how does ULS work to protect the objects in the database? how does ULS code the objects so that they will be protected? What would be the code behind it?
"Since JET is a file based database system where users need physical access to the file to operate on their data, the concept of user level security in Jet to assign different levels of user access to the data within the same file was not recommended. To have multiple people use the database but with different data access privileges, the recommended practice was to move this data to a centralized service like SQL server or SharePoint lists. However, Jet has had this feature for some time and it has worked OK for usability and custom navigation scenarios but isn’t recommended for actual security. "
If security is a must for your tables, then I would not use an Access back end, but an SQL server like Microsoft's SQL Server.