
Appendix B ◾ 381
then several variations of access control policies have been reported. Other discre-
tionary policies include administration policies. We also discuss identification and
authentication under discretionary policies. Note that much of the discussion in
this section focuses on discretionary security in relational database systems.
e organization of this section is as follows. In Section B.3.2 we provide an
overview of access control policies. Administration policies are discussed in Section
B.3.3. Issues on identification and authentication are discussed in Section B.3.4.
Auditing a database management system is discussed in Sect