An access control system and access control methods provide multilevel and
mandatory access control for a database management system. The access
control techniques provide access control at the row level in a
relational database table. The database table contains a security label
column within which is recorded a security label that is defined within a
hierarchical security scheme. A user's security label is encoded with
security information concerning the user. When a user requests access to
a row, a security mechanism compares the user's security information with
the security information in the row. If the user's security dominates the
row's security, the user is given access to the row.