Information content security on the Internet: the control model and its evaluation
Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the Internet as well as the difficulty in the authentication for the access of specific categories of information, curbing the transmission of harmful...
Gespeichert in:
Veröffentlicht in: | Science China. Information sciences 2010-01, Vol.53 (1), p.30-49 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 49 |
---|---|
container_issue | 1 |
container_start_page | 30 |
container_title | Science China. Information sciences |
container_volume | 53 |
creator | Fang, BinXing Guo, YunChuan Zhou, Yuan |
description | Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the Internet as well as the difficulty in the authentication for the access of specific categories of information, curbing the transmission of harmful information, i.e., assuring the information content security (ICS), has become a reasonable yet challenging alternative. At present, there is an urgent need to develop a systematic model that can effectively carry out the curbing. In fact, curbing the transmission of harmful information by way of filtering can be modeled by access control. In the paper, based on the three core-elements of communication, namely, "Who communicates with whom", "How do they communicate" and "What is the content of communication", we propose a control model, called ICCON. Unlike the existing access control, the reference monitor (RM) of our model is placed in the transmission channel, and moreover, an evaluation frame is proposed, through which the effectiveness of the RM in controlling information transmission on the Internet can be quantitatively evaluated. |
doi_str_mv | 10.1007/s11432-010-0014-z |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_869847321</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>33054047</cqvip_id><sourcerecordid>869847321</sourcerecordid><originalsourceid>FETCH-LOGICAL-c375t-22b2c9005de07ca75fe2226bb4b3b206b24847de0737780d2835d66b55adac93</originalsourceid><addsrcrecordid>eNp9kb1OwzAUhSMEElXpA7BFMDAZ_BPHyYgqfipVYunAZtmO06Ykdms7SOVReBbeiVfAaSshMeDFvtffOb46TpJLBG8RhOzOI5QRDCCCAEKUgY-TZISKvASoROVpPOcsA4yQ1_Nk4v0axkUIxKwYJYuZqa3rRGisSZU1QZuQeq1614RdGnthpdNZbDujw_fX574eOGfbtLOVblNhqrQJPtXvou33RhfJWS1aryfHfZwsHh8W02cwf3maTe_nQBFGA8BYYlVCSCsNmRKM1hpjnEuZSSIxzCXOiowNl4SxAla4ILTKc0mpqIQqyTi5OdhunN322gfeNV7pthVG297zmEDUE4wief2HXNvemTgbxyUqaEkoxZFCB0o5673TNd-4phNuxxHkQ9D8EDSPQfMhaP4RNfig8ZE1S-1-nf8TXR0fWlmz3EYdl0K91U2refwYmsE49g_1W4z5</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918593552</pqid></control><display><type>article</type><title>Information content security on the Internet: the control model and its evaluation</title><source>Alma/SFX Local Collection</source><source>SpringerLink Journals - AutoHoldings</source><source>ProQuest Central</source><creator>Fang, BinXing ; Guo, YunChuan ; Zhou, Yuan</creator><creatorcontrib>Fang, BinXing ; Guo, YunChuan ; Zhou, Yuan</creatorcontrib><description>Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the Internet as well as the difficulty in the authentication for the access of specific categories of information, curbing the transmission of harmful information, i.e., assuring the information content security (ICS), has become a reasonable yet challenging alternative. At present, there is an urgent need to develop a systematic model that can effectively carry out the curbing. In fact, curbing the transmission of harmful information by way of filtering can be modeled by access control. In the paper, based on the three core-elements of communication, namely, "Who communicates with whom", "How do they communicate" and "What is the content of communication", we propose a control model, called ICCON. Unlike the existing access control, the reference monitor (RM) of our model is placed in the transmission channel, and moreover, an evaluation frame is proposed, through which the effectiveness of the RM in controlling information transmission on the Internet can be quantitatively evaluated.</description><identifier>ISSN: 1674-733X</identifier><identifier>EISSN: 1869-1919</identifier><identifier>DOI: 10.1007/s11432-010-0014-z</identifier><language>eng</language><publisher>Heidelberg: SP Science China Press</publisher><subject>Access control ; Authentication ; Categories ; Channels ; Computer information security ; Computer Science ; Filtering ; Flooding ; Information Systems and Communication Service ; Internet ; Monitors ; Research Papers ; Security ; 互联网 ; 传输通道 ; 内容安全 ; 心理健康 ; 有害信息 ; 访问控制模型</subject><ispartof>Science China. Information sciences, 2010-01, Vol.53 (1), p.30-49</ispartof><rights>Science in China Press and Springer Berlin Heidelberg 2010</rights><rights>Science in China Press and Springer Berlin Heidelberg 2010.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c375t-22b2c9005de07ca75fe2226bb4b3b206b24847de0737780d2835d66b55adac93</citedby><cites>FETCH-LOGICAL-c375t-22b2c9005de07ca75fe2226bb4b3b206b24847de0737780d2835d66b55adac93</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/84009A/84009A.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11432-010-0014-z$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918593552?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,776,780,21369,27903,27904,33723,33724,41467,42536,43784,51297</link.rule.ids></links><search><creatorcontrib>Fang, BinXing</creatorcontrib><creatorcontrib>Guo, YunChuan</creatorcontrib><creatorcontrib>Zhou, Yuan</creatorcontrib><title>Information content security on the Internet: the control model and its evaluation</title><title>Science China. Information sciences</title><addtitle>Sci. China Ser. F-Inf. Sci</addtitle><addtitle>SCIENCE CHINA Information Sciences</addtitle><description>Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the Internet as well as the difficulty in the authentication for the access of specific categories of information, curbing the transmission of harmful information, i.e., assuring the information content security (ICS), has become a reasonable yet challenging alternative. At present, there is an urgent need to develop a systematic model that can effectively carry out the curbing. In fact, curbing the transmission of harmful information by way of filtering can be modeled by access control. In the paper, based on the three core-elements of communication, namely, "Who communicates with whom", "How do they communicate" and "What is the content of communication", we propose a control model, called ICCON. Unlike the existing access control, the reference monitor (RM) of our model is placed in the transmission channel, and moreover, an evaluation frame is proposed, through which the effectiveness of the RM in controlling information transmission on the Internet can be quantitatively evaluated.</description><subject>Access control</subject><subject>Authentication</subject><subject>Categories</subject><subject>Channels</subject><subject>Computer information security</subject><subject>Computer Science</subject><subject>Filtering</subject><subject>Flooding</subject><subject>Information Systems and Communication Service</subject><subject>Internet</subject><subject>Monitors</subject><subject>Research Papers</subject><subject>Security</subject><subject>互联网</subject><subject>传输通道</subject><subject>内容安全</subject><subject>心理健康</subject><subject>有害信息</subject><subject>访问控制模型</subject><issn>1674-733X</issn><issn>1869-1919</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNp9kb1OwzAUhSMEElXpA7BFMDAZ_BPHyYgqfipVYunAZtmO06Ykdms7SOVReBbeiVfAaSshMeDFvtffOb46TpJLBG8RhOzOI5QRDCCCAEKUgY-TZISKvASoROVpPOcsA4yQ1_Nk4v0axkUIxKwYJYuZqa3rRGisSZU1QZuQeq1614RdGnthpdNZbDujw_fX574eOGfbtLOVblNhqrQJPtXvou33RhfJWS1aryfHfZwsHh8W02cwf3maTe_nQBFGA8BYYlVCSCsNmRKM1hpjnEuZSSIxzCXOiowNl4SxAla4ILTKc0mpqIQqyTi5OdhunN322gfeNV7pthVG297zmEDUE4wief2HXNvemTgbxyUqaEkoxZFCB0o5673TNd-4phNuxxHkQ9D8EDSPQfMhaP4RNfig8ZE1S-1-nf8TXR0fWlmz3EYdl0K91U2refwYmsE49g_1W4z5</recordid><startdate>20100101</startdate><enddate>20100101</enddate><creator>Fang, BinXing</creator><creator>Guo, YunChuan</creator><creator>Zhou, Yuan</creator><general>SP Science China Press</general><general>Springer Nature B.V</general><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>W92</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>7SC</scope><scope>8FD</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20100101</creationdate><title>Information content security on the Internet: the control model and its evaluation</title><author>Fang, BinXing ; Guo, YunChuan ; Zhou, Yuan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c375t-22b2c9005de07ca75fe2226bb4b3b206b24847de0737780d2835d66b55adac93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Access control</topic><topic>Authentication</topic><topic>Categories</topic><topic>Channels</topic><topic>Computer information security</topic><topic>Computer Science</topic><topic>Filtering</topic><topic>Flooding</topic><topic>Information Systems and Communication Service</topic><topic>Internet</topic><topic>Monitors</topic><topic>Research Papers</topic><topic>Security</topic><topic>互联网</topic><topic>传输通道</topic><topic>内容安全</topic><topic>心理健康</topic><topic>有害信息</topic><topic>访问控制模型</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Fang, BinXing</creatorcontrib><creatorcontrib>Guo, YunChuan</creatorcontrib><creatorcontrib>Zhou, Yuan</creatorcontrib><collection>中文科技期刊数据库</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>中文科技期刊数据库-7.0平台</collection><collection>中文科技期刊数据库-工程技术</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Science China. Information sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Fang, BinXing</au><au>Guo, YunChuan</au><au>Zhou, Yuan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Information content security on the Internet: the control model and its evaluation</atitle><jtitle>Science China. Information sciences</jtitle><stitle>Sci. China Ser. F-Inf. Sci</stitle><addtitle>SCIENCE CHINA Information Sciences</addtitle><date>2010-01-01</date><risdate>2010</risdate><volume>53</volume><issue>1</issue><spage>30</spage><epage>49</epage><pages>30-49</pages><issn>1674-733X</issn><eissn>1869-1919</eissn><abstract>Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the Internet as well as the difficulty in the authentication for the access of specific categories of information, curbing the transmission of harmful information, i.e., assuring the information content security (ICS), has become a reasonable yet challenging alternative. At present, there is an urgent need to develop a systematic model that can effectively carry out the curbing. In fact, curbing the transmission of harmful information by way of filtering can be modeled by access control. In the paper, based on the three core-elements of communication, namely, "Who communicates with whom", "How do they communicate" and "What is the content of communication", we propose a control model, called ICCON. Unlike the existing access control, the reference monitor (RM) of our model is placed in the transmission channel, and moreover, an evaluation frame is proposed, through which the effectiveness of the RM in controlling information transmission on the Internet can be quantitatively evaluated.</abstract><cop>Heidelberg</cop><pub>SP Science China Press</pub><doi>10.1007/s11432-010-0014-z</doi><tpages>20</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1674-733X |
ispartof | Science China. Information sciences, 2010-01, Vol.53 (1), p.30-49 |
issn | 1674-733X 1869-1919 |
language | eng |
recordid | cdi_proquest_miscellaneous_869847321 |
source | Alma/SFX Local Collection; SpringerLink Journals - AutoHoldings; ProQuest Central |
subjects | Access control Authentication Categories Channels Computer information security Computer Science Filtering Flooding Information Systems and Communication Service Internet Monitors Research Papers Security 互联网 传输通道 内容安全 心理健康 有害信息 访问控制模型 |
title | Information content security on the Internet: the control model and its evaluation |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T02%3A13%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Information%20content%20security%20on%20the%20Internet%EF%BC%9A%20the%20control%20model%20and%20its%20evaluation&rft.jtitle=Science%20China.%20Information%20sciences&rft.au=Fang,%20BinXing&rft.date=2010-01-01&rft.volume=53&rft.issue=1&rft.spage=30&rft.epage=49&rft.pages=30-49&rft.issn=1674-733X&rft.eissn=1869-1919&rft_id=info:doi/10.1007/s11432-010-0014-z&rft_dat=%3Cproquest_cross%3E869847321%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918593552&rft_id=info:pmid/&rft_cqvip_id=33054047&rfr_iscdi=true |