Role-based Access Control


Steven Carr (

Thomas Lake (

Jean Mayo (

Ching-Kuang Shene (

Chaoli Wang (

Mandy Wang (


The RBAC model is widely used to restrict system access to authorized users and it can be utilized not only for the implementation of mandatory access control but also for discretionary access control. RBACvisual leverages the advantages of visualization and illustrates the user-to-role and role-to-object relationship combined with the role inheritance hierarchy through graphs. The visualization allows the analysis of an access control specification file with two different views and the modification of the specification via textual input and graphical operations. A Test module is provided for self-evaluation and class quizzes. The system runs at the user-level and is not tied to the underlying file system. Linux and MacOS version are currently maintained.


The program can be run by either double clicking the RBACvisual binary or running it in terminal. The lab machines on the first floor are able to run the Linux 64-bit version. But if you would like to run the program on your own machine, the Qt libraries need to be installed. You may find the download at: Clicking on the green Show Downloads button at the bottom and Qt Library 4.8 is the one to download.

Man Wang, Jean Mayo, Ching-Kuang Shene, Thomas Lake, Steve Carr and Chaoli Wang, RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control. (Annual Conference on Innovation and Technology in Computer Science Education, 2014)