Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Goals: 1. To become better acquainted with Role Based Access Control (RBAC) 2. To understand the benefits and drawbacks of using RBAC 3. To understand

image text in transcribedimage text in transcribedimage text in transcribed

Goals: 1. To become better acquainted with Role Based Access Control (RBAC) 2. To understand the benefits and drawbacks of using RBAC 3. To understand the challenges involved in implementing RBAC enforcement mechanisms 4. To develop appreciation for the RBAC model and its numerous applications. Overview In this assignment you will develop a mechanism for enforcing RBAC policies. When launched your program shall read and parse the following two files: 1. user-role assignment (URA) file: stores user-role assignments. 2. permission-role assignment (PRA) file: stores permission-role assignments The program then displays login prompt login Next, the user enters his/her username and presses . The program then checks if the user is present in the URA file (based on the parsed information). If not so, then the program reports an error and re-displays the prompt: login: hernan ERROR: user hernan is not in the database! login Otherwise, the program logs the user in, and displays the command prompt login: hernan Welcome hernan! cmd> From here, the user may issue commands of the form . For example: cmd> read GradeBook After the user presses , the program then determines to what roles the user e.g. hernan is assigned to (i.e. based on the parsed information from the URA file), and checks whether any of these roles have the permission in question e.g. read GradeBook i.e. based on the PRA file). If not so, then the program displays an error: cmd> view GradeBook Access denied: you are not authorized to perform this action! cmd> Otherwise, the program prints Access granted by virtue of roles: signed to the logged in user that authorize the action: and the roles as- view CourseSyllabus Access granted by virtue of roles: Professor Lecturer In the above example user hernan is assigned to roles Professor and Lecturer which have per mission view CourseSyllabus Technical Details URA file shall be named URA.txt and shall have the following format Krole1 For example: Student view GradeBook clown throw Pies Student register Course Professor modify Gradebook Professor view CourseSyllabus Lecturer view CourseSyllabus Both files shall be read automatically by the program when started. Coding Tips If you are using C++, you may want to use the multimap data structure supplied by C++ Standard Template Library (STL), in order to implement associations between users and roles, and roles and permissions. Please see the sample file multimap.cpp on Titanium Goals: 1. To become better acquainted with Role Based Access Control (RBAC) 2. To understand the benefits and drawbacks of using RBAC 3. To understand the challenges involved in implementing RBAC enforcement mechanisms 4. To develop appreciation for the RBAC model and its numerous applications. Overview In this assignment you will develop a mechanism for enforcing RBAC policies. When launched your program shall read and parse the following two files: 1. user-role assignment (URA) file: stores user-role assignments. 2. permission-role assignment (PRA) file: stores permission-role assignments The program then displays login prompt login Next, the user enters his/her username and presses . The program then checks if the user is present in the URA file (based on the parsed information). If not so, then the program reports an error and re-displays the prompt: login: hernan ERROR: user hernan is not in the database! login Otherwise, the program logs the user in, and displays the command prompt login: hernan Welcome hernan! cmd> From here, the user may issue commands of the form . For example: cmd> read GradeBook After the user presses , the program then determines to what roles the user e.g. hernan is assigned to (i.e. based on the parsed information from the URA file), and checks whether any of these roles have the permission in question e.g. read GradeBook i.e. based on the PRA file). If not so, then the program displays an error: cmd> view GradeBook Access denied: you are not authorized to perform this action! cmd> Otherwise, the program prints Access granted by virtue of roles: signed to the logged in user that authorize the action: and the roles as- view CourseSyllabus Access granted by virtue of roles: Professor Lecturer In the above example user hernan is assigned to roles Professor and Lecturer which have per mission view CourseSyllabus Technical Details URA file shall be named URA.txt and shall have the following format Krole1 For example: Student view GradeBook clown throw Pies Student register Course Professor modify Gradebook Professor view CourseSyllabus Lecturer view CourseSyllabus Both files shall be read automatically by the program when started. Coding Tips If you are using C++, you may want to use the multimap data structure supplied by C++ Standard Template Library (STL), in order to implement associations between users and roles, and roles and permissions. Please see the sample file multimap.cpp on Titanium

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Machine Learning And Knowledge Discovery In Databases European Conference Ecml Pkdd 2016 Riva Del Garda Italy September 19 23 2016 Proceedings Part 3 Lnai 9853

Authors: Bettina Berendt ,Bjorn Bringmann ,Elisa Fromont ,Gemma Garriga ,Pauli Miettinen ,Nikolaj Tatti ,Volker Tresp

1st Edition

3319461303, 978-3319461304

More Books

Students also viewed these Databases questions

Question

Explain how the output from infinite loading is used.

Answered: 1 week ago

Question

What are the stages of project management? Write it in items.

Answered: 1 week ago