 Review of Access Control Types We previously studied four types
More informationDatabase Security Overview. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Database Security Overview Murat Kantarcioglu Topics The access control model of System R Extensions to the System R model Views and content-based
More informationFOREWARD. Keith F. Brewster May 1996 Acting Chief, Partnerships and Processes
NCSC TECHNICAL REPORT - 005 Volume 5/5 Library No. S-243,039 FOREWARD This report is the fifth of five companion documents to the Trusted Database Management System interpretation of the Trusted Computer
More informationActen (Action Entity) Model
Acten (Action Entity) Model Proposed by Bussolati et al 1983 As an extension to the TG model Further administrative privileges Predicates on authorization Two separate graphs Access Authorizations Administrative
More informationCS419 Spring Computer Security. Vinod Ganapathy Lecture 15. Chapter 5: Database security
CS419 Spring 2010 Computer Security Vinod Ganapathy Lecture 15 Chapter 5: Database security Database Security Relational Databases constructed from tables of data each column holds a particular type of
More informationAccess Control. Access control: ensures that all direct accesses to object are authorized a scheme for mapping users to allowed actions
Access Control 1 Access Control Access control: ensures that all direct accesses to object are authorized a scheme for mapping users to allowed actions Protection objects: system resources for which protection
More informationCHAPTER 5 SECURITY ADVANCED DATABASE SYSTEMS. Assist. Prof. Dr. Volkan TUNALI
CHAPTER 5 SECURITY ADVANCED DATABASE SYSTEMS Assist. Prof. Dr. Volkan TUNALI Topics 2 Introduction Discretionary Access Control Mandatory Access Control Statistical Databases Data Encryption SQL Facilities
More informationAccess Control. Protects against accidental and malicious threats by
Access Control 1 Access Control Access control: ensures that all direct accesses to object are authorized a scheme for mapping users to allowed actions Protection objects: system resources for which protection
More informationDatabase Security. Professor Sushil Jajodia George Mason University
Database Security Professor Sushil Jajodia Geore Mason University 703-993-1640 jajodia@mu.edu http://isse.mu.edu/~csis/faculty/jajodia.html 4-03 2 Discretionary Access Controls Users can protect what they
More informationDatabase Security Lecture 10
Database Security Lecture 10 Database security Grant-Revoke Model Elisa Bertino bertino@cs.purdue.edu Access Control in Commercial DBMSs Most commercial systems adopt DAC Current discretionary authorization
More informationDatabase Security. Authentification: verifying the id of a user. Authorization: checking the access privileges
Database Security Security Tasks Authentification: verifying the id of a user Authorization: checking the access privileges Auditing: looking for violations (in the past) 1 Data Security Dorothy Denning,
More informationSupported Operating Environment. Framework
Supported Operating Environment Framework 6/15/2018 Contents 1 Framework 1.1 General Information - Framework 1.2 Supported Operating Systems 1.3 Supported Browsers 1.4 Supported Database/DB Clusters 1.5
More informationWindows 8 BIOS Boot settings
DE114 Windows 8 BIOS Boot settings The Windows 8 BIOS boot settings allow you to configure the new items of boot options for systems running in Windows 8 operating system. UEFI BIOS Utility - Advanced
More informationIT Service Delivery and Support Week Three. IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao
IT Service Delivery and Support Week Three IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao 1 Infrastructure Essentials Computer Hardware Operating Systems (OS) & System Software Applications
More informationDepartment of Computer Information Systems KEMU
Advanced DBMS: CISY 423 Department f Cmputer Infrmatin Systems KEMU Database Security OBJECTIVES Database Security and Authrizatin Database Users Creating Users/Accunts in cmmercial DBMS Discretinary Access
More informationAn Extended Authorization Model for Relational Databases
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 9, NO. 1, JANUARY-FEBRUARY 1997 85 An Extended Authorization Model for Relational Databases Elisa Bertino, Member, IEEE, Pierangela Samarati, and
More informationSynchronization mechanisms between SAP BW and SAP HANA authorizations
Synchronization mechanisms between SAP BW and SAP HANA authorizations April 25 th, 2017 Christophe Decamps What we will cover Introduction SAP Security and HANA Authorizations Scenarios SAP HANA Security:
More informationComputer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 5 Database Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Database Security 2 Relational Databases constructed
More informationIntroduction p. 1 The purpose and fundamentals of access control p. 2 Authorization versus authentication p. 3 Users, subjects, objects, operations,
Preface p. xv Acknowledgments p. xvii Introduction p. 1 The purpose and fundamentals of access control p. 2 Authorization versus authentication p. 3 Users, subjects, objects, operations, and permissions
More informationChapter 9: Database Security: An Introduction. Nguyen Thi Ai Thao
Chapter 9: Database Security: An Introduction Nguyen Thi Ai Thao thaonguyen@cse.hcmut.edu.vn Spring- 2016 Outline Introduction to Database Security Issues Types of Security Threats to databases Database
More informationCS 146 Database Systems
DBMS CS 146 Database Systems Entity-Relationship (ER) Model CS 146 1 CS 146 2 A little history Progression of Database Systems In DBMS: single instance of data maintained and accessed by different users
More informationCarnegie Mellon Univ. Dept. of Computer Science Database Applications. General Overview - rel. model. Overview - detailed - SQL
Faloutsos 15-415 Carnegie Mellon Univ. Dept. of Computer Science 15-415 - Database Applications C. Faloutsos Lecture#7 (cont d): Rel. model - SQL part3 General Overview - rel. model Formal query languages
More informationDistributed Key Management and Cryptographic Agility. Tolga Acar 24 Feb. 2011
Distributed Key Management and Cryptographic Agility Tolga Acar 24 Feb. 2011 1 Overview Distributed Key Lifecycle Problem statement and status quo Distributed Key Manager Typical application scenario and
More informationRajiv GandhiCollegeof Engineering& Technology, Kirumampakkam.Page 1 of 10
Rajiv GandhiCollegeof Engineering& Technology, Kirumampakkam.Page 1 of 10 RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY, KIRUMAMPAKKAM-607 402 DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING QUESTION BANK
More informationCore Role Based Access Control (RBAC) mechanism for MySQL
Core Role Based Access Control (RBAC) mechanism for MySQL by Ian Molloy Radu Dondera Umang Sharan CS541 Project Report Under the Guidance of Prof. Elisa Bertino With the Department of Computer Science
More informationChapter 5: Database Security
i Chapter 5: Comp Sci 3600 Outline i 1 2 i 3 4 5 Outline i 1 2 i 3 4 5 What is a i Structured collection of data stored for use by one or more applications Contains the relationships between data items
More informationAcknowledgments Introduction to Database Systems p. 1 Objectives p. 1 Functions of a Database p. 1 Database Management System p.
Preface p. xvii Acknowledgments p. xxv Introduction to Database Systems p. 1 Objectives p. 1 Functions of a Database p. 1 Database Management System p. 2 Database Components p. 8 Database Development Process
More information1. Data Model, Categories, Schemas and Instances. Outline
Chapter 2: Database System Concepts and Architecture Outline Ramez Elmasri, Shamkant B. Navathe(2016) Fundamentals of Database Systems (7th Edition),pearson, isbn 10: 0-13-397077-9;isbn-13:978-0-13-397077-7.
More informationACS-3921/ Computer Security And Privacy. Chapter 5 Database and Data Centre Security
ACS-3921/4921-001 Computer Security And Privacy Chapter 5 Database and Data Centre Security ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been adopted
More informationRelational Database Systems Part 01. Karine Reis Ferreira
Relational Database Systems Part 01 Karine Reis Ferreira karine@dpi.inpe.br Aula da disciplina Computação Aplicada I (CAP 241) 2016 Database System Database: is a collection of related data. represents
More informationChapter 1 SQL and Data
Chapter 1 SQL and Data What is SQL? Structured Query Language An industry-standard language used to access & manipulate data stored in a relational database E. F. Codd, 1970 s IBM 2 What is Oracle? A relational
More informationCopyright 2004 Pearson Education, Inc.
Chapter 2 Database System Concepts and Architecture Data Models Data Model: A set of concepts to describe the structure of a database, and certain constraints that the database should obey. Data Model
More informationCO MySQL for Database Administrators
CO-61762 MySQL for Database Administrators Summary Duration 5 Days Audience Administrators, Database Designers, Developers Level Professional Technology Oracle MySQL 5.5 Delivery Method Instructor-led
More informationDistributed Systems. Fall 2017 Exam 3 Review. Paul Krzyzanowski. Rutgers University. Fall 2017
Distributed Systems Fall 2017 Exam 3 Review Paul Krzyzanowski Rutgers University Fall 2017 December 11, 2017 CS 417 2017 Paul Krzyzanowski 1 Question 1 The core task of the user s map function within a
More informationChapter 1 Introduction
Chapter 1 Introduction Contents The History of Database System Overview of a Database Management System (DBMS) Three aspects of database-system studies the state of the art Introduction to Database Systems
More information02 Hr/week. Theory Marks. Internal assessment. Avg. of 2 Tests
Course Code Course Name Teaching Scheme Credits Assigned Theory Practical Tutorial Theory Practical/Oral Tutorial Total TEITC504 Database Management Systems 04 Hr/week 02 Hr/week --- 04 01 --- 05 Examination
More informationSecurity and Authorization
Security and Authorization Sub-sets of SQL Data retrieval: SELECT Data Manipulation Language (DML): INSERT, UPDATE, DELETE Data Definition Language (DDL): CREATE, ALTER, DROP, RENAME Transaction control:
More informationIntroduction to Databases CS348
Introduction to Databases CS348 University of Waterloo Winter 2007 University of Waterloo () Introduction to Databases 1 / 20 Course Outline Why do we use Databases? How do we use a DBMS? Functionality
More informationDifference Between Oracle Database Instance Vs
Difference Between Oracle Database Instance Vs Schema But at a high level, executables and memory make a database instance. A key Oracle difference is that everything gets logged, even the undo information.
More informationRequest for Comments: 2536 Category: Standards Track March DSA KEYs and SIGs in the Domain Name System (DNS)
Network Working Group D. EastLake Request for Comments: 2536 IBM Category: Standards Track March 1999 Status of this Memo DSA KEYs and SIGs in the Domain Name System (DNS) This document specifies an Internet
More informationStore and Manage Data in a DBMS With ArcView Database Access. Presented By: Andrew Arana & Canserina Kurnia
Store and Manage Data in a DBMS With ArcView Database Access Presented By: Andrew Arana & Canserina Kurnia Overview Topics to be Covered: General method for accessing data database themes, database tables
More informationCS 252: Fundamentals of Relational Databases: SQL5
CS 252: Fundamentals of Relational Databases: SQL5 Dr. Alexandra I. Cristea http://www.dcs.warwick.ac.uk/~acristea/ Careful study of these notes is best left until most of the lectures on CS252 have been
More information[19] P. P. Chen. The Entity-Relationship Model - Towards a unified view of data. ACM Trans. Database Systems (ToDS), Vol. 1, No.
[19] P. P. Chen. The Entity-Relationship Model - Towards a unified view of data. ACM Trans. Database Systems (ToDS), Vol. 1, No. 1 (March 1976), 9-36. [20] J. Biskup, H. H. Brüggemann. Das datenschutzorientierte
More informationPolicy-based WRT Security Access to device APIs
Policy-based WRT Security Access to device APIs 1 Problem space Allow access to device services from Web content executing in WRT Incrementally increasing requirements: Installed widgets Arbitrary web
More informationAuthorization, Database Security
Authorization, Database Security FCDB 10.1 Dr. Chris Mayfield Department of Computer Science James Madison University Mar 26, 2018 Database security 101 Access control, users/groups Views (for limiting
More informationMULTILEVEL POLICY BASED SECURITY IN DISTRIBUTED DATABASE
MULTILEVEL POLICY BASED SECURITY IN DISTRIBUTED DATABASE CHAPTER 8 Addressing security demands under fixed budgets and deadline constraints are becoming extremely challenging, time consuming and resource
More informationNetworks and security Data bases
Networks and security Data bases Networks Concepts Threats Controls Firewalls Protocols A protocol abstracts the communication to a higher level. A layered architecture, a so called protocol stack is used:
More information1. a) Discuss primitive recursive functions with an example? 15M Or b) Statements and applications of Euler s and Fermat s Theorems?
MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 1. a) Discuss primitive recursive functions with an example? 15M b) Statements and applications of Euler s and Fermat s Theorems? 15M 2. a) Define DFA and NFA
More informationDatabase Management System (15ECSC208) UNIT I: Chapter 2: Relational Data Model and Relational Algebra
Database Management System (15ECSC208) UNIT I: Chapter 2: Relational Data Model and Relational Algebra Relational Data Model and Relational Constraints Part 1 A simplified diagram to illustrate the main
More informationDatabase Management Systems Triggers
Database Management Systems Triggers 1 Triggers Active Database Systems Oracle Triggers DB2 Triggers Differences between Oracle and DB2 Trigger Design 2 Database Management Systems Active Database Systems
More informationSample Question Paper
Sample Question Paper Marks : 70 Time:3 Hour Q.1) Attempt any FIVE of the following. a) List any four applications of DBMS. b) State the four database users. c) Define normalization. Enlist its type. d)
More informationData Modeling using ER Model
Data Modeling using ER Model Database design process - requirements collection and analysis: database requirements and functional requirements - conceptual DB design using a high-level model: easier to
More informationThe Relational Model. Outline. Why Study the Relational Model? Faloutsos SCS object-relational model
The Relational Model CMU SCS 15-415 C. Faloutsos Lecture #3 R & G, Chap. 3 Outline Introduction Integrity constraints (IC) Enforcing IC Querying Relational Data ER to tables Intro to Views Destroying/altering
More informationDistributed Transaction Management
Distributed Transaction Management Material from: Principles of Distributed Database Systems Özsu, M. Tamer, Valduriez, Patrick, 3rd ed. 2011 + Presented by C. Roncancio Distributed DBMS M. T. Özsu & P.
More informationIntegrity Policies. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Integrity Policies Murat Kantarcioglu Requirements of Policies for Commercial Applications [Lipner 1982] 1. Users will not write their own
More informationDISTRIBUTED DATABASES
DISTRIBUTED DATABASES INTRODUCTION: Database technology has taken us from a paradigm of data processing in which each application defined and maintained its own data, i.e. one in which data is defined
More informationHow To Drop All Tables In A Schema In Oracle 10g
How To Drop All Tables In A Schema In Oracle 10g Imports/exports all schema object types If you run Oracle Application Express with Oracle Database 10g release 1 (10.1) or later, you can generate When
More informationInstructor: Jinze Liu. Fall 2008
Instructor: Jinze Liu Fall 2008 http://www.securityfocus.com/news/11455 Jinze Liu @ University of Kentucky 9/22/2008 2 Source: http://www.gocsi.com/ Database Security - Farkas 3 Almost all corporate/organizational
More informationGeneral Overview - rel. model. Carnegie Mellon Univ. Dept. of Computer Science Database Applications. Reminder: our Mini-U db
Faloutsos 15-415 Carnegie Mellon Univ. Dept. of Computer Science 15-415 - Database Applications Lecture#8 (cont d): SQL, Part 2 General Overview - rel. model Formal query languages rel algebra and calculi
More informationITS. MySQL for Database Administrators (40 Hours) (Exam code 1z0-883) (OCP My SQL DBA)
MySQL for Database Administrators (40 Hours) (Exam code 1z0-883) (OCP My SQL DBA) Prerequisites Have some experience with relational databases and SQL What will you learn? The MySQL for Database Administrators
More informationCOSC 304 Introduction to Database Systems. Views and Security. Dr. Ramon Lawrence University of British Columbia Okanagan
COSC 304 Introduction to Database Systems Views and Security Dr. Ramon Lawrence University of British Columbia Okanagan ramon.lawrence@ubc.ca Views A view is a named query that is defined in the database.
More informationThe TimeIQ Program. Presented by. Howard Bomze FAME Information Services, Inc.
The TimeIQ Program Presented by Howard Bomze FAME Information Services, Inc. Challenge Evolve FAME s technology while protecting our customers investment in current development projects and operational
More informationTopics in Systems and Program Security
Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Topics in Systems and
More informationMySQL for Database Administrators Ed 3.1
Oracle University Contact Us: 1.800.529.0165 MySQL for Database Administrators Ed 3.1 Duration: 5 Days What you will learn The MySQL for Database Administrators training is designed for DBAs and other
More informationCourse Outline Faculty of Computing and Information Technology
Course Outline Faculty of Computing and Information Technology Title Code Instructor Name Credit Hours Prerequisite Prerequisite Skill/Knowledge/Understanding Category Course Goals Statement of Course
More informationB.C.A DATA BASE MANAGEMENT SYSTEM MODULE SPECIFICATION SHEET. Course Outline
B.C.A 2017-18 DATA BASE MANAGEMENT SYSTEM Course Outline MODULE SPECIFICATION SHEET This course introduces the fundamental concepts necessary for designing, using and implementing database systems and
More informationA Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System
A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System Myong H Kang a, Oliver Costich b, and Judith N Froscher a a Center for Secure Information Technology,
More informationOverview of Data Management
Overview of Data Management Grant Weddell Cheriton School of Computer Science University of Waterloo CS 348 Introduction to Database Management Spring 2016 CS 348 (Intro to DB Mgmt) Overview of Data Management
More informationAccess Control. Dr George Danezis
Access Control Dr George Danezis (g.danezis@ucl.ac.uk) Resources Key paper: Carl E. Landwehr: Formal Models for Computer Security. ACM Comput. Surv. 13(3): 247-278 (1981) See references to other optional
More informationBIS Database Management Systems.
BIS 512 - Database Management Systems http://www.mis.boun.edu.tr/durahim/ Ahmet Onur Durahim Learning Objectives Database systems concepts Designing and implementing a database application Life of a Query
More informationMIS Database Systems.
MIS 335 - Database Systems http://www.mis.boun.edu.tr/durahim/ Ahmet Onur Durahim Learning Objectives Database systems concepts Designing and implementing a database application Life of a Query in a Database
More informationPolicy vs. Mechanism. Example Reference Monitors. Reference Monitors. CSE 380 Computer Operating Systems
Policy vs. Mechanism CSE 380 Computer Operating Systems Instructor: Insup Lee and Dianna Xu University of Pennsylvania Fall 2003 Lecture Note: Protection Mechanisms q Access control policy is a specification
More informationMobile and Heterogeneous databases Security. A.R. Hurson Computer Science Missouri Science & Technology
Mobile and Heterogeneous databases Security A.R. Hurson Computer Science Missouri Science & Technology 1 Note, this unit will be covered in two lectures. In case you finish it earlier, then you have the
More informationFundamentals of. Database Systems. Shamkant B. Navathe. College of Computing Georgia Institute of Technology PEARSON.
Fundamentals of Database Systems 5th Edition Ramez Elmasri Department of Computer Science and Engineering The University of Texas at Arlington Shamkant B. Navathe College of Computing Georgia Institute
More informationAdvanced Systems Security: Principles
Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:
More informationOracle Audit Vault. Trust-but-Verify for Enterprise Databases. Tammy Bednar Sr. Principal Product Manager Oracle Database Security
Oracle Audit Vault Trust-but-Verify for Enterprise Databases Tammy Bednar Sr. Principal Product Manager Oracle Database Security Agenda Business Drivers Audit Vault Overview Audit
More informationThe Relational Model. Chapter 3. Comp 521 Files and Databases Fall
The Relational Model Chapter 3 Comp 521 Files and Databases Fall 2012 1 Why Study the Relational Model? Most widely used model by industry. IBM, Informix, Microsoft, Oracle, Sybase, etc. It is simple,
More informationCopyright 2007 Ramez Elmasri and Shamkant B. Navathe Slide 25-1
Copyright 2007 Ramez Elmasri and Shamkant B. Navathe Slide 25-1 Chapter 25 Distributed Databases and Client-Server Architectures Copyright 2007 Ramez Elmasri and Shamkant B. Navathe Chapter 25 Outline
More informationData sharing and transformation in real time. Stephan Leisse Solution Architect
Data sharing and transformation in real time Stephan Leisse Solution Architect stephan.leisse@visionsolutions.com Today s Businesses Have Multiple Databases Source: Vision Solutions 2017 State of Resilience
More informationOracle Database 11g for Experienced 9i Database Administrators
Oracle Database 11g for Experienced 9i Database Administrators 5 days Oracle Database 11g for Experienced 9i Database Administrators Course Overview The course will give experienced Oracle 9i database
More informationDrug-drug interactions database created by thousands of doctors in hundreds of hospitals.
Basics Data warehouse is an integrated repository derived from multiple distributed source databases. Created by replicating or transforming source data to new representation. Some data can be web-database
More informationRapid Application Development
Rapid Application Development Chapter 6: Development Database Application Tools: Microsoft Access Cr: fisher.osu.edu Dr.Orawit Thinnukool College of Arts, Media and Technology, Chiang Mai University Contents
More informationIntroduction to ArcSDE 8. John Calkins
Introduction to ArcSDE 8 John Calkins Why are you here? Introduction to ArcSDE? What is a GeoDatabase? Existing SDE user? Existing ArcInfo user? Technical details on implementation? Just confused... ArcSDE
More informationData about data is database Select correct option: True False Partially True None of the Above
Within a table, each primary key value. is a minimal super key is always the first field in each table must be numeric must be unique Foreign Key is A field in a table that matches a key field in another
More informationOfficial Statistics - Relational Database Management Systems. Official Statistics - Relational Database Management Systems
Chapter 1 Database fundamentals 1.1. What is a database? A database is a stored collection of data designed for efficient information retrieval, efficient data maintenance and centralised control of an
More informationCSE 380 Computer Operating Systems
CSE 380 Computer Operating Systems Instructor: Insup Lee and Dianna Xu University of Pennsylvania Fall 2003 Lecture Note: Protection Mechanisms 1 Policy vs. Mechanism q Access control policy is a specification
More informationDistributed File Systems II
Distributed File Systems II To do q Very-large scale: Google FS, Hadoop FS, BigTable q Next time: Naming things GFS A radically new environment NFS, etc. Independence Small Scale Variety of workloads Cooperation
More information(Towards) a Threshold Cryptographic Backend for DNSSEC
(Towards) a Threshold Cryptographic Backend for DNSSEC OARC 2011 Antonio Cansado acansado@niclabs.cl Pablo Sepúlveda psepulv@niclabs.cl Tomás Barros tbarros@niclabs.cl Victor Ramiro vramiro@niclabs.cl
More informationWhite Paper. Export of Fabasoft Folio Objects to a Relational Database. Fabasoft Folio 2017 R1 Update Rollup 1
White Paper Export of Fabasoft Folio Objects to a Relational Database Fabasoft Folio 2017 R1 Update Rollup 1 Copyright Fabasoft R&D GmbH, Linz, Austria, 2018. All rights reserved. All hardware and software
More informationHyperion System 9 BI+ Analytic Services
Hyperion System 9 BI+ Analytic The Hyperion System 9 BI+ Analytic release 9.3 Support Matrix includes support information for the following areas: Operating Systems o Server o Client Web / Application
More informationSystems:;-'./'--'.; r. Ramez Elmasri Department of Computer Science and Engineering The University of Texas at Arlington
Data base 7\,T"] Systems:;-'./'--'.; r Modelsj Languages, Design, and Application Programming Ramez Elmasri Department of Computer Science and Engineering The University of Texas at Arlington Shamkant
More informationDATABASE SECURITY AND PRIVACY. Some slides were taken from Database Access Control Tutorial, Lars Olson, UIUC CS463, Computer Security
DATABASE SECURITY AND PRIVACY Some slides were taken from 463.5.1 Database Access Control Tutorial, Lars Olson, UIUC CS463, Computer Security Database Security Protect Sensitive Data from Unauthorized
More informationTechno India Batanagar Computer Science and Engineering. Model Questions. Subject Name: Database Management System Subject Code: CS 601
Techno India Batanagar Computer Science and Engineering Model Questions Subject Name: Database Management System Subject Code: CS 601 Multiple Choice Type Questions 1. Data structure or the data stored
More informationDatabase Technology Introduction. Heiko Paulheim
Database Technology Introduction Outline The Need for Databases Data Models Relational Databases Database Design Storage Manager Query Processing Transaction Manager Introduction to the Relational Model
More informationMySQL Security, Privileges & User Management Kenny Gryp Percona Live Washington DC /
MySQL Security, Privileges & User Management Kenny Gryp Percona Live Washington DC / 2012-01-11 Security, Privileges & User Management Privilege System User Management Pluggable
More informationMicrosoft - Configuring Windows Server 2008 Active Directory Domain Services (M6425)
Microsoft - Configuring Windows Server 2008 Active Directory Domain Services (M6425) Code: 6123 Lengt h: URL: 5 days View Online In this comprehensive course you will not only discuss the crucial concepts
More information]a a. ] v. A. Silberschatz, H. Korth and S. Sudarshan, Database System Concepts (3rd Edition), The McGraw Hill Company, 1997.
]a a î íf= áõâfé ] v = A. Silberschatz, H. Korth and S. Sudarshan, Database System Concepts (3rd Edition), The McGraw Hill Company, 1997. C. Batini, S.Ceri, and S. Navathe, Conceptual Database Design -
More information