Information content security on the Internet: the control model and its evaluation

Research Papers


Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the Internet as well as the difficulty in the authentication for the access of specific categories of information, curbing the transmission of harmful information, i.e., assuring the information content security (ICS), has become a reasonable yet challenging alternative. At present, there is an urgent need to develop a systematic model that can effectively carry out the curbing. In fact, curbing the transmission of harmful information by way of filtering can be modeled by access control. In the paper, based on the three core-elements of communication, namely, “Who communicates with whom”, “How do they communicate” and “What is the content of communication”, we propose a control model, called ICCON. Unlike the existing access control, the reference monitor (RM) of our model is placed in the transmission channel, and moreover, an evaluation frame is proposed, through which the effectiveness of the RM in controlling information transmission on the Internet can be quantitatively evaluated.


content security access control quantitative evaluation 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Stanton J J. Terror in cyberspace: terrorists will exploit and widen the gap between governing structures and the public. Am Behav Sci, 2002, 45: 1017–1032CrossRefGoogle Scholar
  2. 2.
    Goth G. Terror on the Internet: a complex issue, and getting harder. IEEE Distrib Syst Online, 2008, 9: 3–3Google Scholar
  3. 3.
    Volokh E. Freedom of speech, shielding children, and transcending balancing. Supreme Court Rev, 1997, 31: 141–197Google Scholar
  4. 4.
    Zhang X Y. Communication decency act: America’s control model of erotic website (in Chinese). J Soc Sci, 2006, 8: 136–143Google Scholar
  5. 5.
    Lee P Y, Hui S C, Fong A C M. Neural networks for web content filtering. IEEE Intel Syst, 2002, 17: 48–57CrossRefGoogle Scholar
  6. 6.
    Lee P Y, Hui S C, Fong A C M. An intelligent categorization engine for bilingual web content filtering. IEEE Trans Multimed, 2005, 7: 1183–1190CrossRefGoogle Scholar
  7. 7.
    Lee W, Lee S S, Chung S, et al. Harmful contents classification using the harmful word filtering and SVM. In: LNCS 4489. Berlin: Springer-Verlag, 2007. 18–25Google Scholar
  8. 8.
    Lee L H, Luh C J. Generation of pornographic blacklist and its incremental update using an inverse chi-square based method. Inf Process Manag, 2008, 44: 1698–1706CrossRefGoogle Scholar
  9. 9.
    Hammami M, Chahir Y, Chen L M. WebGuard: a web filtering engine combining textual, structural, and visual content-based analysis. IEEE Trans Knowl Data Eng, 2006, 18: 272–284CrossRefGoogle Scholar
  10. 10.
    Lin C, Feng F J, Li J S. Access control in new network environment (in Chinese). J Softw. 2007, 18: 955–966CrossRefGoogle Scholar
  11. 11.
    Sandhu R, Coyne E J, Feinstein H L, et al. Role-based access control models. Computer, 1996, 29: 38–47CrossRefGoogle Scholar
  12. 12.
    Park J, Sandhu R. The UCONABC usage control model. ACM Trans Inf Syst Secur, 2004, 7: 128–174CrossRefGoogle Scholar
  13. 13.
    López G, Cánovas O, Gómez A F, et al. A network access control approach based on the AAA architecture and authorization attributes. J Netw Comput Appl, 2007, 30: 900–919CrossRefGoogle Scholar
  14. 14.
    Luo J Z, Wang X P, Song A B. A semantic access control model for grid services. In: Proceedings of International Conference on Computer Supported Cooperative Work in Design. Vol. 1. 2005. 350–355Google Scholar
  15. 15.
    Ray I, Yu L J. Towards a location-aware role-based access control model. In: Proceedings of IEEE International Conference on Security and Privacy for Emerging Areas in Communications Networks. Vol 1. Athens, 2005. 234–236Google Scholar
  16. 16.
    Zhang H, Huo Y P, Shi Z G. A formal model for access control with supporting spatial context. Sci China Ser F-Inf Sci, 2007, 50: 419–439MATHCrossRefGoogle Scholar
  17. 17.
    Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In: Proceedings of IEEE Symposium on Security and Privacy. California, 1996. 164–173Google Scholar
  18. 18.
    Park J, Sandhu R. Towards usage control models: beyond traditional access control. In: Proceedings of the ACM Symposium on Access Control Models and Technologies. California, 2002. 57–64Google Scholar
  19. 19.
    Bao Y B, Huo L T, Shi J Q, et al. A formalized model and application of resource discovery (in Chinese). In: Proceedings of Conference on National Computer network Emergency Response technical Team of China, Shenzhen, 2008. 283–290Google Scholar
  20. 20.
    Zhang Y L. Research and application of behavior recognition technology in anti-spam system (in Chinese). Dissertation. Beijing: Beijing University Posts and Telecommunications, 2006. 14–30Google Scholar

Copyright information

© Science in China Press and Springer Berlin Heidelberg 2010

Authors and Affiliations

  1. 1.School of ComputerBeijing University of Posts and TelecommunicationsBeijingChina
  2. 2.Institute of Computing TechnologyChinese Academy of SciencesBeijingChina
  3. 3.Graduate University of Chinese Academy of SciencesBeijingChina
  4. 4.National Computer Network Emergency Response Technical Team/Coordination Center of ChinaBeijingChina

Personalised recommendations