The LDV Approach to Database Security