Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Context-Integrity Access Control (CIAC): An Information Security Tool for a Secure Academic Web-Portal  
  Authors : Onakoya, Johnson Rotimi; Hammawa, Mohammed Baba
  Cite as:

 

The given set theory mathematical model is a symmetric differences of (Full Outer Join) except, (Inner Join) using hybrid tag methods in matching role with related Python with flask framework and Sequence Query Language (Flask-SQLAlchemy) that detects cyber terrorist, and blocks access control problems, distinct users and privileges, defend cyber sovereignty and silos data integrity.

 

Published In : IJCSN Journal Volume 9, Issue 2

Date of Publication : April 2020

Pages : 08-18

Figures :09

Tables : 01

 

Onakoya, Johnson Rotimi : is a Ph.D. Scholar, a Deputy Director, MIS at University of Abuja, Abuja. Nigeria. He has many publications to his credit. Member, British Computer Society, Computer Professional of Nigeria (CPN), Nigeria Computer Society and Nigeria Institute of Management.

Hammawa, Baba Mohammed : is a Professor of Computer Science with bias in Information Security. Currently a Dean of Science in Baze University, Abuja. Nigeria. He has many publications both in International and local Journals to his credit. He has rich experience in Academic and Information Security world..

 

Context-Integrity, Cyber Sovereignty, Deny access, Hybrid tag methods, Intruder and Silos data integrity

We want to say that we have adequately explained the context-integrity information security mechanism. We had extended traditional role-based model to a new security infrastructure called context integrity information security. Also modernized the traditional Username and password to valid email, Password and Role matching in Context-Integrity Access Control.

 

[1] Balaban David (2020) "On Authorization and Implementation of Access Control Models" The State Security News. Trends. Insights. By Tripwire Inc. https://www.tripwire.com/state-of-security/securitydata- protection/authorization-implementationaccess- control-models/ [2] Banerjee, Anindya and Naumann, David A,(2004) "History-Based Access Control and secure Information Flow" International Workshop on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices CASSIS 2004: Construction and Analysis of Safe, Secure, and Interoperable Smart Devices pp 27-48| https://link.springer .com/ conference/cassis or http://software.imdea.org/~ab/ Publications/hbacsif.pdf Downloaded on 27-02- 2020 [3] Bourgeois, David (2019) "Information System for Business and BEYOND (web) Licensed under a creative Commons Attribution-Non Commercial 4.0. International License. August 1, 2019. [4] DuraiPandian, N. Shanmughaneethi, V. and Chellappan (2006) "Information Security Architecture - Context Aware Access Control Model for Educational Applications. IJCSNS International Journal of Computer Science and Network Security, Vol. 6. No. 12 December, 2006. [5] Hu, V.C., Kuhn, D. R. and Feraiolo, D.F. (2015) "Attribute-Based Access Control (ABAC) National Institute of Standards and Technology https://www.profsandhu.com/cs6393_s20/Hu- 2015.pdf [6] Kaushik Sharat, Tomar Anita and Poonam (2014) "Access Control List Implementation in a Private Network" International Journal of Information & Computer Technology ISSN 0974-2239 Volume 4, Number 14, 2014. Pp. 1361 @ International Research Publications House. http://www. irphouse.com [7] Kulkarm Nahush, Kothari Hash, Ashar Hardik and Patil Sanchit (2005) "Access Control List" International Journal for Research in Applied Science & Engineering Technology (IJRASET) VOL.3. Issue XI, November 2015. ISSN: 2321- 9653. www.ijraset.com . IC Value:13.98 [8] Prosser, Marc (2020) https://articles.bplans.com/4- easy-steps-increase-businesss-online-security/ Downloaded on 15-03-2020 [9] Martin, James A. and Walters, John K. (2018) "What is IAM? Identity and Access Management explained" https://www. csoonline.com/article/ 2120384/what-is-iam-identity-and-accessmanagement- explained.html Downloaded 20-12- 2019. [10] Mudarri Tawfik, Al-Rabeei Samer and Abdo, Samer. (2015). SECURITY FUNDAMENTALS: ACCESS CONTROL MODELS. Interdisciplinarity in theory and practice. https://www.researchgate.net/publication/28221911 7_ SECURITY_FUNDAMENTALS_ACCESS_CONT ROL_MODELS/citation/ Downloaded on 20-01- 2020. [11] Nisenbaum, Helen (2018): "Contextual Integrity Privacy" Symposium. New York University https://www.nyu.edu/ Projects/nisenbaum. August, 2018. Video downloaded in August, 2018. [12] Pachghare V.K. (2009): "Cryptography and Information Security:, Asoke K. Ghosh, PHI Learning Private Limited, M-97, Connaught circus, New Delhi - 110001. ISBN: 978-81-203-3521-9. [13] Rajebhosale Sagar, Choudhari Shashank, Patil Sachin, Vyavahare Akshay and Khabiya Sanket (2016) "SMART CAMPUS-An Academic Web Portal with Android Application" International Research Journal of Engineering and Technology (IRJET) eISSN:2395-0056, pISSN:2395-0072. Volume:03 Issue:04 April, 2016. [14] Romuald Thion (2008) "Network-Based Passive Information gathering" International Outsourcing, Personal Data, and Cyber Terriorism. https://books. google.com.ng/books?id= XWK9AQAAQBAJ&pg=PT151&dq=Romuald+(20 08)+enemies&hl=en&sa=X&ved=0ahUKEwiMgO HYpp3oAhUTUBUIHUSIBGwQ6AEIYTAH#v=on epage&q=Romuald%20(2008)%20enemies&f=false [15] Sarvepalli, Vijay (2013) "Practical math for your Security Operations-Part1-3" Posted in Network Situational Awareness. August 6, 2013. https://insights.sei.cmu.edu/cert/ 2013/08/Practicalmath- for-your-security-opertions----part-1-of-3.html [16] Tan, Ying (2015) "Profile Matrix Permutation Strategy" pp.548 in Handbook of Research on Design, Control, and Modeling of Swarm Robotics. https://books.google.com.ng /books?id=x_otCwAAQBAJ&pg=PA548&lpg=PA5 48&dq=Robotics+permutations&source=bl&ots=c2 RaqOX4wF&sig=ACfU3U0DSlHw7PtHM1LODD RXg0cwE9w&hl=en&sa=X&ved=2ahUKEwiRn8y 3lJ3oAhWL3oUKHZhpDhoQ6AEwCHoECAkQA Q#v=onepage&q=Robotics%20permutations&f=fals e edited by Tan, Ying [17] Techopedia (2012) "Access Control List" (ACL) https://www.techopedia.com/definition/24766/acces s-control-list-acl downloaded on 14-03-2020 [18] Techopedia (2011) "Decretionary Access Control" (DAC) https://www.techopedia.com/definition/229/discretio nary-access-control-dac Downloaded 2-3-2020 [19] Todd Birchard (2020) "Managing Database Models with Flask-SQLAlchemy" https://hackersandslackers .com/flask-sqlalchemydatabase- models/ Downloaded on 27-2-2020. [20] Servos, Daniel and Osborn, Sylvia I. (2017) "Current Research and Open Problems in Attribute- Based Access Control" ACM Journal. ACM Computing Surveys Vol. 49, No. 4. https://doi.org/10.1145/3007204 [21] Wikipedia (2018 'Mandatory Access Control" https://en.wikipedia.org/wiki/Mandatory_access_co ntrol Downloaded on August 21, 2019. [22] W3School.com/Sql-join-full.asp [23] Yalagi, pratibha S. and Dangare, Chaitrali S. (2013) "Design of An Academic Web Portal Providing EFacilities "International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) ISSN 2249-6831. Vol. 3, Issue 1. March, 2013. pp. 85-90. ŠTJPRC Pvt. Ltd. [24] Zenlayer (2019) "What is an Access Control List (ACL)? https://www.zenlayer.com/blog/what-isaccess- control-list/ downloaded on 15-03-2020.