Abstract
From 1st January 2000, Internet Service Providers in Australia have been required to filter web traffic content. The Australian Broadcasting Authority (ABA) publishes a list of banned web sites and ISPs must enforce this ban. Enforcing Internet content regulation is a security issue: ISPs need to be able to verify the authenticity of a distributed banned list, enforcement will most likely be performed by a security component, and enforcement must be integrated with other security functions. This paper examines these issues, and more specifically reviews the modifications required to the TIS http-gw proxy to support Internet content regulation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Netscape Communication Corporation. Introduction to SSL. February 5 (2000), http://developer.netscape.com/docs/manuals/security/sslin
Spafford, E.H., Kim, G.H.: Experiences with Tripwire: Using Integrity Checkers for Intrusion Detection. Purdue Technical Report, Februaty 5 (2000)
Trusted Information Systems. Internet Firewall Toolkit, June 2 (1999), http://www.tis.com/research/software
Internet Industry Association website. Summary of the Main Features of the Baroadcasting Services Amendment (On-line Services) Bill, February 18 (1999), http://www.iia.net.au/news/990611.html
MIT website. Integrating PGP with Various E-Mail Products, February 5 (2000), http://web.mit.edu/network/pgp.html
Squid website. Squid Web Proxy Cache, August 9 (1999), http://squid.nlanr.net
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Prasetijo, A., Ashley, P., Looi, M., Clark, A., Gaskell, G. (2000). A Three-Party HTTP Proxy to Support Internet Content Regulation. In: Dawson, E.P., Clark, A., Boyd, C. (eds) Information Security and Privacy. ACISP 2000. Lecture Notes in Computer Science, vol 1841. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10718964_8
Download citation
DOI: https://doi.org/10.1007/10718964_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67742-0
Online ISBN: 978-3-540-45030-6
eBook Packages: Springer Book Archive