RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control

被引:4
|
作者
Wang, Man [1 ]
Mayo, Jean [1 ]
Shene, Ching-Kuang [1 ]
Lake, Thomas [2 ]
Carr, Steve [2 ]
Wang, Chaoli [3 ]
机构
[1] Michigan Technol Univ, Dept Comp Sci, Houghton, MI 49931 USA
[2] Western Michigan Univ, Dept Comp Sci, Kalamazoo, MI 49008 USA
[3] Univ Notre Dame, Dept Comp Sci & Engn, Notre Dame, IN 46556 USA
基金
美国国家科学基金会;
关键词
Security; visualization;
D O I
10.1145/2729094.2742627
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents RBACvisual, a user-level visualization tool designed to facilitate the study and teaching of the role-based access control (RBAC) model, which has been widely used in companies to restrict access to authorized users. RBACvisual provides two graphical abstractions of the underlying specification. Policies can be input and modified graphically or using text-based files. Students can use an embedded Query system to answer commonly asked questions and to test their understanding of a given policy. A Practice subsystem is also provided for instructors to assign quizzes to students; the answers can be sent to the instructor via email. We also present the results of an evaluation of RBACvisual within a senior-level course on information security. The student feedback was positive and indicated that RBACvisual helped students understand the model and enhanced the course.
引用
收藏
页码:141 / 146
页数:6
相关论文
共 50 条
  • [21] Role delegation in role-based access control
    Na, SangYeob
    Cheon, SuhHyun
    Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44
  • [22] Data access control in virtual organisations - Role-Based Access Control patterns
    Bertok, P
    Kodituwakku, SR
    DIGITAL ENTERPRISE CHALLENGES: LIFE-CYCLE APPROACH TO MANAGEMENT AND PRODUCTION, 2002, 77 : 394 - 405
  • [23] An attributable role-based access control for healthcare
    Schwartmann, D
    COMPUTATIONAL SCIENCE - ICCS 2004, PROCEEDINGS, 2004, 3039 : 1148 - 1155
  • [24] Role-based access control on the web using Java']Java™
    Giuri, L
    FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 11 - 18
  • [25] Role-based access control in TOBIAS and NESS
    Marshall, LF
    IEE PROCEEDINGS-SOFTWARE, 2006, 153 (01): : 4 - 6
  • [26] Role-based access control for boxed ambients
    Compagnoni, Adriana
    Gunter, Elsa L.
    Bidinger, Philippe
    THEORETICAL COMPUTER SCIENCE, 2008, 398 (1-3) : 203 - 216
  • [27] Rights management for role-based access control
    Bouwman, Bart
    Mauw, Sjouke
    Petkovic, Milan
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1085 - +
  • [28] Role-based access control consistency validation
    Centonze, Paolina
    Naumovich, Gleb
    Fink, Stephen J.
    Pistoia, Marco
    Proc. Int. Symp. Softw. Test. Anal. ISSTA, (121-131):
  • [29] Access Control in XML Repositories Using a Role-Based Approach
    Chen, Shihn-Yuarn
    Ke, Hao-Ren
    Tsai, Wen-Nung
    Yang, Wei-Pang
    JOURNAL OF INTERNET TECHNOLOGY, 2010, 11 (07): : 1041 - 1056
  • [30] Role-Based Access Control Implementation Using Prime Numbers
    Sahafizadeh, Ebrahim
    Sartoly, Sara
    Chamkoori, Alireza
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 1, PROCEEDINGS, 2009, : 234 - +