CS 590U

Access Control: Theory and Practice

Spring 2005


  • Tuesday and Thursday  3pm to 4:15pm
  • REC 103



List of Course Project Topics

Course Mailing List:

  • CS590U_Spring2005 at cs


Each student will conduct a semester-long course project. See the project page for a list of project topics.  Students are also welcome to come up with project ideas.  A project will consist of the following activities.  Grade for the project will be 50% of the grade for the course.

  • Pre-proposal
    It should be about half a page to a page, listing two or three projects you find most interesting. Describe why you find them interesting and related backgrounds you have. If you want to propose another project idea, you should do so using the pre-proposal. Describe the objectives and the plan, and give a list of references.
  • Proposal for the project
    The proposal should include survey of the literature. Detailed description of the plan.
  • Final presentation for the project (During the last three lectures of the class)

  • Final report for the project (Due at the end of the class)

There will be several homework assignments.  The assignments may include problems to be solved, ask you to read a paper and answer questions based on the paper, or ask you to write reviews for papers.  Homeworks will be 40% of the grade.  And classroom participation will be 10% of the grade.

There won't be any exam.

General Info:

This course is for graduate students in Computer Sciences and ECE.  Undergraduate students interested in taking the course should contact the instructor.  In addition to covering established results in this area, we will also investigate the state of art of access control theory and techniques both in research literature and in commercial systems.

The goals of this course are the following.  

  • Give students a systematic and in depth understanding of access control theory and techniques.  The focus of this course is not on giving a listing of the various models and techniques developed for access control, but rather on understanding the effectiveness and limitation of these models and techniques.  While examining research results, we ask the following questions: What are the problems this piece of work tries to solve?  To what extent does it solve the problems?  Are these the right problems to solve?  How could this result be used in practice?  What other problems can be asked?  While examining existing systems, we ask similar questions about the access control features in these systems. 

  • Give students (especially beginning graduate students) some exposure to research activities such as literature research, independent thinking and analysis, interacting with the instructor and peer students, and organizing and presenting materials and results.

  • Help interested students develop long term research interests in this area.


  • Information security: minimum one (graduate or undergraduate) course on security/cryptography required, e.g., any of CS426, CS555, CS526.
  • Theory of computation and algorithms: CS381 or equivalent and CS483 or equivalent. 
  • Database systems: an undergraduate database course (e.g. CS448 or equivalent) highly recommended. 

    Please contact the instructor if there is any question about prerequisites. 

Relationship with CS 526

  • This course do not require CS 526 as a prerequisite.  As a result, about 10% of the contents in this course overlap with that in CS 526.