An internal security method for use with a relational database system is
disclosed. The method is incorporated into a database system such that
there is no need for security coding be layered on top of the system
application software to prevent unauthorized access to restricted
database information. The method of the present invention includes at
least two embodiments and at least one of the embodiments has a "down the
tree view" structure.