Advertisement

Design and Evaluation of Access Control Model Based on Classification of Users’ Network Behaviors

  • Peipeng Liu
  • Jinqiao Shi
  • Fei Xu
  • Lihong Wang
  • Li Guo
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7808)

Abstract

Nowadays, the rapid development of the Internet brings great convenience to people’s daily life and work, but the existence of pornography information seriously endangers the health of youngsters. So researches on network access control model, aiming at preventing youngsters from accessing pornography information, have become a hotspot. However, existing models usually don’t distinguish between adults and youngsters, and they block all the accesses to pornography information, which does not meet the actual demand. So preventing youngsters from accessing pornography information, while not affecting the freedom of expressions in adults, has become a reasonable yet challenging alternative. In this paper, an access control model based on classification of users’ network behaviors is proposed, and this model can effectively make a decision whether to allow one’s access to pornography information according to its age. Besides, an evaluation framework is also proposed, through which the model’s controllability, cost-effectiveness and users’ accessibility are analyzed respectively.

Keywords

Access Control Evaluation Controllability Cost-effectiveness 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Fang, B., Guo, Y., Zhou, Y.: Information content security on the Internet: the control model and its evaluation. Science China Information Sciences (2010)Google Scholar
  2. 2.
    Hongli, Z.: A Survey on Internet Measurement and Analysis. Journal of Software (2003)Google Scholar
  3. 3.
    Fortuna, B., Mladenic, D., Grobelnik, M.: User Modeling Combining Access Logs, Page Content and Semantics. In: 1st International Workshop on Usage Analysis and the Web of Data (USEWOD 2011) in the 20th International World Wide Web Conference (WWW 2011), Hyderabad, India, March 28 (2011)Google Scholar
  4. 4.
    Hu, J., Zeng, H.-J., Li, H., Niu, C., Chen, Z.: Demographic prediction based on user’s browsing behavior. In: Proceedings of the 16th International Conference on World Wide Web, Banff, Alberta, Canada, pp. 151–160. ACM (2007)Google Scholar
  5. 5.
    Lihua, Y., Binxing, F.: Research on controllability of internet information content security. Networked Digital Technologies (2009)Google Scholar
  6. 6.
    Liu, Y.-Y.: Controllability of complex networks. Nature 473, 167–173 (2011)CrossRefGoogle Scholar
  7. 7.
    Park, J., Sandhu, R.: The UCONabc usage control model. ACM Transactions on Information and System Security 7(1), 128–174 (2004)CrossRefGoogle Scholar
  8. 8.
    Peter, R.W.: There is a need to regular indecency on the internet. 6 CORNELL J.L. & PUB.POL’y 363 (1997)Google Scholar
  9. 9.
    Wiedenbeck, S., Waters, J., et al.: PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies 63(1-2), 102–127 (2005)Google Scholar
  10. 10.
    Wei, J.: Evaluating Network Security and Optimal Active Defense Based on Attack-Defense Game Model. Chinese Journal of Computers (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Peipeng Liu
    • 1
    • 2
    • 3
    • 4
  • Jinqiao Shi
    • 3
    • 4
  • Fei Xu
    • 3
    • 4
  • Lihong Wang
    • 1
  • Li Guo
    • 3
    • 4
  1. 1.Institute of Computing TechnologyCASChina
  2. 2.Graduate University, CASChina
  3. 3.Institute of Information EngineeringCASChina
  4. 4.National Engineering Laboratory for Information Security TechnologiesIIEChina

Personalised recommendations