RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control

被引:4
|
作者
Wang, Man [1 ]
Mayo, Jean [1 ]
Shene, Ching-Kuang [1 ]
Lake, Thomas [2 ]
Carr, Steve [2 ]
Wang, Chaoli [3 ]
机构
[1] Michigan Technol Univ, Dept Comp Sci, Houghton, MI 49931 USA
[2] Western Michigan Univ, Dept Comp Sci, Kalamazoo, MI 49008 USA
[3] Univ Notre Dame, Dept Comp Sci & Engn, Notre Dame, IN 46556 USA
来源
ITICSE'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION | 2015年
基金
美国国家科学基金会;
关键词
Security; visualization;
D O I
10.1145/2729094.2742627
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents RBACvisual, a user-level visualization tool designed to facilitate the study and teaching of the role-based access control (RBAC) model, which has been widely used in companies to restrict access to authorized users. RBACvisual provides two graphical abstractions of the underlying specification. Policies can be input and modified graphically or using text-based files. Students can use an embedded Query system to answer commonly asked questions and to test their understanding of a given policy. A Practice subsystem is also provided for instructors to assign quizzes to students; the answers can be sent to the instructor via email. We also present the results of an evaluation of RBACvisual within a senior-level course on information security. The student feedback was positive and indicated that RBACvisual helped students understand the model and enhanced the course.
引用
收藏
页码:141 / 146
页数:6
相关论文
共 50 条
  • [31] Role-Based Access Control Model as Applied to Object-Oriented Applications
    Oleynik, Pavel P.
    2016 DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2016,
  • [32] On the formalization and analysis of a spatio-temporal role-based access control model
    Toahchoodee, Manachai
    Ray, Indrakshi
    JOURNAL OF COMPUTER SECURITY, 2011, 19 (03) : 399 - 452
  • [33] A legal information flow (LIF) scheduler based on role-based access control model
    Enokido, Tomoya
    Barolli, Valbona
    Takizawa, Makoto
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 906 - 912
  • [34] An Optimized Role-Based Access Control Using Trust Mechanism in E-Health Cloud Environment
    Butt, Ateeq Ur Rehman
    Mahmood, Tariq
    Saba, Tanzila
    Bahaj, Saeed Ali Omer
    Alamri, Faten S.
    Iqbal, Muhammad Waseem
    Khan, Amjad R.
    IEEE ACCESS, 2023, 11 : 138813 - 138826
  • [35] A context, rule and role-based access control model in enterprise pervasive computing environment
    Huang, Xianzhi
    Wang, Haiyang
    Chen, Zhenxiang
    Lin, Jinjiao
    2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 497 - +
  • [36] Efficient and Flexible Role-Based Access Control (EF-RBAC) Mechanism for Cloud
    Harnal, Shilpi
    Chauhan, R. K.
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2020, 7 (26) : 1 - 10
  • [37] Hierarchical Role-Based Access Control for Multi-User Collaborative CAD Environment
    Teng C.-C.
    Mensah F.N.
    Ekstrom J.
    Helps R.
    Jensen C.G.
    Teng, Chia-Chi (ccteng@byu.edu), 1600, Bellwether Publishing, Ltd. (13) : 397 - 408
  • [38] Evaluation of an Enhanced Role-Based Access Control model to manage information access in collaborative processes for a statewide clinical education program
    Le, Xuan Hung
    Doll, Terry
    Barbosu, Monica
    Luque, Amneris
    Wang, Dongwen
    JOURNAL OF BIOMEDICAL INFORMATICS, 2014, 50 : 184 - 195
  • [39] Role-Based Integrated Access Control and Data Provenance for SOA Based Net-Centric Systems
    She, Wei
    Zhu, Wei
    Yen, I-Ling
    Bastani, Farokh
    Thuraisingham, Bhavani
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2016, 9 (06) : 940 - 953
  • [40] Embedding role-based access control model in object-oriented systems to protect privacy
    Chou, SC
    JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 71 (1-2) : 143 - 161