VasaviCollegeofEngineering Ibrahimbagh‐31 DepartmentofComputerScience&Engineering AReporton“NeedforDataManagement”deliveredbyMr.PrasadBadiganti (TCS),Conductedon15thMarch,2014 (Conductedunder–Co‐curricularActivity) A Guest Lecture on “Need for Data Management” was delivered by Mr. Prasad Badiganti, Information Security Advisor, Tata Consultancy Services(TCS), Hyderabad on March 15th,2014forthestudentsaudiencesofM.Tech (CSE)II‐Sem. Theobjectiveofthesessionwastonarrate the following considerations while designing a securedatabaseapplicationas 1.Secrecy:Informationshouldnotbedisclosedto unauthorizedusers. 2. Integrity: Only authorized users should be allowedtomodifydata. 3. Availability: Authorized users should not be deniedacces. Speakerstartedoffthesessionwiththebrief introduction to two main approaches DBMS to accesscontrol. DiscretionaryAccessControlisbasedon theconceptofaccessrights,orprivileges, and mechanisms for giving users such privileges. Mandatory Access Control is based on system wide policies that cannot be changed by individual users. In this approacheachdatabaseobjectisassigned a security class, each user is assigned clearanceforasecurityclass,andrulesare imposed on reading and writing of databaseobjectsbyusers. Discretionaryaccesscontrolmechanism As discussed during session SQL‐92 supportsdiscretionaryaccesscontrolthroughthe GRANTandREVOKEcommands. Mandatoryaccesscontrolmechanism The popular model for mandatory access control, called the Bell‐LaPadula model. The Bell‐ LaPadula model imposes two restrictions on all readsandwritesofdatabaseobjects: 1. Simple Security Property: Subject S is allowedtoreadobjectOonlyifclass(S) _class(O). 2. Property: Subject S is allowed to write objectOonlyifclass(S)_class(O). The session concluded with demonstrationofGrantandrevokesyntax. the
© Copyright 2026 Paperzz