Create a matrix to indicate the permissions (read, insert, delete, modify) you would grant to diffe

Aug 15th, 2016
Studypool Tutor
ASA Institute of Business and Computer Technology
Price: $15 USD

Tutor description

Create a matrix to indicate the permissions (read, insert, delete, modify) you would grant to different users of your database. Create at least two different users and implement their permissions using SQL statements. Submit the following deliverables to your instructor: The steps you took to password protect the database The matrix The SQL code for creating the users and implementing their permissions

Word Count: 2998
Showing Page: 1/8
Answer-----------1. Introduction------------------------Conceptual database design is a major database design technique nowadays. Entity relationshipmodel (ER), which was introduced in the 70's, and its improve dimple mentation, "Enhanced entityrelationship model (EER), together with their descendants may play an important role in the processof the database design" [1].The above mentioned two models which have two great advantages.First we provide adbms-independent representation of them odeled world. This means that in theearly stages of the design process the designer should not deal with the actual database type,therefore the resulting model can serve as the basis for several different implementations.Specification of the project which may reach the implementation through building the conceptualmodel. In our approach we illustrate this access design method from high-level to theimplementation. First we have to define the user groups and their roles. In connection with theconceptual model (Enhanced Entity relationship model) we recommend the use of an improvedmodel, which already includes the privileges of the users, too. These permissions can be representedin a conceptual access matrix model. At this level the privileges of the users are still DBMSindependent, then by mapping, it reaches the low-level database model (relational model), whichcan be accompanied with the access matrix model. This is the point where access permissions become connected to DBMS-spe

Review from student

Studypool Student
" 10/10 would recommend. Responsive and helpful. "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1820 tutors are online

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors