I think i can be the best candidate as i have knownledge of access control protocols
1. Traditional AC models: i will make a review of the four access control models, MAC (mandatory access control), RBAC (role based access control), DAC (Discretionary Access Control)
2. New AC models: RBAC or RB-RBAC (Rule Based Access Control) and UCON (usage control model)
3. SPKI: simple public key infraestructure
4. Digital Rights Management
5. Unix Security and It's Implementation: the unix file system uses DAC
6. Windows Security and Their Implementation: windows uses DAC and ACE access control entries)
7. Databases Security and Privacy Policy: it uses RBAC.