This document provides an overview of access control and database security. It discusses different access control models including discretionary access control, mandatory access control, role-based access control, and attribute-based access control. It also covers access control elements, functions, and examples of how access control is implemented in UNIX and Windows systems. The document then discusses database security topics like relational databases, SQL, database access controls, and statistical database security and inference problems. It concludes with sections on database encryption and homomorphic encryption.