Skip to main content
Log in

Information content security on the Internet: the control model and its evaluation

  • Research Papers
  • Published:
Science in China Series F: Information Sciences Aims and scope Submit manuscript

Abstract

Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the Internet as well as the difficulty in the authentication for the access of specific categories of information, curbing the transmission of harmful information, i.e., assuring the information content security (ICS), has become a reasonable yet challenging alternative. At present, there is an urgent need to develop a systematic model that can effectively carry out the curbing. In fact, curbing the transmission of harmful information by way of filtering can be modeled by access control. In the paper, based on the three core-elements of communication, namely, “Who communicates with whom”, “How do they communicate” and “What is the content of communication”, we propose a control model, called ICCON. Unlike the existing access control, the reference monitor (RM) of our model is placed in the transmission channel, and moreover, an evaluation frame is proposed, through which the effectiveness of the RM in controlling information transmission on the Internet can be quantitatively evaluated.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Stanton J J. Terror in cyberspace: terrorists will exploit and widen the gap between governing structures and the public. Am Behav Sci, 2002, 45: 1017–1032

    Article  Google Scholar 

  2. Goth G. Terror on the Internet: a complex issue, and getting harder. IEEE Distrib Syst Online, 2008, 9: 3–3

    Google Scholar 

  3. Volokh E. Freedom of speech, shielding children, and transcending balancing. Supreme Court Rev, 1997, 31: 141–197

    Google Scholar 

  4. Zhang X Y. Communication decency act: America’s control model of erotic website (in Chinese). J Soc Sci, 2006, 8: 136–143

    Google Scholar 

  5. Lee P Y, Hui S C, Fong A C M. Neural networks for web content filtering. IEEE Intel Syst, 2002, 17: 48–57

    Article  Google Scholar 

  6. Lee P Y, Hui S C, Fong A C M. An intelligent categorization engine for bilingual web content filtering. IEEE Trans Multimed, 2005, 7: 1183–1190

    Article  Google Scholar 

  7. Lee W, Lee S S, Chung S, et al. Harmful contents classification using the harmful word filtering and SVM. In: LNCS 4489. Berlin: Springer-Verlag, 2007. 18–25

    Google Scholar 

  8. Lee L H, Luh C J. Generation of pornographic blacklist and its incremental update using an inverse chi-square based method. Inf Process Manag, 2008, 44: 1698–1706

    Article  Google Scholar 

  9. Hammami M, Chahir Y, Chen L M. WebGuard: a web filtering engine combining textual, structural, and visual content-based analysis. IEEE Trans Knowl Data Eng, 2006, 18: 272–284

    Article  Google Scholar 

  10. Lin C, Feng F J, Li J S. Access control in new network environment (in Chinese). J Softw. 2007, 18: 955–966

    Article  Google Scholar 

  11. Sandhu R, Coyne E J, Feinstein H L, et al. Role-based access control models. Computer, 1996, 29: 38–47

    Article  Google Scholar 

  12. Park J, Sandhu R. The UCONABC usage control model. ACM Trans Inf Syst Secur, 2004, 7: 128–174

    Article  Google Scholar 

  13. López G, Cánovas O, Gómez A F, et al. A network access control approach based on the AAA architecture and authorization attributes. J Netw Comput Appl, 2007, 30: 900–919

    Article  Google Scholar 

  14. Luo J Z, Wang X P, Song A B. A semantic access control model for grid services. In: Proceedings of International Conference on Computer Supported Cooperative Work in Design. Vol. 1. 2005. 350–355

    Google Scholar 

  15. Ray I, Yu L J. Towards a location-aware role-based access control model. In: Proceedings of IEEE International Conference on Security and Privacy for Emerging Areas in Communications Networks. Vol 1. Athens, 2005. 234–236

    Google Scholar 

  16. Zhang H, Huo Y P, Shi Z G. A formal model for access control with supporting spatial context. Sci China Ser F-Inf Sci, 2007, 50: 419–439

    Article  MATH  Google Scholar 

  17. Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In: Proceedings of IEEE Symposium on Security and Privacy. California, 1996. 164–173

  18. Park J, Sandhu R. Towards usage control models: beyond traditional access control. In: Proceedings of the ACM Symposium on Access Control Models and Technologies. California, 2002. 57–64

  19. Bao Y B, Huo L T, Shi J Q, et al. A formalized model and application of resource discovery (in Chinese). In: Proceedings of Conference on National Computer network Emergency Response technical Team of China, Shenzhen, 2008. 283–290

  20. Zhang Y L. Research and application of behavior recognition technology in anti-spam system (in Chinese). Dissertation. Beijing: Beijing University Posts and Telecommunications, 2006. 14–30

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to BinXing Fang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Fang, B., Guo, Y. & Zhou, Y. Information content security on the Internet: the control model and its evaluation. Sci. China Ser. F-Inf. Sci. 53, 30–49 (2010). https://doi.org/10.1007/s11432-010-0014-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-010-0014-z

Keywords

Navigation