International Journal of Scientific & Engineering Research
In this paper, the authors focus on securing a table in the database, to the row level, implying that not all the rows in a database can be accessed by the end user. A user can access and perform operations on only those rows which he has been assigned right to access. Traditionally, there are various ways and techniques to achieve this. The approach adopted by the user is analogous to the NTFS security and permission model, where every row in the database table corresponds to an NTfs object, i.e. a folder or file. Permissions controlling access are applied to every database object.