Abstract
Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the Internet as well as the difficulty in the authentication for the access of specific categories of information, curbing the transmission of harmful information, i.e., assuring the information content security (ICS), has become a reasonable yet challenging alternative. At present, there is an urgent need to develop a systematic model that can effectively carry out the curbing. In fact, curbing the transmission of harmful information by way of filtering can be modeled by access control. In the paper, based on the three core-elements of communication, namely, “Who communicates with whom”, “How do they communicate” and “What is the content of communication”, we propose a control model, called ICCON. Unlike the existing access control, the reference monitor (RM) of our model is placed in the transmission channel, and moreover, an evaluation frame is proposed, through which the effectiveness of the RM in controlling information transmission on the Internet can be quantitatively evaluated.
Similar content being viewed by others
References
Stanton J J. Terror in cyberspace: terrorists will exploit and widen the gap between governing structures and the public. Am Behav Sci, 2002, 45: 1017–1032
Goth G. Terror on the Internet: a complex issue, and getting harder. IEEE Distrib Syst Online, 2008, 9: 3–3
Volokh E. Freedom of speech, shielding children, and transcending balancing. Supreme Court Rev, 1997, 31: 141–197
Zhang X Y. Communication decency act: America’s control model of erotic website (in Chinese). J Soc Sci, 2006, 8: 136–143
Lee P Y, Hui S C, Fong A C M. Neural networks for web content filtering. IEEE Intel Syst, 2002, 17: 48–57
Lee P Y, Hui S C, Fong A C M. An intelligent categorization engine for bilingual web content filtering. IEEE Trans Multimed, 2005, 7: 1183–1190
Lee W, Lee S S, Chung S, et al. Harmful contents classification using the harmful word filtering and SVM. In: LNCS 4489. Berlin: Springer-Verlag, 2007. 18–25
Lee L H, Luh C J. Generation of pornographic blacklist and its incremental update using an inverse chi-square based method. Inf Process Manag, 2008, 44: 1698–1706
Hammami M, Chahir Y, Chen L M. WebGuard: a web filtering engine combining textual, structural, and visual content-based analysis. IEEE Trans Knowl Data Eng, 2006, 18: 272–284
Lin C, Feng F J, Li J S. Access control in new network environment (in Chinese). J Softw. 2007, 18: 955–966
Sandhu R, Coyne E J, Feinstein H L, et al. Role-based access control models. Computer, 1996, 29: 38–47
Park J, Sandhu R. The UCONABC usage control model. ACM Trans Inf Syst Secur, 2004, 7: 128–174
López G, Cánovas O, Gómez A F, et al. A network access control approach based on the AAA architecture and authorization attributes. J Netw Comput Appl, 2007, 30: 900–919
Luo J Z, Wang X P, Song A B. A semantic access control model for grid services. In: Proceedings of International Conference on Computer Supported Cooperative Work in Design. Vol. 1. 2005. 350–355
Ray I, Yu L J. Towards a location-aware role-based access control model. In: Proceedings of IEEE International Conference on Security and Privacy for Emerging Areas in Communications Networks. Vol 1. Athens, 2005. 234–236
Zhang H, Huo Y P, Shi Z G. A formal model for access control with supporting spatial context. Sci China Ser F-Inf Sci, 2007, 50: 419–439
Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In: Proceedings of IEEE Symposium on Security and Privacy. California, 1996. 164–173
Park J, Sandhu R. Towards usage control models: beyond traditional access control. In: Proceedings of the ACM Symposium on Access Control Models and Technologies. California, 2002. 57–64
Bao Y B, Huo L T, Shi J Q, et al. A formalized model and application of resource discovery (in Chinese). In: Proceedings of Conference on National Computer network Emergency Response technical Team of China, Shenzhen, 2008. 283–290
Zhang Y L. Research and application of behavior recognition technology in anti-spam system (in Chinese). Dissertation. Beijing: Beijing University Posts and Telecommunications, 2006. 14–30
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Fang, B., Guo, Y. & Zhou, Y. Information content security on the Internet: the control model and its evaluation. Sci. China Ser. F-Inf. Sci. 53, 30–49 (2010). https://doi.org/10.1007/s11432-010-0014-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11432-010-0014-z