The invention comprises a Security Program (SP), a Simultaneous Approval
Program (SAP), an Access Approval Program (AAP), and a Security Table
(ST). A user's ability to access low security and high security
applications depends on the user's security clearance, which is recorded
in the ST. The SP limits a user's access to the applications. When a
plurality of authorized users have logged in, the SP runs the SAP and AAP
as required to allow the users to access and modify the high security
applications. The SAP allows a user to modify the high security
application only when a specified number of users approve the
modification. The AAP allows a user to access a high security application
only upon another user's approval. The SP terminates the users' access to
the high security applications if one of the users logs out.