RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control

被引:4
|
作者
Wang, Man [1 ]
Mayo, Jean [1 ]
Shene, Ching-Kuang [1 ]
Lake, Thomas [2 ]
Carr, Steve [2 ]
Wang, Chaoli [3 ]
机构
[1] Michigan Technol Univ, Dept Comp Sci, Houghton, MI 49931 USA
[2] Western Michigan Univ, Dept Comp Sci, Kalamazoo, MI 49008 USA
[3] Univ Notre Dame, Dept Comp Sci & Engn, Notre Dame, IN 46556 USA
来源
ITICSE'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION | 2015年
基金
美国国家科学基金会;
关键词
Security; visualization;
D O I
10.1145/2729094.2742627
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents RBACvisual, a user-level visualization tool designed to facilitate the study and teaching of the role-based access control (RBAC) model, which has been widely used in companies to restrict access to authorized users. RBACvisual provides two graphical abstractions of the underlying specification. Policies can be input and modified graphically or using text-based files. Students can use an embedded Query system to answer commonly asked questions and to test their understanding of a given policy. A Practice subsystem is also provided for instructors to assign quizzes to students; the answers can be sent to the instructor via email. We also present the results of an evaluation of RBACvisual within a senior-level course on information security. The student feedback was positive and indicated that RBACvisual helped students understand the model and enhanced the course.
引用
收藏
页码:141 / 146
页数:6
相关论文
共 50 条
  • [41] Trust and Risk based Access Control and Access Control Constraints
    Helil, Nurmamat
    Kim, Mucheol
    Han, Sangyong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (11): : 2254 - 2271
  • [42] A Tool for Access Control Policy Validation
    Aqib, Muhammad
    Shaikh, Riaz Ahmed
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (01): : 157 - 166
  • [43] Dynamic Role-Based Access Control Policy for Smart Grid Applications: An Offline Deep Reinforcement Learning Approach
    Fragkos, Georgios
    Johnson, Jay
    Tsiropoulou, Eirini Eleni
    IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS, 2022, 52 (04) : 761 - 773
  • [44] B-ERAC : BLOCKCHAIN-ENABLED ROLE-BASED ACCESS CONTROL FOR SECURE IOT DEVICE COMMUNICATION
    Khan, Neelam Saleem
    Mir, Roohie Naaz
    Chishti, Mohammad Ahsan
    Saleem, Mahreen
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (06): : 5649 - 5671
  • [45] A ROLE BASED ACCESS CONTROL SOLUTION FOR LINUX NETWORK
    Leahu, Marius
    Buzuloil, Vasile
    Stoichescu, Dan Alexandru
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2014, 76 (01): : 89 - 104
  • [46] A Wireless Secure Remote Access Architecture Implementing Role Based Access Control: WiSeR
    Tomur, E.
    Deregozu, R.
    Genc, T.
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 18, 2006, 18 : 58 - 63
  • [47] Securing User Access at IoT Middleware Using Attribute Based Access Control
    Garg, Hittu
    Dave, Mayank
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [48] Integrating a High-Reliability Multicriteria Trust Evaluation Model with Task Role-Based Access Control for Cloud Services
    Alshammari, Salah T.
    Albeshri, Aiiad
    Alsubhi, Khalid
    SYMMETRY-BASEL, 2021, 13 (03):
  • [49] Efficient Policy Analysis for Administrative Role Based Access Control
    Stoller, Scott D.
    Yang, Ping
    Ramakrishnan, C. R.
    Gofman, Mikhail I.
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 445 - +
  • [50] DS RBAC - Dynamic Sessions in Role Based Access Control
    Muehlbacher, Joerg R.
    Praher, Christian
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009, 15 (03) : 538 - 554