Question

In: Computer Science

Design a role-based access control system. Thank you. Will leave a great rating A course registration...

Design a role-based access control system. Thank you. Will leave a great rating

A course registration system is a computer system used by the university's administration to plan courses, for students to register for courses, and for faculty to grade them.

Students and faculty can only enroll or teach a class if they have been recorded in the registration system. Students are entered into the system by and Admissions representatives; faculty members by a Human Resources employee. For all persons, their university ID number, last name, first name, date of birth, and username is recorded. Usernames must be unique (no username may be allocated to more than one person at a time).

Before students can enroll for a course, the course needs to be created. Each course is identified by a course number (up to 7 characters), a course name, credits awarded, and a cap. The cap represents the largest number of students that should be enrolled in the course, and must be greater than zero. Courses are created by faculty.

When the university's administration decides to offer a course, a department chair create a course section. Department chairs are faculty members who have been given additional duties. The course section always refers to a single course, and has a course section identifier (3 characters) and a term in which it is offered. The faculty member who is assigned to teach the course is also recorded with the section.

When students start enrolling for a course, they must search for available sections and choose one. Students may only register once for each course in a given term, but if a course is offered in multiple section, the system must be able to track which students are enrolled in each section.

Faculty can grade courses. Each student can only receive one grade for each term in which they take a course. When grades are recorded, the registration system must record who issued the grade, and when it was issued. The database must enforce that only valid grades can be assigned. Valid grades include F (fail), D- through A+, and I (incomplete).

The Registrar's Office can create transcripts of grades. Faculty advisers can inspect transcripts and enrollments for student advising.

Assignment

Design a role-based access control system to support this case study. Clearly identify roles, role hierarchies, and permissions.

Your solution must have

-A schematic of the role-hierarchy

-A tabular explanation of each role, and the permissions it has.

Solutions

Expert Solution

Abovie is the role based access schema for the system

Schematic representation of role hiearchy below

Roles and thier permission
University Administration creates course registration
Course registration create subroles,
HR recruits faculty
Admission representative admit students
Student select course
Faculty inspect transcript
Course
Course section selects course
Department chairs creates course section
Database enforce grades
Grade
Transcript
Register office creates transcript

Related Solutions

Consider a multi-user system running a database server, with a role-based access control (RBAC) system. One...
Consider a multi-user system running a database server, with a role-based access control (RBAC) system. One role in this system is Database Developer, for those responsible for creating and populating new databases and database applications. A second role is Database Administrator, responsible for managing the configuration of the database server and database user accounts. Make two lists, one for each of these two roles, with names of permissions that might be assigned to each role. Be as specific as possible....
Role-based access control (RBAC), an accepted model for access control in enterprise environments, may provide the...
Role-based access control (RBAC), an accepted model for access control in enterprise environments, may provide the means for conditions effectively restrict access based on rules and prerequisite conditions. However, there may be weaknesses in this approach. Provide strengths and weaknesses of role-based access control use in any size organization of your choice.
Can you please do this in C asap. Promise to leave a awesome rating! Thank you...
Can you please do this in C asap. Promise to leave a awesome rating! Thank you in advance. Question and template below Instructions- LINKED LIST In C 'objects' => structs (struct - collection of data, not methods) Linked List Collection of objects which are all connected to each other Each Object 'points' to the next item in the list Node (struct) ' O ' - data - nextNode Our linked list will store data(structs containing integers) in order from smallest...
can you explain 5d and 5e, thank you, I will leave a good rating! 5d. In...
can you explain 5d and 5e, thank you, I will leave a good rating! 5d. In a comparative study of two new drugs, A and B, 300 patients were treated with drug A, and 275 patients were treated with drug B. (The two treatment groups were randomly and independently chosen.) It was found that 222 patients were cured using drug A and 217 patients were cured using drug B. Let p1 be the proportion of the population of all patients...
HELLO CAN YOU PLEASE DO THIS JAVA PROGRAM I WILL LEAVE AWESOME RATING. THANK YOU IN...
HELLO CAN YOU PLEASE DO THIS JAVA PROGRAM I WILL LEAVE AWESOME RATING. THANK YOU IN ADVANCE. QUESTION Suppose you are designing a game called King of the Stacks. The rules of the game are as follows:  The game is played with two (2) players.  There are three (3) different Stacks in the game.  Each turn, a player pushes a disk on top of exactly one of the three Stacks. Players alternate turns throughout the game. Each...
You are asked to design a relational database for a simple course registration software application for...
You are asked to design a relational database for a simple course registration software application for your school. The relational database must have the following information about the student, the course, and the registration, respectively StudentID, FirstName, LastName, DataOfJoining, and Major CourseNumber, CourseName,InstructorName, StartDate, EndDate, NumberOfCredits ReferenceID, StudentID,CourseID, DateOfRegistration Apply the following constrains while designing the database Each student in the database must be uniquely identifiable Each course listed in the database must be have unique CourseNumber Each course registration...
Create a description of a university course registration system. You should include features for students, faculty,...
Create a description of a university course registration system. You should include features for students, faculty, and administrators. For example, students need to use the system to add and drop courses that they attend, faculty needs to add and drop courses that they offer and the Registrar needs to allocate and de-allocate resources for courses that are added or dropped. Each type of user also has to satisfy some constraints, such as how many courses they take (students), teach (faculty)...
Evaluate the course registration system at your university. List the basic steps of a user’s dialog...
Evaluate the course registration system at your university. List the basic steps of a user’s dialog with the system. What are some of the problems with the system from the perspective of ease of learning and ease of use? In what ways is the system inflexible? In what ways is needed information not available? Is too much information provided that distracts from the task at hand? [1] 2. Create a word processing document using your favorite word processor. At the...
control system Design a system that will run on a PID process
control system Design a system that will run on a PID process
C PROGRAM STRING AND FILE PROCESSING LEAVE COMMENTS! I WILL LEAVE POSITIVE REVIEW! THANK YOU :)...
C PROGRAM STRING AND FILE PROCESSING LEAVE COMMENTS! I WILL LEAVE POSITIVE REVIEW! THANK YOU :) I need a program that 1) Count all words in a file. A word is any sequence of characters delimited by white space or the end of a sentence, whether or not it is an actual English word. 2)Count all syllables in each word. To make this simple, use the following rules: •Each group of adjacent vowels (a, e, i, o, u, y) counts...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT