Access control methods provide multilevel and mandatory access control for
a database management system. The access control techniques provide
access control at the row level in a relational database table. The
database table contains a security label column within which is recorded
a security label that is defined within a hierarchical security scheme. A
user's security label is encoded with security information concerning the
user. When a user requests access to a row, a security mechanism compares
the user's security information with the security information in the row.
If the user's security dominates the row's security, the user is given
access to the row.