Professional Documents
Culture Documents
Integrity constraints
G.S.Gupta, PCMS
The constraints means the rule and regulation for the data. Such as an entity contains three
attribute (rollno, name, dob) and constraints for the rollno is rollno>10 . it means if any
user feed the rollno <10 then is will not be inserted in to the data.
The major types of integrity constraints are domain constraints, entity integrity, and
referential integrity and action assertions.
Domain constraints
All of the values that appear in a column of a relation must be taken from the same
domain. A domain is the set of values that may be assigned to an assigned . A domain
definition usually conists of the components such as domain name, meaning, data type and
size and allowable values or range.
Attribute
Customer_id
Domain name
Customer_ids
Customer_name
Customer_name
Customer_city
Customer_city
Description
Set
of
all
customers id
Set of all customer
name
Set of all cities
Domain
Character size 8
Character size 25
Charter size 20
Customer_name
Order_date
Order line
Order_id Product id
product
Product_id
Address
City
State
Zip
Customer_id
Company
Product_description
Product_finisth
Standard_price
On_hand
Action Assertions
It is a statement of a constraints or control on the action of the organization. An action
assertion is the property of some business rule and states under what condition a particular
action can be performed on which business rule.( A business rule can be as simple as the
definition of an entity type, relationship or attribute)
Page :1
G.S.Gupta, PCMS
database system
some database system users may be authorized to access only a limited portion
of the database. Other users may be allowed to issue queries, ;but may be
forbidden to modify data. It is the responsibility of the database system to ensure
that these authorization restriction are not violated.
2.
Operating system
No matter how secure the database system is , weakness in operating sytem
security may serve as a means of unauthorized access of the dataase
3.
network
Since all most all database system allow remote access through terminals or
networks , software level security within the network software is as important as
physical security , both on the internet and private networks.
4.
Physical
Sites with computer system must be physically secured against arms or
surreptitious entry by intruders.
5.
Human
Users must be authorized carefully to reduce the chance of any user giving access
to an intruder in exchange for a bribe or other favors.
Security at all these levels must be maintaind if database security is to be ensured. A
weakness at low level security allows circumvention of strict high level security measures.
Access control
In addition to handling such concern any organization need to address five areas regard to
achieving high data quality.
1.
2.
Personnel control
Monitoring to ensure that the personnel are following established practices ,
taking regular vacation , working with other employees , and so forth should be
followed. Employee should be trained in those aspects of security and quality that
Page :2
4.
5.
G.S.Gupta, PCMS
are relevant to their jobs and be encouraged to be aware of and follow standard
security and data quality measures.
physical access control
limited access to particular areas within a building is usually a pat of controlling
physical areas. Sensitive equipment, including hardware and peripherals such as
printers can be controlled by placement in the secured areas. Other equippemnt
may be locked to a desk or cabinet, or may have an alarm attached. Backup
datatapes must be kept in fireproof data safes or at a safe location.
maintenance control
an area of control that helps to maintain data quality but that is often overlooked is
maintenance control. Organization should reveiew external maintenance
agreements for all hardware and software they are using to ensure that
appropriate response are agreed to for maintaining data quality.
data protection and privacy
it refers about the rights of individuals to not have personal information collected
and misestimated casually
have intensified as more of the population has
become familiar with omptuers and as communications among computes have
proliferated.
Concurrency control
The process of managing simultenous operations against a database so that data
integrity is maintained and the operations do not interfere with each other in a multiuser
environment.
Authorization
There are several form of authorization which
Read authorization
It allows reading, but not modification of data.
Insert authorization
Allows insertions of new data, but not modification of existing data.
Update authorization
Allows modification but not deletion of data
Delete authorization
Allows deletion of data
In addition to these forms of authorization for access to data, we may grant a user
authorization to modify database schema.
Index authorization
Allows the creation and deletion of indices.
Resource authorization
Allows the creation of new relations.
Alteration authorization
Allows the addition or deletion of attributes in a relation.
Drop authorization
Allows the deletion of relation.
The drop and delete authorization differ in that delete authorization allows deletion of records
only. If a user deleted all records in a relation the relation still exists but it is empty. If a
relation is dropped, it no longer exists.
Index authorization may appear unnecessary since creation or deletion of an index does not
alter data in relations. If index authorization were granted to all users, those performed
updated would be tempted to delete indices whereas those who issued queries would be
tempted to created numerous indices. To allow the administrator to regulate the use of
system resources, it is necessary to treat index creation as a privilege.
The database administrator may authorize new users; restructure the database and son on.
This form of authorization is analogous to that of a super user or operator for an operating
system.
Page :3
G.S.Gupta, PCMS
Page :4