Conceptual database design: an Entity-relationship approach
Conceptual database design: an Entity-relationship approach
Fundamentals of database systems (2nd ed.)
Fundamentals of database systems (2nd ed.)
Expressiveness in conceptual data modelling
Data & Knowledge Engineering
Data schema design as a schema evolution process
Data & Knowledge Engineering
Entity-relationship and object-oriented data modeling—an experimental comparison of design quality
Data & Knowledge Engineering
On the representation of roles in object-oriented and conceptual modelling
Data & Knowledge Engineering
A General Theory for Evolving Application Models
IEEE Transactions on Knowledge and Data Engineering
Hi-index | 0.00 |
High-level conceptual database design is a widespread method in database built with conceptual models we will illustrate the "mini world" of the database via Database Management System (DBMS) in an independent form. The form will be mapped by the use of a mapping method to reach a DBMS specific model. The database designer should keep in mind both data and functional requirements throughout the whole process. We will also indicate some database security aspects in our model. Database applications usually have to meet high security level, therefore we must protect the database and the data stored in the database against those who do not have the appropriate access permissions. The design could be established of the access permission system with the specification of the project which may reach the implementation through building the conceptual model. In our approach we illustrate this access design method from high-level to the implementation. First we have to define the user groups and their roles. In connection with the conceptual model (Enhanced Entity Relationship Model) we recommend the use of an improved model, which already includes the privileges of the users, too. These permissions can be represented in a conceptual access matrix model. At this level the privileges of the users are still DBMS-independent, then by mapping, it reaches the low-level database model (relational model), which can be accompanied with the access matrix model. This is the point where access permissions become connected to DBMS-specific elements. Finally, we point out a certain realizations of the access control permissions.