! 

Term Projects

 

Project ideas.
Term projects from previous years
Instructions for submitting project proposals.
Related Links
Project Report Assessment Criteria

General information

Your term paper should address a problem related to computer security and can be of oen fo the following types:

of a design of some computer security system or technique, or an analysis and possible improvement of some existing system or technique. The main goal of the project is to do original work on a problem of interest in computer security.

Group Formation Rules

  1. You should work in a small group of 1-2 students. If you have trouble finding project partners please use the term project discussion topic on the course discussion forum to find students seeking teammates.
  2. Each group could have no more than one graduate student.
  3. Graduate students, if they want, can do their term projects individually. However, they should do all group assignments in groups formed according to the above rules.

Evaluation of the Team Members

Contribution of each student to the group assignments and term project will be evaluated by the other team members via iPeer.

Types of Papers

Projects will be evaluated on the quality of the idea originality and the implementation of the idea. At the end of the semester, your group will write a report in the style of conference paper on your work.

Any project must be in either one of these two categories:

1. Design papers attempt to solve some interesting problem by proposing a design; implementing a prototype; and using the implementation as a basis for evaluating the proposed system architecture. In a good design project, the authors have:

  • attacked a significant problem
  • devised an interesting and practical solution
  • clearly described what they have and have not implemented
  • demonstrated the benefits of their solution
  • articulated the advances beyond previous work
  • drawn appropriate conclusions

Template containing instructions for design project report


2. Analysis papers might, for example, study some previously-proposed implementation technique, existing system, or class of systems; evaluate its security properties; find flaws, or strengths, in it; and provide new insight into how to build secure systems.

Please follow this structure and content for each section of the analysis papeprs.

Template containing instructions for analysis project report

 

3. Survey Papers

Instructions for survey paper structure and content.

 

 

Project Topics

The topic should be relevant to computer security, but this will be interpreted broadly. You are encouraged to find topics of interest to you; feel free to be creative in selecting a paper topic. You're welcome to pick a topic that is connected to your current research: for instance, if your primary research interest is in digital libraries, you would be welcome to do a term project on some aspect of security, cryptography, or privacy in digital libraries.

 

Instructions for paper proposals.

Hints For Writing Your Project Report and Giving Your Talk at the End of the Course


Copyright © 2003-2007 Konstantin Beznosov