International Journal of Information Security

, Volume 2, Issue 1, pp 45–58 | Cite as

Content-based filtering of Web documents: the MaX system and the EUFORBIA project

  • Elisa Bertino
  • Elena Ferrari
  • Andrea Perego
Regular contribution


Internet filtering has particular requirements which traditional access control approaches cannot satisfy. In this paper, we present a multi-strategy filtering model tailored specifically to both digital library and Web environments whose key features are the support for credential and content-based filtering and its full integration with standard Internet rating systems. Moreover, we describe the prototype system implementing our model and developed in the framework of the European project EUFORBIA.


Internet filtering Access control User credentials Rating systems 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    The EUFORBIA project Google Scholar
  2. 2.
    Safer Internet Action Plan (IAP) Google Scholar
  3. 3.
    RBAC’95, Proceedings of the 1st ACM workshop on role-based access control, 30 November–2 December 1995, Gaithersburg, MD Google Scholar
  4. 4.
    Adam NA, Atluri V, Bertino E, Ferrari E (2002) A content-based authorization model for digital libraries. IEEE Trans Knowl Data Eng 14(2):296–315 CrossRefGoogle Scholar
  5. 5.
    Bertino E, Weigand H (1994) An approach to authorization modeling in object-oriented database systems. Data Knowl Eng 12(1):1–29CrossRefGoogle Scholar
  6. 6.
    Chadwick D-W (1996) Understanding X.500 – The Directory. International Thomson Computer Press, London Google Scholar
  7. 7.
    Gudes E, Song H, Fernández EB (1990) Evolution of negative, predicate, and instance-based authorization in object-oriented databases. In: Database security, vol IV: Status and prospects. Results of the IFIP WG 11.3 workshop on database security, Halifax, UK, 18–21 September 1990, pp 85–98 Google Scholar
  8. 8.
    Humenn P (2000) A language for access control in CORBA Security. In: OMG. Results of the DOCsec workshop in Boston, MA, April 2000 Google Scholar
  9. 9.
    International Telecommunication Union (2001) X.500. Information technology – Open systems interconnection – The Directory: overview of concepts, models and services. ITU-T Recommendation February 2001 (ISO/IEC 9594-1:2001) Google Scholar
  10. 10.
    Karjoth G (1998) Authorization in CORBA Security. In: Proceedings of the 5th European symposium on research in computer security (ESORICS’98), Louvain-la-Neuve, Belgium, 16–18 September 1998. Lecture notes in computer science, vol 1485, Springer, Berlin Heidelberg New York, pp 143–158 Google Scholar
  11. 11.
    Lampson B (1971) Protection. In: Proceedings of the 5th annual Princeton conference on information sciences and systems. Princeton University, Princeton, NJ, pp 437–443 Google Scholar
  12. 12.
    Object Management Group (2002) CORBAservices. Security Service 1.8. OMG Specification 11 March 2002. Available at: Google Scholar
  13. 13.
    Park JS, Ahn G-J, Sandhu RS (2001) Role-based access control on the Web using LDAP. In: Proceedings of Database and Application Security XV, IFIP TC11/WG11.3 15th annual working conference on database and application security, 15–18 July 2001, Niagara on the Lake, Ontario, Canada, 15:19–30 Google Scholar
  14. 14.
    Park JS, Sandhu RS, Ahn G-J (2001) Role-based access control on the Web. ACM Trans Inform Sys Secur 4(1):37–71CrossRefGoogle Scholar
  15. 15.
    Resnick P, Miller J (1996) PICS: Internet access controls without censorship. Commun ACM 39(10):87–93CrossRefGoogle Scholar
  16. 16.
    Samarati P, Bertino E, Jajodia S (1996) An authorization model for a distributed hypertext system. IEEE Trans Knowl Data Eng 8(4):555–562CrossRefGoogle Scholar
  17. 17.
    Sandhu RS (1992) The Typed Access Matrix model. In: Proceedings of the IEEE symposium on research in security and privacy (S&P’92), Oakland, CA, 4–6 May 1992. Computer Society Press, New York, pp 122–136 Google Scholar
  18. 18.
    Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. IEEE Comput 29(2):38–47CrossRefGoogle Scholar
  19. 19.
    Thuraisingham BM (1992) A tutorial in secure database systems. Technical report, MITRE Google Scholar
  20. 20.
    Winslett M, Ching N, Jones V, Slepchin I (1997) Using digital credentials on the World Wide Web. J Comput Secur 5(3):255–266 CrossRefGoogle Scholar
  21. 21.
    World Wide Web Consortium (1996a) PICS label distribution, label syntax and communication protocols 1.1. W3C Recommendation 31 October 1996. Available at: Google Scholar
  22. 22.
    World Wide Web Consortium (1996b) Rating services and rating systems (and their machine readable descriptions) 1.1. W3C Recommendation 31 October 1996. Available at: Google Scholar
  23. 23.
    World Wide Web Consortium (1997) PICSRules 1.1. W3C Recommendation 29 December 1997. Available at: Google Scholar
  24. 24.
    World Wide Web Consortium (1999a) Resource Description Framework (RDF) model and syntax specification. W3C Recommendation 22 February 1999. Available at: Google Scholar
  25. 25.
    World Wide Web Consortium (1999b) HTML 4.01 Specification. W3C Recommendation 24 December 1999. Available at: Google Scholar
  26. 26.
    World Wide Web Consortium (2000) Extensible Markup Language (XML) 1.0, 2nd edn. W3C Recommendation 6 October 2000. Available at: Google Scholar
  27. 27.
    World Wide Web Consortium (2003) PICS rating vocabularies in XML/RDF. W3C Note 27 March 2000. Available at: Google Scholar
  28. 28.
    Zarri GP (1997) NKRL, a knowledge representation tool for encoding the ‘meaning’ of complex narrative texts. Nat Lang Eng – Special Issue Knowl Represent Nat Lang Process Implem Sys 3:231–253Google Scholar

Copyright information

© Springer-Verlag 2003

Authors and Affiliations

  1. 1.Dipartimento di Informatica e ComunicazioneUniversità degli Studi di MilanoMilanoItaly
  2. 2.Dipartimento di Scienze Chimiche, Fisiche e MatematicheUniversità degli Studi dell’InsubriaComoItaly

Personalised recommendations