Kansas State University Department of Computing and Information Sciences CIS 560: Database System Concepts Tuesday, November 1, 2000 “Transaction processing”

Slides:



Advertisements
Similar presentations
14-1 Copyright  Oracle Corporation, All rights reserved. Privileges Database security: – System security – Data security System privileges: Gain.
Advertisements

13 Copyright © Oracle Corporation, All rights reserved. Controlling User Access.
Remember to change the OUTLN password Urs Messerli Messerli Datenbanktechnik Gmbh
IT Database Administration Section 04. The Oracle 9i Data Dictionary  A set of tables and views owned by SYS and accessible using SQL  Can be.
Final Exam Coverage. E/R Converting E/R to Relations. SQL. –Joins and outerjoins –Subqueries –Aggregations –Views –Inserts, updates, deletes –Ordering.
System Administration Accounts privileges, users and roles
Oracle8 - The Complete Reference. Koch a& Loney1 By What Authority? Presented by Victor Matos.
Database objects User schema DCL Oracle dictionary.
Oracle Data Dictionary. What Is Data Dictionary The oracle data dictionary is one of the most important components of the oracle DBMS It contains all.
Administering User Security
Transaction Management and Concurrency Control
Presented By: Matthew Garrison. Basics of Role Based Access Control  Roles are determined based on job functions within a given organization  Users.
Getting Started with Oracle11g Abeer bin humaid. Create database user You should create at least one database user that you will use to create database.
By Lecturer / Aisha Dawood 1.  Administering Users  Create and manage database user accounts.  Create and manage roles.  Grant and revoke privileges.
CHAPTER 6 Users and Basic Security. Progression of Steps for Creating a Database Environment 1. Install Oracle database binaries (Chapter 1) 2. Create.
9 Copyright © 2005, Oracle. All rights reserved. Administering User Security.
Copyright س Oracle Corporation, All rights reserved. 14 Controlling User Access.
Database Programming Sections 13–Creating, revoking objects privileges.
IS 221: DATABASE ADMINISTRATION Lecture 6:Create Users & Manage Users. Information Systems Department 1.
INTRODUCTION TO ORACLE Lynnwood Brown System Managers LLC End User Management – Lecture 3 Copyright System Managers LLC 2007 all rights reserved.
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
7 Copyright © 2004, Oracle. All rights reserved. Administering Users.
Controlling User Access. Objectives After completing this lesson, you should be able to do the following: Create users Create roles to ease setup and.
DCL/1 Data Control Language Objectives –To learn about the security mechanisms implemented in an RDBMS and how to use them Contents –Identifying Users.
IST 318 Database Administration Lecture 10 Managing Roles.
17 Copyright © Oracle Corporation, All rights reserved. Managing Roles.
Managing users and security Akhtar Ali. Aims Understand and manage profiles Understand and manage users Understand and manage privileges Understand and.
Nitin Singh/AAO RTI ALLAHABAD1 DATABASE SECURITY DATABASE SECURITY.
Controlling User Access Fresher Learning Program January, 2012.
Controlling User Access. 2 home back first prev next last What Will I Learn? Compare the difference between object privileges and system privileges Construct.
Kansas State University Department of Computing and Information Sciences CIS 560: Database System Concepts Thursday, September 13, 2000 “Structured Query.
20 Managing Roles Objectives Creating and modifying roles Controlling availability of roles Removing roles Using predefined roles Displaying role.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
Copyright © 2004, Oracle. All rights reserved. CONTROLLING USER ACCESS Oracle Lecture 8.
ADVANCED TOPICS IN RELATIONAL DATABASES Spring 2011 Instructor: Hassan Khosravi.
Transactions, Roles & Privileges Oracle and ANSI Standard SQL Lecture 11.
Chapter 12 Additional Database Objects. Chapter Objectives  Define the purpose of a sequence and state how it can be used by an organization  Explain.
Altering Tables and Constraints Database Systems Objectives Add and modify columns. Add, enable, disable, or remove constraints. Drop a table. Remove.
IST 318 Database Administration Lecture 9 Database Security.
13 Copyright © Oracle Corporation, All rights reserved. Controlling User Access.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
Chapter 12Introduction to Oracle9i: SQL1 Chapter 12 Additional Database Objects.
1 Copyright © 2006, Oracle. All rights reserved. Controlling User Access ( 사용자 접근 제어 )
7 Copyright © 2007, Oracle. All rights reserved. Administering User Security.
1 Chapters 21, 22, 23, 37  Ch. 21: SQL*Loader  Ch. 22: Database Links, Oracle Net  Ch. 23: Materialized Views (aka Snapshots)  Ch. 37: Data Dictionary.
Intro To Oracle :part 1 1.Save your Memory Usage & Performance. 2.Oracle Login ways. 3.Adding Database to DB Trees. 4.How to Create your own user(schema).
1 Copyright © 2009, Oracle. All rights reserved. Controlling User Access.
19 Managing Privileges Objectives Identifying system and object privileges Granting and revoking privileges Controlling operating system or password.
8 Copyright © 2005, Oracle. All rights reserved. Managing Schema Objects.
Database Systems Slide 1 Database Systems Lecture 4 Database Security - Concept Manual : Chapter 20 - Database Security Manual : Chapters 5,10 - SQL Reference.
15 Copyright © Oracle Corporation, All rights reserved. Managing Users.
Copyright  Oracle Corporation, All rights reserved. 14 Controlling User Access.
6 Copyright © 2005, Oracle. All rights reserved. Administering User Security.
Controlling User Access
Controlling User Access
Oracle structures on database applications development
Managing Privileges.
Controlling User Access
Objectives User access Create users Create roles
TABLES AND INDEXES Ashima Wadhwa.
Controlling User Access
Managing Privileges.
Database Security.
Introduction To Database Systems
Database Security.
OER- UNIT 3 Authorization
Managing Objects with Data Dictionary Views
SQL .. An overview lecture3.
Create New User in Database. First Connect the System.
Introduction of Week 13 Return assignment 11-1 and 3-1-5
Presentation transcript:

Kansas State University Department of Computing and Information Sciences CIS 560: Database System Concepts Tuesday, November 1, 2000 “Transaction processing” Lecture No. 18 OLTP

Kansas State University Department of Computing and Information Sciences CIS 560: Database System Concepts CONTENTS Concurrency control Transactions and schedules Serializability Anomalies due to concurrency Locking/ Time stamping OLTP

Kansas State University Department of Computing and Information Sciences CIS 560: Database System Concepts User SYTEM and SYS users Concurrency

Kansas State University Department of Computing and Information Sciences CIS 560: Database System Concepts Role Connect (select, insert, update, delete, create tables) Authority Resource (Create tables, SP, triggers, indexes and clusters) DBA (All system privileges, grant privileges, unlimited space quota )

Kansas State University Department of Computing and Information Sciences CIS 560: Database System Concepts Grant Granting system privileges grant role to user; grant CONNECT, RESOURCE to ARUL; Authority Granting object privileges grant priv on object to user; grant select on customerTable to ARUL;

Kansas State University Department of Computing and Information Sciences CIS 560: Database System Concepts Guidelines 1. You cannot grant a privilege that you do not have 2. You cannot grant privileges on objects that you do not own. 3. You cannot grant privileges on objects for which you don’t have the authority to grant. 4. You cannot access objects for which you have not been granted privileges. Authority

Kansas State University Department of Computing and Information Sciences CIS 560: Database System Concepts Creating roles Authority 1. Create role Create role CLERK; 2. Grant privileges to role grant create session to clerk; 3. Grant a role to users; grant clerk to ARUL; Teaser: Why should we create such roles

Kansas State University Department of Computing and Information Sciences CIS 560: Database System Concepts Data dictionary Stores information that is used to manage the objects in the database. USER, ALL and DBA prefixes. DICTIONARY table Dictionary

Kansas State University Department of Computing and Information Sciences CIS 560: Database System Concepts Examples USER_OBJECTS USER_TABLES USER_VIEWS USER_CONSTRAINTS USER_INDEXES USER_SOURCE USER_USERS Dictionary