Current location - Recipe Complete Network - Take-out food franchise - Javaweb source code of food network
Javaweb source code of food network
1, the first part:

That is, the first chapter is the introduction: generally including the research background and significance of the topic, as well as the organizational structure of the paper. (that is, the role of Oracleq authority and the significance and role of using it to realize database management)

2. Part II: (This part is the key point, and the following is just a reference, which can be different)

Chapter two: Introduce why authority is needed, what is the essence of authority, what is its basic realization principle and what is its main function.

Chapter 3: Introduce how to use permissions to manage Oracle9, what are the specific steps and how to achieve it. This can be realized on your own virtual machine, and you need to have screenshots to match your own text description when describing it.

Chapter 4: Introduce the design of remote authorization. We should first explain why we need to restrict and design permissions, and what kind of considerations we have for security issues. The key point is how to design according to the specific situation of a unit (for example, a small unit), and where is the superiority or safety of this realization. (screenshot required)

3. Part III: Summary.

Make a summary or prospect of the completion of the whole paper.

I helped him solve it.

20 1 1-3-29 0 1:09

Satisfied answer

1 Overview of Virtual Database Security

The data on the server can be of enterprises or institutions.

The most important resource, protecting these data is of great significance to enterprises and institutions.

Today, most large relational databases use Oracle databases.

Database security refers to allowing or prohibiting users from operating on the database.

Operation. The security management of Oracle database involves many aspects, such as control number.

According to consistency and parallelism, user groups and users are established in different security domains.

And the different rights of different customers to connect, the role and rights of administrators to different users.

Restrict control, establish sufficient effective audit security strategy and so on. The author introduces emphatically.

Discusses the roles in Oracle database and the permissions of different roles.

Date of receipt: March 27, 2008

About the author: Tian Xuezhi (1979-), female, Jilin native, teacher, engaged in ora-

Research on the use and management of cle database.

Roles in 2 O racle database

In Oracle database, the role of administrator is simple.

But it is also a very powerful mechanism. When the database is small, it is very useful to access the database.

When there are not many families, users on each table are also granted specific access.

Is acceptable; However, with the increase of database, users and permissions.

Management is more troublesome. The operating system uses the concept of user groups to describe points.

Access rights of system resources assigned to different users, Oracle database

The concept of "role" is adopted to organize different permissions, and roles can be assigned to others.

Users and roles, some characteristics of roles can greatly simplify the permissions in the database.

Management. In fact, roles are usually defined by database administrators, and then

The DBA then assigns permissions to users based on these roles. database administration

Members usually need to create different roles for different applications of the database, and then

Give these roles different permissions, and an application can contain several different.

Roles, each role has a different permission set.

According to the study of fault law and mechanism, strengthen daily maintenance, inspection and pre-repair.

The development program of fault management has the following eight aspects:

(1) Do a good job in publicity and education, so that the operation and maintenance workers can consciously check the machine.

Seriously record, count and analyze the mechanical equipment failures, and put forward reasonable suggestions.

(2) Closely combining the actual production of this enterprise and the characteristics of mechanical equipment,

The mechanical equipment in use is divided into three categories: A, B and C, so as to determine the key points of fault management.

(3) monitoring the key parts of key mechanical equipment by using monitoring instruments.

Planned monitoring, timely detection of faults, symptoms and deterioration information. Universal machine

Machines and equipment should also be inspected and patrolled daily through human feelings and general test tools.

Back inspection, regular inspection, intact inspection, etc. The focus is on fault-prone departments.

Information on technical status and abnormal phenomena of positions, mechanisms and parts. At the same time, we must

Formulate inspection standards and determine the boundaries between normal, abnormal and fault of mechanical equipment.

(4) Conduct fault analysis and train maintenance workers to master fault analysis methods.

(5) Records must be complete and accurate. Fault record is the basis of fault management.

Basic data is the original basis for fault analysis and treatment. Maintenance workers are at

After on-site inspection and fault repair, the "Mechanical Equipment Fault Repair Sheet" shall be complied with.

Fill in the contents carefully, and the mechanical technician will make statistical analysis every month and submit it to the mechanical equipment.

The management supervisor shall report relevant faults to the competent department according to the procedures and feed them back to the machine.

Equipment manufacturing unit.

(6) Mechanical equipment technicians should not only master the fault situation every day, but also summarize the information monthly.

Set up "Fault Repair Order" and maintenance record. Through the statistics and arrangement of fault data

And calculate the failure frequency and mean time between failure of all kinds of mechanical equipment.

Period, analysis of single mechanical equipment failure dynamics and key failure reasons, find out the reasons.

The occurrence of obstacles, in order to highlight the key points, take countermeasures and sort out the fault information.

The analysis data is fed back to the management department to facilitate the arrangement of preventive maintenance or improvement measures.

It can also be used as the basis for modifying the interval, content and standard of regular inspection.

(7) according to the statistical data, you can draw statistical analysis charts, such as single

The dynamic statistical analysis table of mechanical equipment faults is the analysis of faults by the maintenance team.

An effective visual management method is convenient for managers and maintenance personnel in time.

Master the faults of all kinds of mechanical equipment and determine the maintenance countermeasures.

Have clear goals from time to time. Through the daily patrol inspection of maintenance workers and equipment status

Check and obtain status information and fault symptoms, as well as relevant records and analysis data,

Existing mechanical equipment technicians or maintenance team leaders are responsible for all kinds of mechanical equipment.

Problems, timely arrange daily maintenance, make full use of production gap time or holidays,

Take precautions first, so as to control and reduce failures.

References:

Yao Guanxin Zhao Yanping. Equipment management and maintenance [M]. Beijing: Chemical industry.

Press, 2004.

[2] Xu, Yuan Peixin, Analysis and analysis of complex mechanical fault diagnosis

Wave method [M]. Beijing: Machinery Industry Press, 2003.

Editor in Charge: Li Zenghua

—74— The database role has the following characteristics:

The (1) role can be granted system and schema object permissions.

(2) Different database users can be granted different role permissions.

(3) Roles can be granted to other roles.

(4) Roles can be enabled or disabled.

(5) Roles can be granted or reclaimed.

The name of a role must be unique in the database and cannot be duplicated.

Oracle predefined several roles: DBA, resource, connection,

EXP_FULL_DATABASE, etc. The following figure shows how to create a role and put the system

Permission granting role.

The creation and management of roles and the allocation of permissions can also be achieved through SQL commands.

The type to execute.

Create a role and grant permissions:

Create role role_name

Grant system_priv | role to the role.

Modify role:

Change the role name

Delete role:

Delete role role_name

Reasonable creation and granting of roles with reasonable permissions can be guaranteed to the greatest extent.

Security of Oracle database system.

Three permissions in oracle database

Permission refers to the right to perform certain operations and access certain objects. take for example

In the database, such as creating database, table, executing SQL statement, query times, etc.

According to, creating database objects, etc. requires necessary permissions to perform such activities.

Limit. Permissions are assigned to different roles and even users, and users can complete certain tasks.

The application of. Database administrators can explicitly assign permissions to users, or

Grant permissions to the role, and then add the role to the user. Because role machines

The system simplifies the distribution and management of permissions, so the database administrator should

Permissions are assigned to roles, not directly to users. In the Oracle database

There are two main types of permissions:

(1) system permissions. System authority refers to the execution of specific operations in the system.

Power. Such as creating a database, deleting a database and deleting data in a data table.

And so on all need to have system permissions. Oracle database includes more than 60 systems.

Permission

(2) Object permissions. Scheme object permissions refer to the execution of specific scheme objects.

The power of operation. Schema objects in Oracle database mainly include tables, views,

Stored procedures, functions, etc.

System permissions mainly include:

Create Session: Create a connection to the database.

Create Table: Create a data table.

Create View: Create a view.

Creation process: Create a process.

Create User: Create a user.

Object permissions mainly include:

Select: Read rows in a table, view, or sequence.

Update: Updates rows in tables, views, and sequences.

Delete: Delete data in tables and views.

Insert: Insert data into tables and views.

Execution: Execution types, functions, packages and procedures.

ALTER: Modify the structure in tables, sequences and synonyms.

After granting permission to a role, you can revoke the permission in two ways. One is

Use Oracle enterprise manager; One is to use SQL statement: RE-

VOKE system privileges | roles for users. For tables, views, stored

Procedures and other operations must have corresponding permissions, that is, maintaining Oracle database pairs.

It's like a powerful security barrier. For example, to create a view, you must have the following permissions

Restrictions:

(1) Grant system privileges to CREATE VIEW or CREATE ANY.

View system permissions.

(2) Explicitly grant SELECT, INSERT, UPDATE and DELETE pairs.

Like permissions, explicitly grant SELECT ANY TABLE, INSERT ANY TA-

BLE, update any table, and delete the system permissions of any table.

(3) Views can provide value-based security for table information.

(4) The view can access the data of the selected column in the base table.

Accordingly, operations on objects such as tables and procedures also need corresponding permissions.

Limit. In this way, the security access rights of various objects in Oracle database are reasonable.

The configuration is effectively guaranteed.

4 abstract

The security of data in Oracle database is an important work of the company. Data

The important mechanism of library security management is the distribution of roles and permissions. Permitted distribution

It is a mechanism to restrict users' rights and an important means to maintain database security.

By granting certain system permissions or object permissions to certain roles, and then

Assigning roles to different users or user groups simplifies Oracle data.

The authority management of the library improves the efficiency of the authority management. In short, roles and rights

In Oracle database system, restrictions play a key role in database security, and at the same time,

It is also a very powerful mechanism to ensure the security of Oracle database system.