Home / Expert Answers / Computer Science / question-1-suppose-there-are-four-different-users-and-four-relations-with-the-following-security-cl-pa932

(Solved): question 1 /Suppose there are four different users and four relations with the following security cl ...



question 1 /

Suppose there are four different users and four relations with the following security classifications:

Database Users: Noura (Top Secret), Sara (Secret), Ahmed (Confidential), and Omar (Unclassified).

Database Relations: R1 (Top Secret), R2 (Secret), R3 (Confidential), and R4 (Unclassified).

By considering the Bell-LaPadula model properties answer the following:

  1. Create a simple table showing each user and his\her ability to (1) read and write; (2) write only; or (3) read only each relation. [1 Mark]
  2. Which user can read all relations? Justify your answer. [0.5 Mark]
  3. Which user can write all relations? Justify your answer. [0.5 Mark]

question 2 /

Explain one method for Deadlock avoidance and one method for Deadlock detection.

question 3 /

Why is Data Fragmentation Necessary in Database Systems?

A. Discuss the Trade-offs associated with Data Fragmentation.

B. Provide an example of scenarios where Horizontal Data Fragmentation is preferred.

question 4 /

What are the before image (BFIM) and after image (AFIM) of a data item? How does DBMS handle BFIM and AFIM in shadow paging?



We have an Answer from Expert

View Expert Answer

Expert Answer





We have an Answer from Expert

Buy This Answer $5

Place Order

We Provide Services Across The Globe