Documente Academic
Documente Profesional
Documente Cultură
UNENCRYPTED
DATA
UNENCRYPTED
RESPONSE
UNENCRYPTED
READS/WRITES
In this
scenario, all
data inside the
database is
unencrypted
User Management
• Must consider access and security needs when
devising user management approach
• Must also consider the manner in which
authentication will occur
– DBMS vendors provide various methods for handling
authentication
• Role-based Access Controls use roles to control
users’ access rights
– Roles are given privileges and then users are
assigned roles
References
• Elmasri, R., & Navathe, S. B. (2006).
Fundamentals of Database Systems. Boston:
Addison Wesley.
• Garcia-Molina, H., Ullman, J. D., & Widom, J.
(2001). Database Systems: The Complete Book.
Upper Saddle River, NJ: Pearson/Prentice-Hall.
• Ramakrishnan, R., & Gehrke, J. (2002).
Database Management Systems. New York:
McGraw-Hill.
Acknowledgments
The author wishes to acknowledge the
support from the Society for Manufacturing
Engineers - Education Foundation, SME-EF
Grant #5004 for “Curriculum Modules in
Product Lifecycle Management.”