question 1 /
Suppose there are four different users and four relations with the following security classifications:
Database Users: Noura (Top Secret), Sara (Secret), Ahmed (Confidential), and Omar (Unclassified).
Database Relations: R1 (Top Secret), R2 (Secret), R3 (Confidential), and R4 (Unclassified).
By considering the Bell-LaPadula model properties answer the following:
question 2 /
Explain one method for Deadlock avoidance and one method for Deadlock detection.
question 3 /
Why is Data Fragmentation Necessary in Database Systems?
A. Discuss the Trade-offs associated with Data Fragmentation.
B. Provide an example of scenarios where Horizontal Data Fragmentation is preferred.
question 4 /
What are the before image (BFIM) and after image (AFIM) of a data item? How does DBMS handle BFIM and AFIM in shadow paging?