Information content security on the Internet:the control model and its evaluation

被引:4
|
作者
FANG BinXing1
2Institute of Computing Technology
3Graduate University of Chinese Academy of Sciences
4National Computer Network Emergency Response Technical Team/Coordination Center of China
机构
关键词
content security; access control; quantitative evaluation;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the Internet as well as the difficulty in the authentication for the access of specific categories of information, curbing the transmission of harmful information, i.e., assuring the information content security (ICS), has become a reasonable yet challenging alternative. At present, there is an urgent need to develop a systematic model that can effectively carry out the curbing. In fact, curbing the transmission of harmful information by way of filtering can be modeled by access control. In the paper, based on the three core-elements of communication, namely, "Who communicates with whom", "How do they communicate" and "What is the content of communication", we propose a control model, called ICCON. Unlike the existing access control, the reference monitor (RM) of our model is placed in the transmission channel, and moreover, an evaluation frame is proposed, through which the effectiveness of the RM in controlling information transmission on the Internet can be quantitatively evaluated.
引用
收藏
页码:30 / 49
页数:20
相关论文
共 50 条
  • [21] Food security information on the Internet
    Parris, TM
    ENVIRONMENT, 1997, 39 (02): : 44 - 45
  • [22] Information security in the internet society
    Imai, Hideki
    Kyokai Joho Imeji Zasshi/Journal of the Institute of Image Information and Television Engineers, 2002, 56 (07):
  • [23] Internet information security strategies
    2001, Radio i svyaz'
  • [24] Information security standards focus on the existence of process, not its content
    Siponen, Mikko
    COMMUNICATIONS OF THE ACM, 2006, 49 (08) : 97 - 100
  • [25] Information Flow Control with Decentralized Labeling Model in Information Security
    Hakkoymaz, Veli
    Bakir, Cigdem
    JOURNAL OF WEB ENGINEERING, 2020, 19 (7-8): : 903 - 930
  • [26] Homeland security and information control: A model of asymmetric information flows
    Maxwell, TA
    ASIST 2003: PROCEEDINGS OF THE 66TH ASIST ANNUAL MEETING, VOL 40, 2003: HUMANIZING INFORMATION TECHNOLOGY: FROM IDEAS TO BITS AND BACK, 2003, 40 : 128 - 134
  • [27] Implementation and evaluation of the information flow control for the Internet of Things
    Nakamura, Shigenari
    Enokido, Tomoya
    Takizawa, Makoto
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (19):
  • [28] Information security and information hygiene on internet media
    Varynskyi, Vladyslav
    Varynska, Alla
    Kostytsky, Mychailo
    Kushakova-Kostytska, Nataliia
    NEXO REVISTA CIENTIFICA, 2021, 34 (01): : 120 - 128
  • [29] An Information Security Evaluation Model Supporting Measurement Model Adaptation
    Zuo, Jinxin
    Guo, Ziyv
    Lu, Yueming
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1435 - 1439
  • [30] Mobile internet: content, security and terminal
    Guo, Jun
    Cho, Sung Ho
    Fu, Xiaoming
    Ansari, Nirwan
    Ji, Hong
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (14) : 2062 - 2064