Please use this identifier to cite or link to this item: http://hdl.handle.net/2381/32266
Title: Observing access control policies using scrabble games
Authors: Ahmad, S.
Abidin, S. Z. Z.
Omar, N.
Reiff-Marganiec, Stephan
First Published: 12-Dec-2014
Presented at: 2014 IEEE Conference on e-Learning, e-Management and e-Services (IC3e), Hawthorn, Australia
Start Date: 10-Dec-2014
End Date: 12-Dec-2014
Publisher: IEEE
Abstract: Access control is concerned with the policies that manage data sharing activities. Access control plays a crucial role in application areas such as education, health and business. However, most programming languages and programming environments do not naturally provide support for implementing access control policies requiring access control policies for systems to be coded as part of the development effort. Access control management policies are high-level features so having to involve a computer programmer during deployment stages for making changes to policies is costly. In this paper, we present an abstraction of access control management policies in the form of extended scrabble in its rules. The needs of access control policies program construct for supporting this game are examined. New relevant program constructs are then incorporated into JACIE (Java-based Authoring language for Collaborative Interactive Environments). The usefulness of these program construct are being demonstrated through the extended scrabble.
DOI Link: 10.1109/IC3e.2014.7081256
ISBN: 978-1-4799-7177-0
Links: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7081256
http://hdl.handle.net/2381/32266
Version: Post-print
Status: Peer-reviewed
Type: Conference Paper
Rights: Archived with reference to SHERPA/RoMEO and publisher website. © 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Appears in Collections:Conference Papers & Presentations, Dept. of Computer Science

Files in This Item:
File Description SizeFormat 
72.IC3e-Observing Access Control.pdfPost-review (final submitted)473.83 kBAdobe PDFView/Open


Items in LRA are protected by copyright, with all rights reserved, unless otherwise indicated.