0 we suggest a method of controlling the access to a secure database via quorum systems