Information content security on the Internet: the control model and its evaluation
- 134 Downloads
Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the Internet as well as the difficulty in the authentication for the access of specific categories of information, curbing the transmission of harmful information, i.e., assuring the information content security (ICS), has become a reasonable yet challenging alternative. At present, there is an urgent need to develop a systematic model that can effectively carry out the curbing. In fact, curbing the transmission of harmful information by way of filtering can be modeled by access control. In the paper, based on the three core-elements of communication, namely, “Who communicates with whom”, “How do they communicate” and “What is the content of communication”, we propose a control model, called ICCON. Unlike the existing access control, the reference monitor (RM) of our model is placed in the transmission channel, and moreover, an evaluation frame is proposed, through which the effectiveness of the RM in controlling information transmission on the Internet can be quantitatively evaluated.
Keywordscontent security access control quantitative evaluation
Unable to display preview. Download preview PDF.
- 2.Goth G. Terror on the Internet: a complex issue, and getting harder. IEEE Distrib Syst Online, 2008, 9: 3–3Google Scholar
- 3.Volokh E. Freedom of speech, shielding children, and transcending balancing. Supreme Court Rev, 1997, 31: 141–197Google Scholar
- 4.Zhang X Y. Communication decency act: America’s control model of erotic website (in Chinese). J Soc Sci, 2006, 8: 136–143Google Scholar
- 7.Lee W, Lee S S, Chung S, et al. Harmful contents classification using the harmful word filtering and SVM. In: LNCS 4489. Berlin: Springer-Verlag, 2007. 18–25Google Scholar
- 14.Luo J Z, Wang X P, Song A B. A semantic access control model for grid services. In: Proceedings of International Conference on Computer Supported Cooperative Work in Design. Vol. 1. 2005. 350–355Google Scholar
- 15.Ray I, Yu L J. Towards a location-aware role-based access control model. In: Proceedings of IEEE International Conference on Security and Privacy for Emerging Areas in Communications Networks. Vol 1. Athens, 2005. 234–236Google Scholar
- 17.Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In: Proceedings of IEEE Symposium on Security and Privacy. California, 1996. 164–173Google Scholar
- 18.Park J, Sandhu R. Towards usage control models: beyond traditional access control. In: Proceedings of the ACM Symposium on Access Control Models and Technologies. California, 2002. 57–64Google Scholar
- 19.Bao Y B, Huo L T, Shi J Q, et al. A formalized model and application of resource discovery (in Chinese). In: Proceedings of Conference on National Computer network Emergency Response technical Team of China, Shenzhen, 2008. 283–290Google Scholar
- 20.Zhang Y L. Research and application of behavior recognition technology in anti-spam system (in Chinese). Dissertation. Beijing: Beijing University Posts and Telecommunications, 2006. 14–30Google Scholar