Which of the following is used in database information security to hide information?

A.
Inheritance
B.
Polyinstantiation
C.
Polymorphism
D.
Delegation
Explanation:
Polyinstantiation represents an environment characterized by information stored in more than one
location in the database. This permits a security model with multiple levels-of-view and
authorization. The current problem with polyinstantiation is ensuring the integrity of the information
in the database. Without an effective method for the simultaneous updating of all occurrences of
the same data element – integrity cannot be guaranteed.