scholarly journals Designing Application Authorizations

10.28945/2409 ◽  
2001 ◽  
Author(s):  
Leszek A. Maciaszek ◽  
Mieczyslaw L. Owoc

Information systems must be protected from unauthorized access. Authorization has been studied extensively as the main form ofpreserving the security of databases. Every database management system provides a sophisticated set of options aimed at protecting the database from unauthorized access. An important practical problem is how to take advantage of the database security options to ensure that a user is permitted to access the database through the application program but may not be allowed to access the database directly via database query tools. A related issue is how to extend the user privileges on the client part of the application so that only authorized GUI controls are available to the user. In this paper we propose a model for the design of necessary authorization settings into both the client and the server parts of a database application. The settings are stored in an Authorization Database (ADB) to which the program connects to customize itself for the current user. The customization is based on an application role granted to the user. An application role is activated for a connection (user session). After the database server authenticates the user, the user login to the application role can be transparently obtained by the application from the ADB.

Author(s):  
Suyud Widiono

A database server called the Database Management System (DBMS) that relates tables in a database is called the Relational Database Management System (RDBMS). DBMS/RDBMS is a computer program that provides data services for computers or other computer programs. One of the RDBMS type database server (hereinafter referred to as a database server) is MariaDB. The database server is in charge of managing and providing data, so data must always be ready, fast presented, accurate, and safe, it cannot be damaged or even lost. One way to provide this data is to install several database servers using the concept of replication in the Multiple Server Database system. Replication in a cluster server database is a method of installing several database server nodes that allow between node servers to copy each other and distribute data from one node to another database server node, which then synchronizes data between server nodes to maintain data consistency. This study looks for the most optimal number of minimal database server nodes to provide accurate, fast and safe data on the MariaDB Cluster RDBMS. From the results of the replication test from the cluster server database, it can be concluded that the number of 3 (three) node servers can be known to always synchronize and consistency of data between server nodes, so there are 3 (three) nodes of minimum database node with MariaDB RDBMS.


Author(s):  
Osman Abdallah Osman Akif

The development of applying database management applications is currently underway within Geographical Information Systems (GIS) applications in the Sultanate of Oman.The establishment of a national database management system in Oman is considered as the backbone that is required within the Geographic Information System project in Oman. The principal of the GIS project in Oman was built upon unifying the used software packages over the sultanate which is ARC/INFO as GIS Package and ORACLE as database management software. These packages are used within the different participating Ministries in the GIS project in Oman.The participating ministries will handle information that are shared between them. The shared information among the different ministries is the attributed data which is defined as descriptive information extracted from geographic features that usually existed on the topographic maps and the ministries maps (utility maps). The map features can be classified into different layers according to the principles of ARC/INFO GIS Package. Accordingly, the main objectives of this research paper is to explain the technique proposed for establishing a national database management system that can handle and manage the shared information amongst the participating ministries in the project. The proposed database design will be made using the ORACLE database management system. Moreover, the paper will handle a proposed idea for linking the geographic map layers with the corresponding attributed database in order to create Geographic Information System applications. As a Conclusion, it is Proposed that all the government GIS departments in the Sultanate will share the same information within a unique national database management which can be considered one of the major benefits in applying database management in the field of Geographic Information Systems.


Author(s):  
Jaychand Vishwakarma ◽  
Abhishek Shukla

Nowadays a Database security has become an important issue in technical world. The main objective of database security is to forbid unnecessary information exposure and modification data while ensuring the availability of the needed services. A numbers of security methods have been created for protecting the databases. Many security models have been developed based on different security aspects of database. All of these security methods are useful only when the database management system is designed and developing for protecting the database. Recently the growth of web application with database at its backend Secure Database Management System is more essential than only a Secure Database. Therefore this paper highlight on the Threats, Security Methods and Vulnerabilities in Database Management System with the help of survey performed on the field of secure databases.


The chapter presents the geographic information systems. A geographic information system (GIS) is a computer system that allows various sources to gather and organize, manage, analyze and combine, develop, and present geographically located information contributing in particular to the management from space. A geographic information system is also a database management system for entering, storing, retrieving, querying, analyzing, and displaying localized data. It is a set of data located in space, structured so that it can conveniently extract syntheses useful to the decision.


GEOgraphia ◽  
2009 ◽  
Vol 4 (7) ◽  
pp. 65
Author(s):  
Gilberto Pessanha Ribeiro

RESUMO Um sistema gerenciador de banco de dados pode possuir uma extensão de um banco de dados voltada para o armazenamento e recuperação de metadados baseados em objetos abstratos. O objetivo deste trabalho é alcançar um entendimento melhor dos requisitos básicos para um gerenciador de metadados. operar satisfatoriamente, além de testar ao máximo um modelo de armazenamento avaliando o seu desempenho, diante dos diversos tipos de dados geográficos existentes. O trabalho aponta a necessidade de se conhecer melhor o desempenho de sistemas já desenvolvidos, ou em desenvolvimento, com objetivos de gerenciar metadados geográficos digitais. Palavras-chave: Sistemas de Informação Geográfica, Geoprocessamento, Geografia, Bancos de Dados, Computação.ABSTRACT Database management systems can be design with an extended database in order to store and retrieve metadata based on abstract objects. The target of this paper is a better understanding of basic requirements to this database management system operates satisfactorily, above all to test at best a model to store, analysing your performance, in front of several types of existing geographic data. The aim of this paper is to show some needs to know developed systems performance, or in developing, which purpose is digital geographic metadata management. Keywords: Geographic Information Systems, Geoprocessing, Geography, Databases, Computation.


Author(s):  
Jean-Luc Hainaut ◽  
Jean Henrard ◽  
Didier Roland ◽  
Jean-Marc Hick ◽  
Vincent Englebert

Database reverse engineering consists of recovering the abstract descriptions of files and databases of legacy information systems. A legacy information system can be defined as a “data-intensive application, such as [a] business system based on hundreds or thousands of data files (or tables), that significantly resists modifications and changes” (Brodie & Stonebraker, 1995). The objective of database reverse engineering is to recover the logical and conceptual descriptions, or schemas, of the permanent data of a legacy information system, that is, its database, be it implemented as a set of files or through an actual database management system.


2018 ◽  
Author(s):  
Doni winata

DONI WINATA_165100085_PBD_SYSTEM DEVELOPMENT AND DATABASE SECURITYBasic Data (Database) Basic data (English: database) is a collection of information stored on a computer systematically so that it can be used on a computer program to obtain information from the database. Software used to manage and release queries (databases) is called a management database system (database management system, DBMS).


Sign in / Sign up

Export Citation Format

Share Document