Advanced Database Management System - Tutorials and Notes: Codd's Twelve Rules - Rule 12 - Non-Subversion Rule

Search Engine

Please visit, subscribe and share 10 Minutes Lectures in Computer Science

Wednesday, 4 March 2015

Codd's Twelve Rules - Rule 12 - Non-Subversion Rule

Codd's Twelve Rules - Rule 12 - Non-Subversion Rule

Rule 12
Non-Subversion Rule
Rule
If the system provides a low-level (record-at-a-time) interface, then that interface cannot be used to subvert the system, for example, bypassing a relational security or integrity constraint.
Description
“This rule states that if a Relational Database Management System has an interface that provides access to low level records, this interface then must not be able to subvert the system and bypass security and integrity constraints.”
“The system must not have features that allow you to subvert database structure integrity. Basically, the system must not include back doors that let you cheat the system for features such as administrative privileges or data constraints.”
“There should be no way to modify the database structure other than through the multiple row database language (like SQL).”
Overall, there should not be a way in any form to violate the integrity constraints defined on a database. Only the language/sublanguage which was used to define those constraints can be able to redefine them. If we would say that a low level language is supported by a RDBMS, then it should not be possible for that low level language to bypass any integrity constraints defined in a high level language.
Example violations of this rule
SQL Server 2008 violates this through Bulk copy and Disabling constraints and triggers options.

Some DBMS that fulfills this property
SQL Server, Oracle


Go to Home - Codd's Twelve Rules


4 comments:

  1. This comment has been removed by a blog administrator.

    ReplyDelete
  2. Your work is very good and I appreciate you and hopping for some more informative posts ספרינקלרים

    ReplyDelete

  3. The post is written in very a good manner and it contains many useful information for me.


    gexton security app

    ReplyDelete

Featured Content

Multiple choice questions in Natural Language Processing Home

MCQ in Natural Language Processing, Quiz questions with answers in NLP, Top interview questions in NLP with answers Multiple Choice Que...

All time most popular contents