Create a matrix to indicate the permissions (read, insert, delete, modify) you would grant to diffe

Aug 15th, 2016
Studypool Tutor
ASA Institute of Business and Computer Technology
Price: $15 USD

Tutor description

Create a matrix to indicate the permissions (read, insert, delete, modify) you would grant to different users of your database. Create at least two different users and implement their permissions using SQL statements. Submit the following deliverables to your instructor: The steps you took to password protect the database The matrix The SQL code for creating the users and implementing their permissions

Word Count: 2998
Showing Page: 1/8
Answer-----------1. Introduction------------------------Conceptual database design is a major database design technique nowadays. Entity relationshipmodel (ER), which was introduced in the 70's, and its improve dimple mentation, "Enhanced entityrelationship model (EER), together with their descendants may play an important role in the processof the database design" [1].The above mentioned two models which have two great advantages.First we provide adbms-independent representation of them odeled world. This means that in theearly stages of the design process the designer should not deal with the actual database type,therefore the resulting model can serve as the basis for several different implementations.Specification of the project which may reach the implementation through building the conceptualmodel. In our approach we illustrate this access design method from high-level to theimplementation. First we have to define the user groups and their roles. In connection with theconceptual model (Enhanced Entity relationship model) we recommend the use of an improvedmodel, which already includes the privileges of the users, too. These permissions can be representedin a conceptual access matrix model. At this level the privileges of the users are still DBMSindependent, then by mapping, it reaches the low-level database model (relational model), whichcan be accompanied with the access matrix model. This is the point where access permissions become connected to DBMS-spe

Review from student

Studypool Student
" The best tutor out there!!!! "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1830 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors