12.07.2015 Views

Untitled

Untitled

Untitled

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Slika 1Dio relacijske shemebaze podatakaFigure 1Part of the relationshipschema of the database4 SIGURNOST BAZEPODATAKA RELEJNE ZA©TITESustav za upravljanje bazom podataka MS Access2000 nudi nekoliko sigurnosnih opcija za oËuvanjeintegriteta i tajnosti podataka koje su iskoriπtenepri kreiranju baze podataka relejne zaπtite. Sigurnostna razini korisnika kombinira korisnike, radnegrupe i dozvole na razini objekta za potporuograniËenom pristupu razliËitim dijelovima bazepodataka. Kod pokretanja programa MS Access2000 potrebno je unijeti korisniËko ime i lozinkuza definiranje korisniËkog identiteta. KorisniËkoime je povezano sa skupom dozvola koje odreappleujeπto korisnik moæe raditi nad pojedinim objektimabaze kad se baza podataka otvori. U bazi podatakarelejne zaπtite definirane su tri grupe korisnika srazliËitim pravima:∑∑∑administrator baze - ima moguÊnost izmjenedizajna i strukture baze te pregled i aæuriranjepodataka u bazi,ovlaπteni korisnik - ima moguÊnost pregleda iizmjene podataka u bazi, ali nema moguÊnostizmjene dizajna i strukture baze,obiËni korisnici - imaju samo moguÊnost pregledapodataka.Grupne ovlasti administratora baze i grupne ovlastiovlaπtenog korisnika ima po jedan korisnik dokovlasti grupe obiËni korisnici ima viπe korisnika.4 SECURITY OF THE RELAYPROTECTION DATABASEThe MS Access 2000 database management systemoffers several security options for safeguardingthe integrity and secrecy of the data that are usedin creating a relay protection database. Security atthe user level encompasses users, work groups andpermission at the level of the object to support limitedaccess to various parts of the database. Whenstarting the MS Access 2000 program, it is necessaryto enter the user name and password for thedefinition of the user’s identity. The user’s nameis linked with a set of permissions that determinewhat a user can do regarding individual objects ofthe base when the database opens. In the relay protectiondatabase, three groups of users with differentrights are defined:∑∑∑the base administrator can change the designand structure of the base as well as view andupdate the data in the base,the authorized user can view and change datain the base but cannot change the design andstructure of the base,the ordinary users can only view data.The administrator group permissions and the usergroup permissions have one user each while permissionsfor the group of ordinary users are held byseveral users. Individual users in this group can be625SutloviÊ,E., Petric, K., Baza podataka relejne zaštite, Energija, god. 56(2007), br. 5., str. 618-633SutloviÊ, E., Petric, K., Relay Protection Database, Energija, vol. 56(2007), No. 5, pp. 618-633

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!