CH 6
CH 6
CH 6
Domain Constraints
Referential Integrity
Assertions
Triggers
Security
Authorization
Authorization in SQL
Alternative to cascading:
on delete set null
on delete set default
Null values in foreign key attributes complicate SQL
referential integrity semantics, and are best
prevented using not null
if any attribute of a foreign key is null, the tuple is
defined to satisfy the foreign key constraint!
Physical level
Physical access to computers allows destruction of
data by intruders; traditional lock-and-key security
is needed
Computers must also be protected from floods, fire,
etc.
– More in Chapter 17 (Recovery)
Human level
Users must be screened to ensure that an
authorized users do not give access to intruders
Users should be trained on password selection and
secrecy
modification of data.
Insert authorization - allows insertion of new data, but
not modification of existing data.
Update authorization - allows modification, but not
deletion of data.
Delete authorization - allows deletion of data
DBA U2 U5
U3
Database System Concepts 6.34 ©Silberschatz, Korth and Sudarshan
Authorization Grant Graph
intructions.