Skip to main content
Log in

Content-based filtering of Web documents: the MaX system and the EUFORBIA project

  • Regular contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

Internet filtering has particular requirements which traditional access control approaches cannot satisfy. In this paper, we present a multi-strategy filtering model tailored specifically to both digital library and Web environments whose key features are the support for credential and content-based filtering and its full integration with standard Internet rating systems. Moreover, we describe the prototype system implementing our model and developed in the framework of the European project EUFORBIA.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. The EUFORBIA project http://www.saferinternet.org/filtering/euforbia.asp

  2. Safer Internet Action Plan (IAP) http://www.saferinternet.org/

  3. RBAC’95, Proceedings of the 1st ACM workshop on role-based access control, 30 November–2 December 1995, Gaithersburg, MD

  4. Adam NA, Atluri V, Bertino E, Ferrari E (2002) A content-based authorization model for digital libraries. IEEE Trans Knowl Data Eng 14(2):296–315

    Article  Google Scholar 

  5. Bertino E, Weigand H (1994) An approach to authorization modeling in object-oriented database systems. Data Knowl Eng 12(1):1–29

    Article  Google Scholar 

  6. Chadwick D-W (1996) Understanding X.500 – The Directory. International Thomson Computer Press, London

  7. Gudes E, Song H, Fernández EB (1990) Evolution of negative, predicate, and instance-based authorization in object-oriented databases. In: Database security, vol IV: Status and prospects. Results of the IFIP WG 11.3 workshop on database security, Halifax, UK, 18–21 September 1990, pp 85–98

  8. Humenn P (2000) A language for access control in CORBA Security. In: OMG. Results of the DOCsec workshop in Boston, MA, April 2000

  9. International Telecommunication Union (2001) X.500. Information technology – Open systems interconnection – The Directory: overview of concepts, models and services. ITU-T Recommendation February 2001 (ISO/IEC 9594-1:2001)

  10. Karjoth G (1998) Authorization in CORBA Security. In: Proceedings of the 5th European symposium on research in computer security (ESORICS’98), Louvain-la-Neuve, Belgium, 16–18 September 1998. Lecture notes in computer science, vol 1485, Springer, Berlin Heidelberg New York, pp 143–158

  11. Lampson B (1971) Protection. In: Proceedings of the 5th annual Princeton conference on information sciences and systems. Princeton University, Princeton, NJ, pp 437–443

  12. Object Management Group (2002) CORBAservices. Security Service 1.8. OMG Specification 11 March 2002. Available at: http://www.omg.org/cgi-bin/doc?formal/2002-03-11

  13. Park JS, Ahn G-J, Sandhu RS (2001) Role-based access control on the Web using LDAP. In: Proceedings of Database and Application Security XV, IFIP TC11/WG11.3 15th annual working conference on database and application security, 15–18 July 2001, Niagara on the Lake, Ontario, Canada, 15:19–30

  14. Park JS, Sandhu RS, Ahn G-J (2001) Role-based access control on the Web. ACM Trans Inform Sys Secur 4(1):37–71

    Article  Google Scholar 

  15. Resnick P, Miller J (1996) PICS: Internet access controls without censorship. Commun ACM 39(10):87–93

    Article  Google Scholar 

  16. Samarati P, Bertino E, Jajodia S (1996) An authorization model for a distributed hypertext system. IEEE Trans Knowl Data Eng 8(4):555–562

    Article  Google Scholar 

  17. Sandhu RS (1992) The Typed Access Matrix model. In: Proceedings of the IEEE symposium on research in security and privacy (S&P’92), Oakland, CA, 4–6 May 1992. Computer Society Press, New York, pp 122–136

  18. Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. IEEE Comput 29(2):38–47

    Article  Google Scholar 

  19. Thuraisingham BM (1992) A tutorial in secure database systems. Technical report, MITRE

  20. Winslett M, Ching N, Jones V, Slepchin I (1997) Using digital credentials on the World Wide Web. J Comput Secur 5(3):255–266

    Article  Google Scholar 

  21. World Wide Web Consortium (1996a) PICS label distribution, label syntax and communication protocols 1.1. W3C Recommendation 31 October 1996. Available at: http://www.w3.org/TR/REC-PICS-labels

  22. World Wide Web Consortium (1996b) Rating services and rating systems (and their machine readable descriptions) 1.1. W3C Recommendation 31 October 1996. Available at: http://www.w3.org/TR/REC-PICS-services

  23. World Wide Web Consortium (1997) PICSRules 1.1. W3C Recommendation 29 December 1997. Available at: http://www.w3.org/TR/REC-PICSRules

  24. World Wide Web Consortium (1999a) Resource Description Framework (RDF) model and syntax specification. W3C Recommendation 22 February 1999. Available at: http://www.w3.org/TR/1999/REC-rdf-syntax

  25. World Wide Web Consortium (1999b) HTML 4.01 Specification. W3C Recommendation 24 December 1999. Available at: http://www.w3.org/TR/html4

  26. World Wide Web Consortium (2000) Extensible Markup Language (XML) 1.0, 2nd edn. W3C Recommendation 6 October 2000. Available at: http://www.w3.org/TR/REC-xml

  27. World Wide Web Consortium (2003) PICS rating vocabularies in XML/RDF. W3C Note 27 March 2000. Available at: http://www.w3.org/TR/rdf-pics

  28. Zarri GP (1997) NKRL, a knowledge representation tool for encoding the ‘meaning’ of complex narrative texts. Nat Lang Eng – Special Issue Knowl Represent Nat Lang Process Implem Sys 3:231–253

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Elisa Bertino, Elena Ferrari or Andrea Perego.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bertino, E., Ferrari, E. & Perego, A. Content-based filtering of Web documents: the MaX system and the EUFORBIA project. IJIS 2, 45–58 (2003). https://doi.org/10.1007/s10207-003-0024-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-003-0024-6

Keywords

Navigation