skip to main content
10.1145/2729094.2742627acmconferencesArticle/Chapter ViewAbstractPublication PagesiticseConference Proceedingsconference-collections
research-article

RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control

Published: 22 June 2015 Publication History

Abstract

This paper presents RBACvisual, a user-level visualization tool designed to facilitate the study and teaching of the role-based access control (RBAC) model, which has been widely used in companies to restrict access to authorized users. RBACvisual provides two graphical abstractions of the underlying specification. Policies can be input and modified graphically or using text-based files. Students can use an embedded Query system to answer commonly asked questions and to test their understanding of a given policy. A Practice subsystem is also provided for instructors to assign quizzes to students; the answers can be sent to the instructor via email. We also present the results of an evaluation of RBACvisual within a senior-level course on information security. The student feedback was positive and indicated that RBACvisual helped students understand the model and enhanced the course.

References

[1]
J. R. Crandall, S. L. Gerhart, and J. G. Hogle. Driving Home the Buffer Overflow Problem: A Training Module for Programmers and Managers. In Proceedings of National Colloquium for Information Systems Security Education, 2002.
[2]
J. C. F. de Winter. Using the Student's t-test with Extremely Small Sample Sizes. Practical Assessment, Research & Evaluation, 18(10):1--12, 2013.
[3]
D. Ebeling and R. Santos. Public Key Infrastructure Visualization. The Journal of Computing Sciences in Colleges, 23(1):247--254, 2007.
[4]
D. Ferraiolo and R. Kuhn. Role-Based Access Control. In Proceedings of NIST-NCSC National Computer Security Conference, pages 554--563, 1992.
[5]
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST Standard for Role-based Access Control. ACM Transactions on Information and System Security, 4(3):224--274, 2001.
[6]
S. Hallyn and P. Kearns. Tools to Administer Domain and Type Enforcement. In Proceedings of USENIX Conference on System Administration, pages 151--156, 2001.
[7]
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-Based Access Control Models. IEEE Computer, 29(2):38--47, 1996.
[8]
D. Schweitzer and W. Brown. Using Visualization To Teach Security. The Journal of Computing Sciences in Colleges, 24(5):143--150, 2009.
[9]
D. Schweitzer, M. Collins, and L. Baird. A Visual Approach To Teaching Formal Access Models In Security. In Proceedings of National Colloquium for Information Systems Security Education, 2007.
[10]
J. Tao, J. Ma, M. Keranen, J. Mayo, and C.-K. Shene. ECvisual: A Visualization Tool for Elliptic Curve Based Ciphers. In Proceedings of ACM Technical Symposium on Computer Science Education, pages 571--576, 2012.
[11]
J. Tao, J. Ma, J. Mayo, C.-K. Shene, and M. Keranen. DESvisual: A Visualization Tool for the DES Cipher. The Journal of Computing Sciences in Colleges, 27(1):81--89, 2011.

Cited By

View all
  • (2023)Effective Collaboration in the Management of Access Control Policies: A Survey of ToolsIEEE Access10.1109/ACCESS.2023.324286311(13929-13947)Online publication date: 2023
  • (2021)Enhancing Situational Awareness for Tutors of Cybersecurity Capture the Flag Games2021 25th International Conference Information Visualisation (IV)10.1109/IV53921.2021.00045(235-242)Online publication date: Jul-2021
  • (2020)What Are Cybersecurity Education Papers About?Proceedings of the 51st ACM Technical Symposium on Computer Science Education10.1145/3328778.3366816(2-8)Online publication date: 26-Feb-2020
  • Show More Cited By

Index Terms

  1. RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ITiCSE '15: Proceedings of the 2015 ACM Conference on Innovation and Technology in Computer Science Education
      June 2015
      370 pages
      ISBN:9781450334402
      DOI:10.1145/2729094
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 22 June 2015

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. security
      2. visualization

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      ITICSE '15
      Sponsor:

      Acceptance Rates

      ITiCSE '15 Paper Acceptance Rate 54 of 124 submissions, 44%;
      Overall Acceptance Rate 552 of 1,613 submissions, 34%

      Upcoming Conference

      ITiCSE '25
      Innovation and Technology in Computer Science Education
      June 27 - July 2, 2025
      Nijmegen , Netherlands

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)32
      • Downloads (Last 6 weeks)6
      Reflects downloads up to 07 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Effective Collaboration in the Management of Access Control Policies: A Survey of ToolsIEEE Access10.1109/ACCESS.2023.324286311(13929-13947)Online publication date: 2023
      • (2021)Enhancing Situational Awareness for Tutors of Cybersecurity Capture the Flag Games2021 25th International Conference Information Visualisation (IV)10.1109/IV53921.2021.00045(235-242)Online publication date: Jul-2021
      • (2020)What Are Cybersecurity Education Papers About?Proceedings of the 51st ACM Technical Symposium on Computer Science Education10.1145/3328778.3366816(2-8)Online publication date: 26-Feb-2020
      • (2019)Access Control Visualization Using Triangular Matrices2019 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP)10.1109/EMPDP.2019.8671578(348-355)Online publication date: Feb-2019
      • (2018)(Semi)automatic construction of access-controlled web data servicesProceedings of the 28th Annual International Conference on Computer Science and Software Engineering10.5555/3291291.3291300(72-80)Online publication date: 29-Oct-2018
      • (2016)Workshop on teaching modern models of access control hands-onJournal of Computing Sciences in Colleges10.5555/3007225.300723232:1(35-36)Online publication date: 1-Oct-2016

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media