Examen 3. Presentacion 6 Flashcards

(40 cards)

1
Q

Semantic Data Control Involves

A

View management
Security control
Integrity control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Semantic Data Control Objective

A

Ensure that authorized users perform correct operations on the
database, contributing to the maintenance of the database
integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

View – virtual relation

A

generated from base relation(s) by a query
not stored as base relations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CREATE VIEW SYSAN(ENO,ENAME)
AS SELECT ENO,ENAME
FROM EMP
WHERE TITLE= “Syst. Anal.”

A

View – virtual relation Example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ELECT ENAME, PNO, RESP
FROM SYSAN, ASG
WHERE SYSAN.ENO = ASG.ENO

A

Views can be manipulated as base relations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SELECT ENAME, PNO, RESP
FROM SYSAN, ASG
WHERE SYSAN.ENO = ASG.ENO

A

Queries expressed on views

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SELECT ENAME,PNO,RESP
FROM EMP, ASG
WHERE EMP.ENO = ASG.ENO
AND TITLE = “Syst. Anal.”

A

Queries expressed on base relations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CREATE VIEW ESAME
AS SELECT *
FROM EMP E1, EMP E2
WHERE E1.TITLE = E2.TITLE
AND E1.ENO = USER

A

To restrict access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CREATE VIEW SYSAN(ENO,ENAME)
AS SELECT ENO,ENAME
FROM EMP
WHERE TITLE=”Syst. Anal.”

A

Updatable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CREATE VIEW EG(ENAME,RESP)
AS SELECT ENAME,RESP
FROM EMP, ASG
WHERE EMP.ENO=ASG.ENO

A

Non-updatable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

View Management in Distributed DBMS

A

Views might be derived from fragments.
View definition storage should be treated as database
storage
Query modification results in a distributed query
View evaluations might be costly if base relations are
distributed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Materialized View

A

Stored as a database relation, possibly with indices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Deferred mode

A

DDBMS: No need to access remote, base relations
Data warehouse: to speed up OLAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Materialized View updating

A

Resembles data replication but there are differences
View expressions typically more complex
Replication configurations more general

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When to Refresh a View Modes

A

Immediate mode, Deferred mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Deffered Mode times

A

Lazily: just before evaluating a query on the view
Periodically: every hour, every day, etc
Forcedly: after a number of predefined updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Deferred mode

A

Through separate refresh transactions
Triggered at different times with different trade-offs

15
Q

Immediate mode

A

As part of the updating transaction, e.g. through 2PC
View always consistent with base data and fast queries
But increased transaction time to update base data

15
Q

How to Refresh a View

A

Full computing from base data
Incremental computing by applying only the changes to
the view

16
Q

Data Security

A

Data protection
Access control

17
Q

Data protection

A

Prevents the physical content of data to be understood by unauthorized users
Uses encryption/decryption techniques

18
Q

Access control

A

Only authorized users perform operations they are allowed to on database objects

19
Q

Types of access control

A

Discretionary access control (DAC)
Multilevel access control (MAC)

20
Q

DAC’sMain actors

A

Subjects (users, groups of users) who execute operations
Operations (in queries or application programs)
Objects, on which operations are performed

21
Problem with DAC
A malicious user can access unauthorized data through an authorized user
22
Multilevel Access Control
Different security levels Access controlled by 2 rules A relation can be classified at different levels A classified relation is thus multilevel
23
Different security levels
Top Secret > Secret > Confidential > Unclassified
24
No read up
subject S is allowed to read an object of level L only if level(S) ≥ L Protect data from unauthorized disclosure, e.g. a subject with secret clearance cannot read top secret data
25
No write down
subject S is allowed to write an object of level L only if level(S) ≤ L Protect data from unauthorized change, e.g. a subject with top secret clearance can only write top secret data but not secret data (which could then contain top secret data)
26
A relation can be classified at different levels
Relation: all tuples have the same clearance Tuple: every tuple has a clearance Attribute: every attribute has a clearance
27
Additional problems in a distributed environment
Remote user authentication Management of DAC rules Covert channels in MAC
28
Semantic Integrity Control
Maintain database consistency by enforcing a set of constraints defined on the database.
29
Structural constraints
Basic semantic properties inherent to a data model e.g., unique key constraint in relational model
30
Behavioral constraints
Regulate application behavior, e.g., dependencies in the relational model
31
Two components
Integrity constraint specification Integrity constraint enforcement
32
Predefined constraints
Not-null attribute, Unique key, Foreign key, Functional dependency
33
Precompiled constraints Definition
Express preconditions that must be satisfied by all tuples in a relation for a given update type
34
Precompiled constraints
Domain constraint, Domain constraint on deletion, Transition constraint
35
General constraints Definition
Constraints that must always be true. Formulae of tuple relational calculus where all variables are quantified
36
General constraints
Functional dependency, Constraint with aggregate function,