Design and Evaluation of Access Control Model Based on Classification of Users’ Network Behaviors
Nowadays, the rapid development of the Internet brings great convenience to people’s daily life and work, but the existence of pornography information seriously endangers the health of youngsters. So researches on network access control model, aiming at preventing youngsters from accessing pornography information, have become a hotspot. However, existing models usually don’t distinguish between adults and youngsters, and they block all the accesses to pornography information, which does not meet the actual demand. So preventing youngsters from accessing pornography information, while not affecting the freedom of expressions in adults, has become a reasonable yet challenging alternative. In this paper, an access control model based on classification of users’ network behaviors is proposed, and this model can effectively make a decision whether to allow one’s access to pornography information according to its age. Besides, an evaluation framework is also proposed, through which the model’s controllability, cost-effectiveness and users’ accessibility are analyzed respectively.
KeywordsAccess Control Evaluation Controllability Cost-effectiveness
Unable to display preview. Download preview PDF.
- 1.Fang, B., Guo, Y., Zhou, Y.: Information content security on the Internet: the control model and its evaluation. Science China Information Sciences (2010)Google Scholar
- 2.Hongli, Z.: A Survey on Internet Measurement and Analysis. Journal of Software (2003)Google Scholar
- 3.Fortuna, B., Mladenic, D., Grobelnik, M.: User Modeling Combining Access Logs, Page Content and Semantics. In: 1st International Workshop on Usage Analysis and the Web of Data (USEWOD 2011) in the 20th International World Wide Web Conference (WWW 2011), Hyderabad, India, March 28 (2011)Google Scholar
- 4.Hu, J., Zeng, H.-J., Li, H., Niu, C., Chen, Z.: Demographic prediction based on user’s browsing behavior. In: Proceedings of the 16th International Conference on World Wide Web, Banff, Alberta, Canada, pp. 151–160. ACM (2007)Google Scholar
- 5.Lihua, Y., Binxing, F.: Research on controllability of internet information content security. Networked Digital Technologies (2009)Google Scholar
- 8.Peter, R.W.: There is a need to regular indecency on the internet. 6 CORNELL J.L. & PUB.POL’y 363 (1997)Google Scholar
- 9.Wiedenbeck, S., Waters, J., et al.: PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies 63(1-2), 102–127 (2005)Google Scholar
- 10.Wei, J.: Evaluating Network Security and Optimal Active Defense Based on Attack-Defense Game Model. Chinese Journal of Computers (2008)Google Scholar