Abstract. A simple model for method-based authorization is defined and an algorithm is presented for testing in compile-time whether a given database schema violates authorizations. As an underlying model of method execution, we adopt the model proposed by Hull et al.; a database schema consists of a class hierarchy, attribute declarations and method definitions. A method body is simply a sequence of statements. There are three types of statements: an access to an attribute of the self object, a method invocation, and a built-in operation on basic values. Authorizations are represented as a pair of finite sets: AUTH = ¢ AUTHm £ AUTHs ¤ , AUTHm = (¥ 1 £§¦ 1 £ ¥©¨1 £¦ ¨1)£ (¥ 2 £§¦ 2 £ ¥¨2 £¦ ¨2)£ . . . £ (¥© £¦ £ ¥¨ £¦ ¨ )¡ , AUTHs = ( 1 £ ¥ 1 £§¦ 1)£ ( 2 £ ¥ 2 £¦ 2)£ . . . £ (© £ ¥ £§¦ )¡ where © is a subject (user, process), ¥ , ¥ ¨ are classes and ¦ , ¦ ¨ are method names. Given a data...