HPlogo Getting Started with HP IMAGE/SQL: HP 3000 MPE/ iX Computer Systems > Chapter 4 A Database Example

Defining the Security Scheme

» 

Technical documentation

Complete book in PDF
» Feedback

 » Table of Contents

 » Glossary

 » Index

The radio station manager wants to have complete access to all the information in the database. Announcers need to read information about Albums, Selections, Composers, and the Log. The program director adds information about new albums and decides what will be played for publication in the monthly listener guide.

A security scheme will allow database accessors to do only what has been assigned or expected of them and nothing more. The security can be broken down to these three levels:

Manager

Read and Write all entities

Director

Read all entities, Write all but Log

Announcer

Read all entities, Write Log

To complete this security scheme in TurboIMAGE/XL, you will define a password for each of these levels and assign it a numeric value. For simplicity sake, we will use:

	   MGR     10

	   DIR     20

	   ANNCR   30

Applying these to the data sets results in the following:

	   Albums          Read 10, 20, 30;  Write 10, 20

	   Selections      Read 10, 20, 30;  Write 10, 20

	   Composers       Read 10, 20, 30;  Write 10, 20

	   Log             Read 10, 20, 30;  Write 10, 30

Each individual will be assigned one of these passwords to be used when accessing the database. The password will designate the data that can be accessed and the method of access.

The next section will show you the schema for our now complete TurboIMAGE/XL database. In that schema, you will see the syntax for this security schema.

Feedback to webmaster