Information content security on the Internet:the control model and its evaluation

被引:4
|
作者
FANG BinXing1
2Institute of Computing Technology
3Graduate University of Chinese Academy of Sciences
4National Computer Network Emergency Response Technical Team/Coordination Center of China
机构
关键词
content security; access control; quantitative evaluation;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the Internet as well as the difficulty in the authentication for the access of specific categories of information, curbing the transmission of harmful information, i.e., assuring the information content security (ICS), has become a reasonable yet challenging alternative. At present, there is an urgent need to develop a systematic model that can effectively carry out the curbing. In fact, curbing the transmission of harmful information by way of filtering can be modeled by access control. In the paper, based on the three core-elements of communication, namely, "Who communicates with whom", "How do they communicate" and "What is the content of communication", we propose a control model, called ICCON. Unlike the existing access control, the reference monitor (RM) of our model is placed in the transmission channel, and moreover, an evaluation frame is proposed, through which the effectiveness of the RM in controlling information transmission on the Internet can be quantitatively evaluated.
引用
收藏
页码:30 / 49
页数:20
相关论文
共 50 条
  • [31] The Study of Content Security for Mobile Internet
    Xu, Qianfang
    Guo, Jun
    Xiao, Bo
    WIRELESS PERSONAL COMMUNICATIONS, 2012, 66 (03) : 523 - 539
  • [32] Approach to the Evaluation of the Efficiency of Information Security in Control Systems
    P. D. Zegzhda
    V. G. Anisimov
    P. V. Sem’yanov
    A. F. Suprun
    E. G. Anisimov
    T. N. Saurenko
    V. P. Los’
    Automatic Control and Computer Sciences, 2020, 54 : 864 - 870
  • [33] Comparison and Evaluation of Information Security Models for Access Control
    Anton, Nicolae
    Nedelcu, Anisor
    ENGINEERING SOLUTIONS AND TECHNOLOGIES IN MANUFACTURING, 2014, 657 : 708 - 712
  • [34] Approach to the Evaluation of the Efficiency of Information Security in Control Systems
    Zegzhda, P. D.
    Anisimov, V. G.
    Sem'yanov, P., V
    Suprun, A. F.
    Anisimov, E. G.
    Saurenko, T. N.
    Los, V. P.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (08) : 864 - 870
  • [35] The Study of Content Security for Mobile Internet
    Qianfang Xu
    Jun Guo
    Bo Xiao
    Wireless Personal Communications, 2012, 66 : 523 - 539
  • [36] A New Ecology Model for Internet Worm Security Threat Evaluation
    Wang XiaoPeng
    Wang Bailing
    Liu Yang
    He Hui
    Sun Yunxiao
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (02): : 107 - 115
  • [37] A new ecology model for internet worm security threat evaluation
    1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Prof B.H.Kang's Office,, Australia (06):
  • [38] An ontological model of the domain of applications for the Internet of Things in analyzing information security
    Lavrova D.S.
    Vasil’ev Y.S.
    Automatic Control and Computer Sciences, 2017, 51 (8) : 817 - 823
  • [39] An Evaluation of the Source and Content of Dupuytren's Disease Information Available on the Internet
    Plusch, Kyle
    Carfagno, Jack
    Givner, Daniel
    Fletcher, Daniel
    Aita, Daren
    Gallant, Greg G.
    Abboudi, Jack
    Beredjiklian, Pedro
    CUREUS JOURNAL OF MEDICAL SCIENCE, 2021, 13 (11)
  • [40] EVALUATION OF THE QUALITY AND CONTENT OF OSTEOPOROSIS PATIENT EDUCATION INFORMATION AVAILABLE ON THE INTERNET
    Gutlapally, S.
    Bhere, D.
    Paide, V. R. R.
    Gnanasam, K.
    VALUE IN HEALTH, 2010, 13 (03) : A134 - A134