Unlike research carried out to date which mainly integrates existing techniques and approaches (White 1999, Burlesson 1998, Guynes 2000), this research offers an innovative approach on the subject of data security management through the development of a unique access security model. Furthermore, in view of the increasing importance and intensive use of data security management technology, and the special attention paid to the various aspects connected with data security management, this research is of special importance from the theoretic al and applicative points of view.