A security scheme method and system for authorizing users to access and
read data within a table, while only being able to modify selected data
rows based on the user's authorities set by a composite of authorities
within security tables of the system. Therein, a user of the invention is
allowed to retrieve any data from a table while the security scheme
limits that data the user is allowed to modify by setting the limit rules
within these security tables. These limit rules may simultaneously
monitor a plurality of field names existing within selected tables. The
security scheme also enables the security tables to automatically open
and close access to tables or quads by the security scheme setting flags
before, during, after, or combinations thereof, the running of a session
for loading tables.