Roles in learning systems

This paper discusses that Role-Based Management (RBM) is applied in a Web-based teaching system. A user may have multiple roles. A role may be given to multiple users. Different roles have different privileges. From the implementation, it is found that roles are good mechanisms in designing a learning system.

[1]  Gail-Joon Ahn,et al.  Role-based authorization constraints specification , 2000, TSEC.

[2]  Gail-Joon Ahn,et al.  Authorization management for role-based collaboration , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[3]  David R. Kuhn,et al.  Role-Based Access Control (RBAC): Features and Motivations | NIST , 1995 .

[4]  Mustaque Ahamad,et al.  Generalized Role-Based Access Control for Securing Future Applications , 2000 .

[5]  Song Zhi-gang Role Based Access Control in MIS , 2002 .

[6]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[7]  MengChu Zhou,et al.  Role-based collaboration and its kernel mechanisms , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[8]  Gu Jian RBAC Based Privilege Management Infrastructure , 2004 .

[9]  Haibin Zhu,et al.  Role mechanisms in collaborative systems , 2006 .

[10]  George Loizou,et al.  Administrative scope: A foundation for role-based administrative models , 2003, TSEC.

[11]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[12]  D. Richard Kuhn,et al.  Role-Based Access Control ( RBAC ) : Features and Motivations , 2014 .