RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control

被引:4
|
作者
Wang, Man [1 ]
Mayo, Jean [1 ]
Shene, Ching-Kuang [1 ]
Lake, Thomas [2 ]
Carr, Steve [2 ]
Wang, Chaoli [3 ]
机构
[1] Michigan Technol Univ, Dept Comp Sci, Houghton, MI 49931 USA
[2] Western Michigan Univ, Dept Comp Sci, Kalamazoo, MI 49008 USA
[3] Univ Notre Dame, Dept Comp Sci & Engn, Notre Dame, IN 46556 USA
来源
ITICSE'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION | 2015年
基金
美国国家科学基金会;
关键词
Security; visualization;
D O I
10.1145/2729094.2742627
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents RBACvisual, a user-level visualization tool designed to facilitate the study and teaching of the role-based access control (RBAC) model, which has been widely used in companies to restrict access to authorized users. RBACvisual provides two graphical abstractions of the underlying specification. Policies can be input and modified graphically or using text-based files. Students can use an embedded Query system to answer commonly asked questions and to test their understanding of a given policy. A Practice subsystem is also provided for instructors to assign quizzes to students; the answers can be sent to the instructor via email. We also present the results of an evaluation of RBACvisual within a senior-level course on information security. The student feedback was positive and indicated that RBACvisual helped students understand the model and enhanced the course.
引用
收藏
页码:141 / 146
页数:6
相关论文
共 50 条
  • [11] Handling Role-based Access Control in the Digital Grid
    Fries, Steffen
    Falk, Rainer
    Bisale, Chaitanya
    SEVENTH INTERNATIONAL CONFERENCE ON SMART GRIDS, GREEN COMMUNICATIONS AND IT ENERGY-AWARE TECHNOLOGIES (ENERGY 2017), 2017, : 27 - 32
  • [12] Universally Composable Cryptographic Role-Based Access Control
    Liu, Bin
    Warinschi, Bogdan
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 61 - 80
  • [13] User authentication using Blockchain based smart contract in role-based access control
    Kamboj, Priyanka
    Khare, Shivang
    Pal, Sujata
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) : 2961 - 2976
  • [14] User authentication using Blockchain based smart contract in role-based access control
    Priyanka Kamboj
    Shivang Khare
    Sujata Pal
    Peer-to-Peer Networking and Applications, 2021, 14 : 2961 - 2976
  • [15] Parameterized Role-Based Access Control Policies for XML Documents
    Mueldner, Tomasz
    Leighton, Gregory
    Miziolek, Jan Krzysztof
    INFORMATION SECURITY JOURNAL, 2009, 18 (06): : 282 - 296
  • [16] A Novel Role-based Access Control Model in Cloud Environments
    Luo, Jun
    Wang, Hongjun
    Gong, Xun
    Li, Tianrui
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2016, 9 (01) : 1 - 9
  • [17] On Automated Role-Based Access Control Assessment in Enterprise Systems
    Walker, Andrew
    Svacina, Jan
    Simmons, Johnathan
    Cerny, Tomas
    INFORMATION SCIENCE AND APPLICATIONS, 2020, 621 : 375 - 385
  • [18] Role-based Access Control Model in Home Network Environments
    Kim, Do-Woo
    Kim, Geon Woo
    Lee, Jun-Ho
    Han, Jong-Wook
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 8, 2005, 8 : 97 - 99
  • [19] A Novel Role-based Access Control Model in Cloud Environments
    Jun Luo
    Hongjun Wang
    Xun Gong
    Tianrui Li
    International Journal of Computational Intelligence Systems, 2016, 9 : 1 - 9
  • [20] Role-based access control for CORBA distributed object systems
    Obelheiro, RR
    Fraga, JS
    PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS, 2002, : 53 - 60