Information content security on the Internet: the control model and its evaluation

Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the Internet as well as the difficulty in the authentication for the access of specific categories of information, curbing the transmission of harmful...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Science China. Information sciences 2010-01, Vol.53 (1), p.30-49
Hauptverfasser: Fang, BinXing, Guo, YunChuan, Zhou, Yuan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 49
container_issue 1
container_start_page 30
container_title Science China. Information sciences
container_volume 53
creator Fang, BinXing
Guo, YunChuan
Zhou, Yuan
description Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the Internet as well as the difficulty in the authentication for the access of specific categories of information, curbing the transmission of harmful information, i.e., assuring the information content security (ICS), has become a reasonable yet challenging alternative. At present, there is an urgent need to develop a systematic model that can effectively carry out the curbing. In fact, curbing the transmission of harmful information by way of filtering can be modeled by access control. In the paper, based on the three core-elements of communication, namely, "Who communicates with whom", "How do they communicate" and "What is the content of communication", we propose a control model, called ICCON. Unlike the existing access control, the reference monitor (RM) of our model is placed in the transmission channel, and moreover, an evaluation frame is proposed, through which the effectiveness of the RM in controlling information transmission on the Internet can be quantitatively evaluated.
doi_str_mv 10.1007/s11432-010-0014-z
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_869847321</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>33054047</cqvip_id><sourcerecordid>869847321</sourcerecordid><originalsourceid>FETCH-LOGICAL-c375t-22b2c9005de07ca75fe2226bb4b3b206b24847de0737780d2835d66b55adac93</originalsourceid><addsrcrecordid>eNp9kb1OwzAUhSMEElXpA7BFMDAZ_BPHyYgqfipVYunAZtmO06Ykdms7SOVReBbeiVfAaSshMeDFvtffOb46TpJLBG8RhOzOI5QRDCCCAEKUgY-TZISKvASoROVpPOcsA4yQ1_Nk4v0axkUIxKwYJYuZqa3rRGisSZU1QZuQeq1614RdGnthpdNZbDujw_fX574eOGfbtLOVblNhqrQJPtXvou33RhfJWS1aryfHfZwsHh8W02cwf3maTe_nQBFGA8BYYlVCSCsNmRKM1hpjnEuZSSIxzCXOiowNl4SxAla4ILTKc0mpqIQqyTi5OdhunN322gfeNV7pthVG297zmEDUE4wief2HXNvemTgbxyUqaEkoxZFCB0o5673TNd-4phNuxxHkQ9D8EDSPQfMhaP4RNfig8ZE1S-1-nf8TXR0fWlmz3EYdl0K91U2refwYmsE49g_1W4z5</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918593552</pqid></control><display><type>article</type><title>Information content security on the Internet: the control model and its evaluation</title><source>Alma/SFX Local Collection</source><source>SpringerLink Journals - AutoHoldings</source><source>ProQuest Central</source><creator>Fang, BinXing ; Guo, YunChuan ; Zhou, Yuan</creator><creatorcontrib>Fang, BinXing ; Guo, YunChuan ; Zhou, Yuan</creatorcontrib><description>Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the Internet as well as the difficulty in the authentication for the access of specific categories of information, curbing the transmission of harmful information, i.e., assuring the information content security (ICS), has become a reasonable yet challenging alternative. At present, there is an urgent need to develop a systematic model that can effectively carry out the curbing. In fact, curbing the transmission of harmful information by way of filtering can be modeled by access control. In the paper, based on the three core-elements of communication, namely, "Who communicates with whom", "How do they communicate" and "What is the content of communication", we propose a control model, called ICCON. Unlike the existing access control, the reference monitor (RM) of our model is placed in the transmission channel, and moreover, an evaluation frame is proposed, through which the effectiveness of the RM in controlling information transmission on the Internet can be quantitatively evaluated.</description><identifier>ISSN: 1674-733X</identifier><identifier>EISSN: 1869-1919</identifier><identifier>DOI: 10.1007/s11432-010-0014-z</identifier><language>eng</language><publisher>Heidelberg: SP Science China Press</publisher><subject>Access control ; Authentication ; Categories ; Channels ; Computer information security ; Computer Science ; Filtering ; Flooding ; Information Systems and Communication Service ; Internet ; Monitors ; Research Papers ; Security ; 互联网 ; 传输通道 ; 内容安全 ; 心理健康 ; 有害信息 ; 访问控制模型</subject><ispartof>Science China. Information sciences, 2010-01, Vol.53 (1), p.30-49</ispartof><rights>Science in China Press and Springer Berlin Heidelberg 2010</rights><rights>Science in China Press and Springer Berlin Heidelberg 2010.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c375t-22b2c9005de07ca75fe2226bb4b3b206b24847de0737780d2835d66b55adac93</citedby><cites>FETCH-LOGICAL-c375t-22b2c9005de07ca75fe2226bb4b3b206b24847de0737780d2835d66b55adac93</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/84009A/84009A.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11432-010-0014-z$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918593552?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,776,780,21369,27903,27904,33723,33724,41467,42536,43784,51297</link.rule.ids></links><search><creatorcontrib>Fang, BinXing</creatorcontrib><creatorcontrib>Guo, YunChuan</creatorcontrib><creatorcontrib>Zhou, Yuan</creatorcontrib><title>Information content security on the Internet: the control model and its evaluation</title><title>Science China. Information sciences</title><addtitle>Sci. China Ser. F-Inf. Sci</addtitle><addtitle>SCIENCE CHINA Information Sciences</addtitle><description>Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the Internet as well as the difficulty in the authentication for the access of specific categories of information, curbing the transmission of harmful information, i.e., assuring the information content security (ICS), has become a reasonable yet challenging alternative. At present, there is an urgent need to develop a systematic model that can effectively carry out the curbing. In fact, curbing the transmission of harmful information by way of filtering can be modeled by access control. In the paper, based on the three core-elements of communication, namely, "Who communicates with whom", "How do they communicate" and "What is the content of communication", we propose a control model, called ICCON. Unlike the existing access control, the reference monitor (RM) of our model is placed in the transmission channel, and moreover, an evaluation frame is proposed, through which the effectiveness of the RM in controlling information transmission on the Internet can be quantitatively evaluated.</description><subject>Access control</subject><subject>Authentication</subject><subject>Categories</subject><subject>Channels</subject><subject>Computer information security</subject><subject>Computer Science</subject><subject>Filtering</subject><subject>Flooding</subject><subject>Information Systems and Communication Service</subject><subject>Internet</subject><subject>Monitors</subject><subject>Research Papers</subject><subject>Security</subject><subject>互联网</subject><subject>传输通道</subject><subject>内容安全</subject><subject>心理健康</subject><subject>有害信息</subject><subject>访问控制模型</subject><issn>1674-733X</issn><issn>1869-1919</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNp9kb1OwzAUhSMEElXpA7BFMDAZ_BPHyYgqfipVYunAZtmO06Ykdms7SOVReBbeiVfAaSshMeDFvtffOb46TpJLBG8RhOzOI5QRDCCCAEKUgY-TZISKvASoROVpPOcsA4yQ1_Nk4v0axkUIxKwYJYuZqa3rRGisSZU1QZuQeq1614RdGnthpdNZbDujw_fX574eOGfbtLOVblNhqrQJPtXvou33RhfJWS1aryfHfZwsHh8W02cwf3maTe_nQBFGA8BYYlVCSCsNmRKM1hpjnEuZSSIxzCXOiowNl4SxAla4ILTKc0mpqIQqyTi5OdhunN322gfeNV7pthVG297zmEDUE4wief2HXNvemTgbxyUqaEkoxZFCB0o5673TNd-4phNuxxHkQ9D8EDSPQfMhaP4RNfig8ZE1S-1-nf8TXR0fWlmz3EYdl0K91U2refwYmsE49g_1W4z5</recordid><startdate>20100101</startdate><enddate>20100101</enddate><creator>Fang, BinXing</creator><creator>Guo, YunChuan</creator><creator>Zhou, Yuan</creator><general>SP Science China Press</general><general>Springer Nature B.V</general><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>W92</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>7SC</scope><scope>8FD</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20100101</creationdate><title>Information content security on the Internet: the control model and its evaluation</title><author>Fang, BinXing ; Guo, YunChuan ; Zhou, Yuan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c375t-22b2c9005de07ca75fe2226bb4b3b206b24847de0737780d2835d66b55adac93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Access control</topic><topic>Authentication</topic><topic>Categories</topic><topic>Channels</topic><topic>Computer information security</topic><topic>Computer Science</topic><topic>Filtering</topic><topic>Flooding</topic><topic>Information Systems and Communication Service</topic><topic>Internet</topic><topic>Monitors</topic><topic>Research Papers</topic><topic>Security</topic><topic>互联网</topic><topic>传输通道</topic><topic>内容安全</topic><topic>心理健康</topic><topic>有害信息</topic><topic>访问控制模型</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Fang, BinXing</creatorcontrib><creatorcontrib>Guo, YunChuan</creatorcontrib><creatorcontrib>Zhou, Yuan</creatorcontrib><collection>中文科技期刊数据库</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>中文科技期刊数据库-7.0平台</collection><collection>中文科技期刊数据库-工程技术</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Science China. Information sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Fang, BinXing</au><au>Guo, YunChuan</au><au>Zhou, Yuan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Information content security on the Internet: the control model and its evaluation</atitle><jtitle>Science China. Information sciences</jtitle><stitle>Sci. China Ser. F-Inf. Sci</stitle><addtitle>SCIENCE CHINA Information Sciences</addtitle><date>2010-01-01</date><risdate>2010</risdate><volume>53</volume><issue>1</issue><spage>30</spage><epage>49</epage><pages>30-49</pages><issn>1674-733X</issn><eissn>1869-1919</eissn><abstract>Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the Internet as well as the difficulty in the authentication for the access of specific categories of information, curbing the transmission of harmful information, i.e., assuring the information content security (ICS), has become a reasonable yet challenging alternative. At present, there is an urgent need to develop a systematic model that can effectively carry out the curbing. In fact, curbing the transmission of harmful information by way of filtering can be modeled by access control. In the paper, based on the three core-elements of communication, namely, "Who communicates with whom", "How do they communicate" and "What is the content of communication", we propose a control model, called ICCON. Unlike the existing access control, the reference monitor (RM) of our model is placed in the transmission channel, and moreover, an evaluation frame is proposed, through which the effectiveness of the RM in controlling information transmission on the Internet can be quantitatively evaluated.</abstract><cop>Heidelberg</cop><pub>SP Science China Press</pub><doi>10.1007/s11432-010-0014-z</doi><tpages>20</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1674-733X
ispartof Science China. Information sciences, 2010-01, Vol.53 (1), p.30-49
issn 1674-733X
1869-1919
language eng
recordid cdi_proquest_miscellaneous_869847321
source Alma/SFX Local Collection; SpringerLink Journals - AutoHoldings; ProQuest Central
subjects Access control
Authentication
Categories
Channels
Computer information security
Computer Science
Filtering
Flooding
Information Systems and Communication Service
Internet
Monitors
Research Papers
Security
互联网
传输通道
内容安全
心理健康
有害信息
访问控制模型
title Information content security on the Internet: the control model and its evaluation
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T02%3A13%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Information%20content%20security%20on%20the%20Internet%EF%BC%9A%20the%20control%20model%20and%20its%20evaluation&rft.jtitle=Science%20China.%20Information%20sciences&rft.au=Fang,%20BinXing&rft.date=2010-01-01&rft.volume=53&rft.issue=1&rft.spage=30&rft.epage=49&rft.pages=30-49&rft.issn=1674-733X&rft.eissn=1869-1919&rft_id=info:doi/10.1007/s11432-010-0014-z&rft_dat=%3Cproquest_cross%3E869847321%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918593552&rft_id=info:pmid/&rft_cqvip_id=33054047&rfr_iscdi=true