Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2591708.2591730acmconferencesArticle/Chapter ViewAbstractPublication PagesiticseConference Proceedingsconference-collections
research-article

MLSvisual: a visualization tool for teaching access control using multi-level security

Published: 21 June 2014 Publication History

Abstract

Information security continues to be a pressing issue for industry and government. Perhaps the two most fundamental mechanisms for controlling access to information are cryptography and access control systems. This paper presents MLSvisual, a tool that helps students learn the multi-level(Bell-LaPadula) access control model. MLSvisual allows students to create, explore, and modify an MLS policy through a graphical visualization system. A query system can be used by students to test their understanding of a given policy. Instructors can utilize a test function in the tool to assign an exercise or quiz, with answers sent to them via email. We also present the results of an evaluation of MLSvisual within a senior-level course on information security. This evaluation received positive feedback and showed that MLSviusal helped the understanding of the Bell-LaPadula model and enhanced the course. We believe that this user-level tool will help instructors to teach this material more effectively, and make teaching this material more practical in resource-constrained environments.

References

[1]
D. E. Bell and L. J. La Padula. Secure computer systems: Mathematical foundations. Technical Report MTR-2547, Vol 1, The MITRE Corporation, Bedford, MA, Nov. 1973.
[2]
K. J. Biba. Integrity considerations for secure computer systems. MTR-3153, Rev. 1, The MITRE Corporation, Bedford, MA, Apr. 1977.
[3]
W. E. Boebert and R. Y. Kain. A practical alternative to hierarchical integrity policies. In Proceedings of National Computer Security Conference, pages 18--27, Oct. 1985.
[4]
J. R. Crandall, S. L. Gerhart, and J. G. Hogle. Driving home the buffer overflow problem: A training module for programmers and managers. In Proceedings of National Colloquium for Information Systems Security Education, June 2002.
[5]
D. Ebeling and R. Santos. Public key infrastructure visualization. The Journal of Computing Sciences in Colleges, 23(1):247--254, Oct. 2007.
[6]
S. Hallyn and P. Kearns. Tools to administer domain and type enforcement. In Proceedings of USENIX Conference on System Administration, pages 151--156, Dec. 2001.
[7]
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 20(2):38--47, 1996.
[8]
D. Schweitzer and L. Baird. The design and use of interactive visualization applets for teaching ciphers. In Proceedings of IEEE Workshop on Information Assurance, pages 69--75, 2006.
[9]
D. Schweitzer, L. Baird, M. Collins, W. Brown, and M. Sherman. Grasp: A visualization tool for teaching security protocols. In Proceedings of National Colloquium for Information Systems Security Education, pages 75--81, 2006.
[10]
D. Schweitzer and W. Brown. Using visualization to teach security. The Journal of Computing Sciences in Colleges, 24(5):143--150, 2009.
[11]
D. Schweitzer, M. Collins, and L. Baird. A visual approach to teaching formal access models in security. In Proceedings of National Colloquium for Information Systems Security Education, 2007.
[12]
J. Tao, J. Ma, M. Keranen, J. Mayo, and C.-K. Shene. ECvisual: A Visualization Tool for Elliptic Curve Based Ciphers. In Proceedings of ACM Technical Symposium on Computer Science Education, pages 571--576, 2012.
[13]
J. Tao, J. Ma, J. Mayo, C.-K. Shene, and M. Keranen. DESvisual: A Visualization Tool for the DES Cipher. The Journal of Computing Sciences in Colleges, 27(1):81--89, 2011.
[14]
X. Yuan, Y. Qadah, J. Xu, H. Yu, R. Archer, and B. Chu. An animated learning tool for kerberos authentication architecture. The Journal of Computing Sciences in Colleges, 22(6):147--155, 2007.

Cited By

View all
  • (2023)Interactive Graphical Access Control Tools2023 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)10.1109/VL-HCC57772.2023.00046(255-259)Online publication date: 3-Oct-2023
  • (2023)Effective Collaboration in the Management of Access Control Policies: A Survey of ToolsIEEE Access10.1109/ACCESS.2023.324286311(13929-13947)Online publication date: 2023
  • (2022)Design and Use of a Visualization for Teaching Integer CoercionProceedings of the 53rd ACM Technical Symposium on Computer Science Education - Volume 110.1145/3478431.3499278(794-800)Online publication date: 22-Feb-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ITiCSE '14: Proceedings of the 2014 conference on Innovation & technology in computer science education
June 2014
378 pages
ISBN:9781450328333
DOI:10.1145/2591708
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 June 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. security
  2. visualization

Qualifiers

  • Research-article

Funding Sources

Conference

ITICSE '14
Sponsor:

Acceptance Rates

ITiCSE '14 Paper Acceptance Rate 36 of 164 submissions, 22%;
Overall Acceptance Rate 552 of 1,613 submissions, 34%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Interactive Graphical Access Control Tools2023 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)10.1109/VL-HCC57772.2023.00046(255-259)Online publication date: 3-Oct-2023
  • (2023)Effective Collaboration in the Management of Access Control Policies: A Survey of ToolsIEEE Access10.1109/ACCESS.2023.324286311(13929-13947)Online publication date: 2023
  • (2022)Design and Use of a Visualization for Teaching Integer CoercionProceedings of the 53rd ACM Technical Symposium on Computer Science Education - Volume 110.1145/3478431.3499278(794-800)Online publication date: 22-Feb-2022
  • (2021)Enhancing Situational Awareness for Tutors of Cybersecurity Capture the Flag Games2021 25th International Conference Information Visualisation (IV)10.1109/IV53921.2021.00045(235-242)Online publication date: Jul-2021
  • (2020)A System for Visualizing the Process Address Space in the Context of Teaching Secure Coding in CProceedings of the 51st ACM Technical Symposium on Computer Science Education10.1145/3328778.3366894(1033-1039)Online publication date: 26-Feb-2020
  • (2020)What Are Cybersecurity Education Papers About?Proceedings of the 51st ACM Technical Symposium on Computer Science Education10.1145/3328778.3366816(2-8)Online publication date: 26-Feb-2020
  • (2019)Teaching Integer Security Using Simple VisualizationsProceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education10.1145/3304221.3319760(513-519)Online publication date: 2-Jul-2019
  • (2016)Workshop on teaching modern models of access control hands-onJournal of Computing Sciences in Colleges10.5555/3007225.300723232:1(35-36)Online publication date: 1-Oct-2016

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media