Information content security on the Internet:the control model and its evaluation

被引:4
|
作者
FANG BinXing1
2Institute of Computing Technology
3Graduate University of Chinese Academy of Sciences
4National Computer Network Emergency Response Technical Team/Coordination Center of China
机构
关键词
content security; access control; quantitative evaluation;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the Internet as well as the difficulty in the authentication for the access of specific categories of information, curbing the transmission of harmful information, i.e., assuring the information content security (ICS), has become a reasonable yet challenging alternative. At present, there is an urgent need to develop a systematic model that can effectively carry out the curbing. In fact, curbing the transmission of harmful information by way of filtering can be modeled by access control. In the paper, based on the three core-elements of communication, namely, "Who communicates with whom", "How do they communicate" and "What is the content of communication", we propose a control model, called ICCON. Unlike the existing access control, the reference monitor (RM) of our model is placed in the transmission channel, and moreover, an evaluation frame is proposed, through which the effectiveness of the RM in controlling information transmission on the Internet can be quantitatively evaluated.
引用
收藏
页码:30 / 49
页数:20
相关论文
共 50 条
  • [41] A security evaluation model and toolkit for enterprise information systems
    Yan, Q.
    FRONTIERS IN ENTERPRISE INTEGRATION, 2008, : 27 - 32
  • [42] AN EVALUATION MODEL OF INFORMATION SECURITY MANAGEMENT OF MEDICAL STAFF
    Liao, Kuo-Hsiung
    Chueh, Hao-En
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (11): : 7865 - 7873
  • [43] RESEARCH ON INFORMATION SECURITY EVALUATION MODEL OF PUBLIC INSTITUTION
    Feng Hua
    Wei Weimin
    Kong Zhiwei
    Yang Shuo
    2017 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ISPACS 2017), 2017, : 247 - 250
  • [44] A multifaceted, evaluation of the reference model of information assurance & security
    Cherdantseva, Yulia
    Hilton, Jeremy
    Rana, Omer
    Ivins, Wendy
    COMPUTERS & SECURITY, 2016, 63 : 45 - 66
  • [45] Security Information Flow Control Model and Method in MILS
    Zhou Yinping
    Shen Yulong
    Pei Qingqi
    Cui Xining
    Li Yahui
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 591 - 595
  • [46] Research on Information Security Evaluation of Internet of Things Electronic Commerce Based On AHP
    Huang Man-ying
    HIGH PERFORMANCE STRUCTURES AND MATERIALS ENGINEERING, PTS 1 AND 2, 2011, 217-218 : 1355 - 1360
  • [47] A model for deriving information security control attribute profiles
    van der Haar, H
    von Solms, R
    COMPUTERS & SECURITY, 2003, 22 (03) : 233 - 244
  • [48] Security and accuracy of medical information on the Internet
    Ho, K
    CANADIAN MEDICAL ASSOCIATION JOURNAL, 1996, 154 (11) : 1621 - 1622
  • [49] Information Security Theory for the Future Internet
    Malyuk, Anatoly
    Miloslavskaya, Natalia
    2015 3RD INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD) AND INTERNATIONAL CONFERENCE ON OPEN AND BIG (OBD), 2015, : 150 - 157
  • [50] Investigation of the Information Security in Mobile Internet
    Zhang, Pengwei
    Jiao, Xiaojing
    Zhou, Ruijin
    ADVANCED RESEARCH ON COMPUTER SCIENCE AND INFORMATION ENGINEERING, 2011, 153 : 140 - 144