Hi guys
We have a following problem. For security reasons in each table in our
DB we have addition field which is calculated as hash value of all
columns in particular row.
Every time when some field in particular row is changed we create and
call select query from our application to obtain all fields for this
row and then re-calculate and update the hash value again.
Obviously such approach is very ineffective, the alternative is to
create trigger on update event and then execute stored procedure which
will re-calculate and update the hash value. The problem with this
approach is that end user could then change the date in the tables and
then run this store procedure to adjust hash value.
We are looking for some solution that could speed up the hash value
updating without allowing authorized user to do it
Thanks in advance,
Leon 6 1136
Vlad Olevsky wrote: Hi guys
We have a following problem. For security reasons in each table in our DB we have addition field which is calculated as hash value of all columns in particular row.
Every time when some field in particular row is changed we create and call select query from our application to obtain all fields for this row and then re-calculate and update the hash value again.
Obviously such approach is very ineffective, the alternative is to create trigger on update event and then execute stored procedure which will re-calculate and update the hash value. The problem with this approach is that end user could then change the date in the tables and then run this store procedure to adjust hash value.
We are looking for some solution that could speed up the hash value updating without allowing authorized user to do it
Thanks in advance, Leon
In DB2 for LUW you can define the column as a generated column.
I presume you have some sort of UDF already that does the actually
hashing. Last I heard SS 2005 will have persistent generated columns as
well.
In general (x-product) you can use a combination of a check constraint
and (before) triggers.
One must but wonder WHY this column is required. Are you affraid of
corruption or sabotage?
Cheers
Serge
--
Serge Rielau
DB2 SQL Compiler Development
IBM Toronto Lab
"Vlad Olevsky" <le********@yahoo.com> schrieb im Newsbeitrag news:50**************************@posting.google.c om... Obviously such approach is very ineffective, the alternative is to create trigger on update event and then execute stored procedure which will re-calculate and update the hash value. The problem with this approach is that end user could then change the date in the tables and then run this store procedure to adjust hash value.
We are looking for some solution that could speed up the hash value updating without allowing authorized user to do it
As Frank pointed out, try to create a trigger which calls a function.
Let the function run with the grants of the caller and give only
authorized callers the exec grant of the function.
Greetings!
Volker
Vlad Olevsky wrote: Hi guys
We have a following problem. For security reasons in each table in our DB we have addition field which is calculated as hash value of all columns in particular row.
Every time when some field in particular row is changed we create and call select query from our application to obtain all fields for this row and then re-calculate and update the hash value again.
Obviously such approach is very ineffective, the alternative is to create trigger on update event and then execute stored procedure which will re-calculate and update the hash value. The problem with this approach is that end user could then change the date in the tables and then run this store procedure to adjust hash value.
We are looking for some solution that could speed up the hash value updating without allowing authorized user to do it
Thanks in advance, Leon
This may come as a shock to you Leon but the solution in each of the
products whose usenet group you copied on this uses a completely
different solution.
I'd suggest you start by apologizing, to all, for your lack of
identifying the product and version and for posting to every usenet
group you can spell.
And then repost in the one, and only, group where your query is
appropriate.
Thank you.
--
Daniel A. Morgan
University of Washington da******@x.washington.edu
(replace 'x' with 'u' to respond)
Serge Rielau (sr*****@ca.ibm.com) writes: In DB2 for LUW you can define the column as a generated column. I presume you have some sort of UDF already that does the actually hashing. Last I heard SS 2005 will have persistent generated columns as well.
Actually, SQL 2000 has it as well. The difference is that PERSISTED is
a keyword in SQL 2005, and, I assume, that in SQL 2005 you can persist
a computed colum, without indexing it.
--
Erland Sommarskog, SQL Server MVP, es****@sommarskog.se
Books Online for SQL Server SP3 at http://www.microsoft.com/sql/techinf...2000/books.asp
Erland Sommarskog wrote: Serge Rielau (sr*****@ca.ibm.com) writes:
In DB2 for LUW you can define the column as a generated column. I presume you have some sort of UDF already that does the actually hashing. Last I heard SS 2005 will have persistent generated columns as well.
Actually, SQL 2000 has it as well. The difference is that PERSISTED is a keyword in SQL 2005, and, I assume, that in SQL 2005 you can persist a computed colum, without indexing it.
Yes, in SS2000 the generated column is virtual (i.e. not persisted). The
planned syntax in the standard is "GENERATED BY REFERENCE", being the
default for compatibility with SS2000.
Cheers
Serge
--
Serge Rielau
DB2 SQL Compiler Development
IBM Toronto Lab This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics
by: mr.iali |
last post by:
Hi Everyone
I would like to get into software developent using a programming
language like c++, java or pl/sql for oracle.
I have no idea where to start from. Which language is there more...
|
by: nsr93 |
last post by:
I am not sure if this was the proper group to post this, but here is
my question:
I am a Java consultant. I have new client I am working for to make a
web based application similar to an...
|
by: Martijn van Oosterhout |
last post by:
I've had some fun in the past where I've had to grant a lot of tables and
other similar system commands. Unfortunatly, you can't use queries to fill
in fields for you. Anyway, I've implemented a...
|
by: James Fortune |
last post by:
I have a lot of respect for David Fenton and Allen Browne, but I don't
understand why people who know how to write code to completely replace
a front end do not write something that will automate...
|
by: Chad Z. Hower aka Kudzu |
last post by:
A few of you may recognize me from the recent posts I have made about Indy
<http://www.indyproject.org/indy.html>
Those of you coming to .net from the Delphi world know truly how unique and...
|
by: Cheryl Langdon |
last post by:
Hello everyone,
This is my first attempt at getting help in this manner. Please
forgive me if this is an inappropriate request.
I suddenly find myself in urgent need of instruction on how to...
|
by: robinsand |
last post by:
My apologies to those of you who are more advanced Visual C++ .NET
programmers, but I am working on a project for an MBA course that is
condensed into an eight-week schedule, and I need help...
|
by: Bruce W. Darby |
last post by:
This will be my very first VB.Net application and it's pretty simple. But
I've got a snag in my syntax somewhere. Was hoping that someone could point
me in the right direction.
The history:
My...
|
by: mike |
last post by:
I help manage a large web site, one that has over
600 html pages... It's a reference site for ham radio
folks and as an example, one page indexes over
1.8 gb of on-line PDF documents.
The site...
|
by: elgiei |
last post by:
Good morning at all,
i have to implement a server,that every n-seconds (eg. 10sec) sends to
other clients,which files and directory has been deleted or modified.
i build a n-tree, for each...
|
by: emmanuelkatto |
last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud.
Please let me know.
Thanks!
Emmanuel
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new...
| |