Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 8 Data Base Security

Similar presentations


Presentation on theme: "Chapter 8 Data Base Security"— Presentation transcript:

1 Chapter 8 Data Base Security

2 csci5233 computer security & integrity (Chap. 8)
Outline Integrity in data bases ( ) Security in data bases (8.4, 8.5) Multilevel data bases (8.6, 8.7) csci5233 computer security & integrity (Chap. 8)

3 csci5233 computer security & integrity (Chap. 8)
Data base intro. Data base Data base administrator Data base management system (DBMS) Data base server Front end Schema Records (rows) Attributes (columns) Fields (or elements, cells) Queries: retrieval, change (insert, delete, update), aggregate functions csci5233 computer security & integrity (Chap. 8)

4 Data Base Security Requirements
Physical data base Logical data base Element Auditability Access control User authentication Availability Other requirements? (fault tolerant, highly available, real-time, …) For mission-critical applications csci5233 computer security & integrity (Chap. 8)

5 csci5233 computer security & integrity (Chap. 8)
Data Base Reliability Three dimensions of data base reliability/integrity: Data base integrity Control? OS integrity controls recovery procedure (transaction management) Element integrity Data base access control Element accuracy Data base monitors for structural and state constraints csci5233 computer security & integrity (Chap. 8)

6 The 2-Phase Update Protocol
Goal: To prevent inconsistent data base states Two steps: The intent phase The update phase Example of 2-phase update: p.345 Comparison: The 2-phase commit protocol for distributed data bases csci5233 computer security & integrity (Chap. 8)

7 csci5233 computer security & integrity (Chap. 8)
Summary More information: csci5333 DBMS Next: (Data base security) csci5233 computer security & integrity (Chap. 8)


Download ppt "Chapter 8 Data Base Security"

Similar presentations


Ads by Google