Database Security
Database Security
and
Authorization
Elmasri/Navathe, Fundamentals of Database Systems, Fourth Edition
Copyright © 2004 Ramez Elmasri and Shamkant Navathe
Elmasri/Navathe, Fundamentals of Database Systems, Fourth Edition
Copyright © 2004 Ramez Elmasri and Shamkant Navathe
Types of Security
– Legal and ethical issues: some information is private
and cannot be accessed by unauthorized persons
1. Account creation
2. Privilege granting
3. Privilege revocation
4. Security level assignment
The database system must also keep track of all operations on the
database that are applied by a certain user throughout each login
session.
The relation (or table level): At this level, the DBA can control
the privilege to access each individual relation or view in the
database.
– Eg: So if you have a "Secret" clearance, then you can read "Secret"
and “Confidential" and “Unclassified” documents, but you can't read
"Top Secret" documents
– Eg: So again if you have a "Secret" classification level, you can write
to "Secret," "Top Secret," but you can't write to “Confidential” and
“Unclassified” documents