RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control

被引:4
|
作者
Wang, Man [1 ]
Mayo, Jean [1 ]
Shene, Ching-Kuang [1 ]
Lake, Thomas [2 ]
Carr, Steve [2 ]
Wang, Chaoli [3 ]
机构
[1] Michigan Technol Univ, Dept Comp Sci, Houghton, MI 49931 USA
[2] Western Michigan Univ, Dept Comp Sci, Kalamazoo, MI 49008 USA
[3] Univ Notre Dame, Dept Comp Sci & Engn, Notre Dame, IN 46556 USA
来源
ITICSE'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION | 2015年
基金
美国国家科学基金会;
关键词
Security; visualization;
D O I
10.1145/2729094.2742627
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents RBACvisual, a user-level visualization tool designed to facilitate the study and teaching of the role-based access control (RBAC) model, which has been widely used in companies to restrict access to authorized users. RBACvisual provides two graphical abstractions of the underlying specification. Policies can be input and modified graphically or using text-based files. Students can use an embedded Query system to answer commonly asked questions and to test their understanding of a given policy. A Practice subsystem is also provided for instructors to assign quizzes to students; the answers can be sent to the instructor via email. We also present the results of an evaluation of RBACvisual within a senior-level course on information security. The student feedback was positive and indicated that RBACvisual helped students understand the model and enhanced the course.
引用
收藏
页码:141 / 146
页数:6
相关论文
共 50 条
  • [1] Role-based access control using neural network
    Chae, SH
    Kim, W
    Kim, DK
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 36 - 40
  • [2] Role-based access control for boxed ambients
    Compagnoni, Adriana
    Gunter, Elsa L.
    Bidinger, Philippe
    THEORETICAL COMPUTER SCIENCE, 2008, 398 (1-3) : 203 - 216
  • [3] Application Research of the CAN on Role-based Access Control
    Qin, Shi-Hong
    Zhao, Qing
    Ge, Zhou
    Li, Huanhuan
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4668 - +
  • [4] A role-based access control model for information mediation
    Yang, L
    Ege, RK
    Ezenwoye, O
    Kharma, Q
    PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 277 - 282
  • [5] Investigation of Access Control for Internet of Things: Service-Level Role-Based Access Control
    Janardhanan, Janani
    Sharbaf, Mehrdad S.
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 1315 - 1319
  • [6] Delta Analysis of Role-Based Access Control Models
    Leitner, Maria
    COMPUTER AIDED SYSTEMS THEORY, PT 1, 2013, 8111 : 507 - 514
  • [7] Severity Level of Permissions in Role-Based Access Control
    Belim, S. V.
    Bogachenko, N. F.
    Kabanov, A. N.
    2018 12TH INTERNATIONAL IEEE SCIENTIFIC AND TECHNICAL CONFERENCE ON DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2018,
  • [8] Role-based access control for vehicular adhoc networks
    Kalinin, Maxim
    Krundyshev, Vasiliy
    Rezedinova, Evgenia
    Zegzhda, Peter
    2018 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2018, : 66 - 70
  • [9] Putting role-based discretionary access control into practice
    Zhang, KJ
    Jin, W
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2691 - 2696
  • [10] Privacy-Aware Role-Based Access Control
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    Brodie, Carolyn
    Karat, Clare-Marie
    Karat, John
    Trombetta, Alberto
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (03)