RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control

被引:4
|
作者
Wang, Man [1 ]
Mayo, Jean [1 ]
Shene, Ching-Kuang [1 ]
Lake, Thomas [2 ]
Carr, Steve [2 ]
Wang, Chaoli [3 ]
机构
[1] Michigan Technol Univ, Dept Comp Sci, Houghton, MI 49931 USA
[2] Western Michigan Univ, Dept Comp Sci, Kalamazoo, MI 49008 USA
[3] Univ Notre Dame, Dept Comp Sci & Engn, Notre Dame, IN 46556 USA
来源
ITICSE'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION | 2015年
基金
美国国家科学基金会;
关键词
Security; visualization;
D O I
10.1145/2729094.2742627
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents RBACvisual, a user-level visualization tool designed to facilitate the study and teaching of the role-based access control (RBAC) model, which has been widely used in companies to restrict access to authorized users. RBACvisual provides two graphical abstractions of the underlying specification. Policies can be input and modified graphically or using text-based files. Students can use an embedded Query system to answer commonly asked questions and to test their understanding of a given policy. A Practice subsystem is also provided for instructors to assign quizzes to students; the answers can be sent to the instructor via email. We also present the results of an evaluation of RBACvisual within a senior-level course on information security. The student feedback was positive and indicated that RBACvisual helped students understand the model and enhanced the course.
引用
收藏
页码:141 / 146
页数:6
相关论文
共 50 条
  • [21] Role-based access control for XML enabled management gateways
    Cridlig, V
    Festor, O
    State, R
    UTILITY COMPUTING, 2004, 3278 : 183 - 195
  • [22] A Secure Network Architecture for Heterogeneous IoT Devices using Role-based Access Control
    Jaikla, Tinthid
    Vorakulpipat, Chalee
    Rattanalerdnusorn, Ekkachan
    Hoang Dang Hai
    2019 27TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2019, : 455 - 459
  • [23] Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service
    Hingwe, Kamlesh Kumar
    Bhanu, S. Mary Saira
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT ICT4SD 2015, VOL 2, 2016, 409 : 437 - 448
  • [24] Reliability of separation of duty in ANSI standard role-based access control
    Esna-Ashari, M.
    Rabiee, H. R.
    Mirian-Hosseinabadi, S. H.
    SCIENTIA IRANICA, 2011, 18 (06) : 1416 - 1424
  • [25] An improved administration method on role-based access control in the enterprise environment
    Oh, S
    Park, S
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2001, 17 (06) : 921 - 944
  • [26] Employing UML and OCL for designing and analysing role-based access control
    Kuhlmann, Mirco
    Sohr, Karsten
    Gogolla, Martin
    MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE, 2013, 23 (04) : 796 - 833
  • [27] A Clark-Wilson and ANSI role-based access control model
    Tsegaye, Tamir
    Flowerday, Stephen
    INFORMATION AND COMPUTER SECURITY, 2020, 28 (03) : 373 - 395
  • [28] An Access Control Model for Resource Sharing Based on the Role-Based Access Control Intended for Multi-Domain Manufacturing Internet of Things
    Liu, Qiang
    Zhang, Hao
    Wan, Jiafu
    Chen, Xin
    IEEE ACCESS, 2017, 5 : 7001 - 7011
  • [29] Reputation-based role assignment for role-based access control in wireless sensor networks
    Misra, Sudip
    Vaish, Ankur
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 281 - 294
  • [30] A collaborative role-based access control for trusted operating systems in distributed environment
    Kim, HC
    Ramakrishna, RS
    Sakurai, K
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (01) : 270 - 279