How are permissions implemented in MySQL?
encrypted algorithms
user settings
administrator schema
access control lists