In: Computer Science
Using the South University Online Library or the Internet, research database security and UML.
Based on your research and readings for the week, respond to the following discussion topics.
the security can be applied at the application level and data base security can also be provided using granular privileges,virtual private databases,roles ,stored procedures .these are dbms security mechanisms.
the data base entry can be restricted by applying constraints,triggers directly on columns.
UML was created by the OMG and standardized in 1997.
alternative visual representations are IDEF standard,Systems Modeling Language (SysML),Object Process Methodolog
they are not having tools for drawing visual representations.