06.02.2013 Views

Research in Engineering Education Symposium 2011 - rees2009

Research in Engineering Education Symposium 2011 - rees2009

Research in Engineering Education Symposium 2011 - rees2009

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Universidad Politécnica de Madrid (UPM) Pág<strong>in</strong>a 454 de 957<br />

Figure 1: Applet corrector user <strong>in</strong>terface. The visualization panel on the left shows a 60 question with 4<br />

options answer sheet template.<br />

Security configuration<br />

The tool operation requires read<strong>in</strong>g and writ<strong>in</strong>g files <strong>in</strong> the user’s computer, the ma<strong>in</strong> file<br />

operations are: writ<strong>in</strong>g the answer sheet templates, read<strong>in</strong>g the solution and exam files<br />

and writ<strong>in</strong>g the corrected answer sheets and the score file. Java security has to be<br />

configured <strong>in</strong> order to allow the corrector applet to access to the local file system.<br />

We have made Java security configuration completely user transparent by implement<strong>in</strong>g a<br />

Java application that performs all the required operations. The configuration application is<br />

delivered as a ZIP file that conta<strong>in</strong>s the Java code packed <strong>in</strong> a JAR file and two script files, a<br />

BAT file for W<strong>in</strong>dows and a shell file that is used <strong>in</strong> L<strong>in</strong>ux and MacOS. The user simply<br />

downloads the ZIP file from a public URL and then the file is decompressed <strong>in</strong> a folder and<br />

after execut<strong>in</strong>g the correspond<strong>in</strong>g script file a w<strong>in</strong>dow is opened ask<strong>in</strong>g for accept<strong>in</strong>g<br />

security configuration. When the user presses the Accept button, the follow<strong>in</strong>g two<br />

operations are performed:<br />

1. A folder named corrector is created <strong>in</strong> a predef<strong>in</strong>ed location depend<strong>in</strong>g on the<br />

operat<strong>in</strong>g system (i.e. <strong>in</strong> W<strong>in</strong>dows 7 the path is %userprofile%\corrector). This is<br />

the root work<strong>in</strong>g folder for the tool, <strong>in</strong> the sense that every exam will be processed<br />

<strong>in</strong> a subfolder of it. The corrector folder is always created <strong>in</strong> a location where the<br />

user has no file access restrictions.<br />

2. A .java.policy file is created (or updated if there exists a previous one) <strong>in</strong> order to<br />

grant permission to the corrector applet to access to some system properties (i.e.<br />

the host operat<strong>in</strong>g system name, the user home folder path, etc) and to read, write<br />

Proceed<strong>in</strong>gs of <strong>Research</strong> <strong>in</strong> Eng<strong>in</strong>eer<strong>in</strong>g <strong>Education</strong> <strong>Symposium</strong> <strong>2011</strong><br />

Madrid, 4 th - 7 th October <strong>2011</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!