The given set theory mathematical model is a symmetric differences of (Full Outer Join) except, (Inner Join) using hybrid tag
methods in matching role with related Python with flask framework and Sequence Query Language (Flask-SQLAlchemy) that
detects cyber terrorist, and blocks access control problems, distinct users and privileges, defend cyber sovereignty and silos data
integrity.
Published In:IJCSN Journal Volume 9, Issue 2
Date of Publication : April 2020
Pages : 08-18
Figures :09
Tables : 01
Onakoya, Johnson Rotimi :
is a Ph.D. Scholar, a Deputy
Director, MIS at University of Abuja, Abuja. Nigeria. He has
many publications to his credit. Member, British Computer
Society, Computer Professional of Nigeria (CPN), Nigeria
Computer Society and Nigeria Institute of Management.
Hammawa, Baba Mohammed :
is a Professor of Computer
Science with bias in Information Security. Currently a Dean of
Science in Baze University, Abuja. Nigeria. He has many
publications both in International and local Journals to his
credit. He has rich experience in Academic and Information
Security world..
Context-Integrity, Cyber Sovereignty, Deny access, Hybrid tag methods, Intruder and Silos data integrity
We want to say that we have adequately explained the
context-integrity information security mechanism. We
had extended traditional role-based model to a new
security infrastructure called context integrity
information security. Also modernized the traditional
Username and password to valid email, Password and
Role matching in Context-Integrity Access Control.
[1] Balaban David (2020) "On Authorization and
Implementation of Access Control Models" The
State Security News. Trends. Insights. By Tripwire
Inc.
https://www.tripwire.com/state-of-security/securitydata-
protection/authorization-implementationaccess-
control-models/
[2] Banerjee, Anindya and Naumann, David A,(2004)
"History-Based Access Control and secure
Information Flow" International Workshop on
Construction and Analysis of Safe, Secure, and
Interoperable Smart Devices CASSIS
2004: Construction and Analysis of Safe, Secure,
and Interoperable Smart Devices pp 27-48|
https://link.springer .com/ conference/cassis or
http://software.imdea.org/~ab/
Publications/hbacsif.pdf Downloaded on 27-02-
2020
[3] Bourgeois, David (2019) "Information System for
Business and BEYOND (web) Licensed under a
creative Commons Attribution-Non Commercial
4.0. International License. August 1, 2019.
[4] DuraiPandian, N. Shanmughaneethi, V. and
Chellappan (2006) "Information Security
Architecture - Context Aware Access Control
Model for Educational Applications. IJCSNS
International Journal of Computer Science and
Network Security, Vol. 6. No. 12 December, 2006.
[5] Hu, V.C., Kuhn, D. R. and Feraiolo, D.F. (2015)
"Attribute-Based Access Control (ABAC) National
Institute of Standards and Technology
https://www.profsandhu.com/cs6393_s20/Hu-
2015.pdf
[6] Kaushik Sharat, Tomar Anita and Poonam (2014)
"Access Control List Implementation in a Private
Network" International Journal of Information &
Computer Technology ISSN 0974-2239 Volume 4,
Number 14, 2014. Pp. 1361 @ International
Research Publications House. http://www.
irphouse.com
[7] Kulkarm Nahush, Kothari Hash, Ashar Hardik and
Patil Sanchit (2005) "Access Control List"
International Journal for Research in Applied
Science & Engineering Technology (IJRASET)
VOL.3. Issue XI, November 2015. ISSN: 2321-
9653. www.ijraset.com . IC Value:13.98
[8] Prosser, Marc (2020) https://articles.bplans.com/4-
easy-steps-increase-businesss-online-security/
Downloaded on 15-03-2020
[9] Martin, James A. and Walters, John K. (2018)
"What is IAM? Identity and Access Management
explained" https://www. csoonline.com/article/
2120384/what-is-iam-identity-and-accessmanagement-
explained.html Downloaded 20-12-
2019.
[10] Mudarri Tawfik, Al-Rabeei Samer and Abdo,
Samer. (2015). SECURITY FUNDAMENTALS:
ACCESS CONTROL MODELS. Interdisciplinarity
in theory and practice.
https://www.researchgate.net/publication/28221911
7_
SECURITY_FUNDAMENTALS_ACCESS_CONT
ROL_MODELS/citation/ Downloaded on 20-01-
2020.
[11] Nisenbaum, Helen (2018): "Contextual Integrity
Privacy" Symposium. New York University
https://www.nyu.edu/ Projects/nisenbaum. August,
2018. Video downloaded in August, 2018.
[12] Pachghare V.K. (2009): "Cryptography and
Information Security:, Asoke K. Ghosh, PHI
Learning Private Limited, M-97, Connaught circus,
New Delhi - 110001. ISBN: 978-81-203-3521-9.
[13] Rajebhosale Sagar, Choudhari Shashank, Patil
Sachin, Vyavahare Akshay and Khabiya Sanket
(2016) "SMART CAMPUS-An Academic Web
Portal with Android Application" International
Research Journal of Engineering and Technology
(IRJET) eISSN:2395-0056, pISSN:2395-0072.
Volume:03 Issue:04 April, 2016.
[14] Romuald Thion (2008) "Network-Based Passive
Information gathering" International Outsourcing,
Personal Data, and Cyber Terriorism. https://books.
google.com.ng/books?id=
XWK9AQAAQBAJ&pg=PT151&dq=Romuald+(20
08)+enemies&hl=en&sa=X&ved=0ahUKEwiMgO
HYpp3oAhUTUBUIHUSIBGwQ6AEIYTAH#v=on
epage&q=Romuald%20(2008)%20enemies&f=false
[15] Sarvepalli, Vijay (2013) "Practical math for your
Security Operations-Part1-3" Posted in Network
Situational Awareness. August 6, 2013.
https://insights.sei.cmu.edu/cert/ 2013/08/Practicalmath-
for-your-security-opertions----part-1-of-3.html
[16] Tan, Ying (2015) "Profile Matrix Permutation
Strategy" pp.548 in Handbook of Research on
Design, Control, and Modeling of Swarm Robotics. https://books.google.com.ng
/books?id=x_otCwAAQBAJ&pg=PA548&lpg=PA5
48&dq=Robotics+permutations&source=bl&ots=c2
RaqOX4wF&sig=ACfU3U0DSlHw7PtHM1LODD
RXg0cwE9w&hl=en&sa=X&ved=2ahUKEwiRn8y
3lJ3oAhWL3oUKHZhpDhoQ6AEwCHoECAkQA
Q#v=onepage&q=Robotics%20permutations&f=fals
e edited by Tan, Ying
[17] Techopedia (2012) "Access Control List" (ACL)
https://www.techopedia.com/definition/24766/acces
s-control-list-acl downloaded on 14-03-2020
[18] Techopedia (2011) "Decretionary Access Control"
(DAC)
https://www.techopedia.com/definition/229/discretio
nary-access-control-dac Downloaded 2-3-2020
[19] Todd Birchard (2020) "Managing Database Models
with Flask-SQLAlchemy"
https://hackersandslackers .com/flask-sqlalchemydatabase-
models/ Downloaded on 27-2-2020.
[20] Servos, Daniel and Osborn, Sylvia I. (2017)
"Current Research and Open Problems in Attribute-
Based Access Control" ACM Journal. ACM
Computing Surveys Vol. 49, No. 4.
https://doi.org/10.1145/3007204
[21] Wikipedia (2018 'Mandatory Access Control"
https://en.wikipedia.org/wiki/Mandatory_access_co
ntrol Downloaded on August 21, 2019.
[22] W3School.com/Sql-join-full.asp
[23] Yalagi, pratibha S. and Dangare, Chaitrali S. (2013)
"Design of An Academic Web Portal Providing EFacilities
"International Journal of Computer
Science Engineering and Information Technology
Research (IJCSEITR) ISSN 2249-6831. Vol. 3,
Issue 1. March, 2013. pp. 85-90. ŠTJPRC Pvt. Ltd.
[24] Zenlayer (2019) "What is an Access Control List
(ACL)? https://www.zenlayer.com/blog/what-isaccess-
control-list/ downloaded on 15-03-2020.