Content-based filtering of Web documents: the MaX system and the EUFORBIA project

Internet filtering has particular requirements which traditional access control approaches cannot satisfy. In this paper, we present a multi-strategy filtering model tailored specifically to both digital library and Web environments whose key features are the support for credential and content-based filtering and its full integration with standard Internet rating systems. Moreover, we describe the prototype system implementing our model and developed in the framework of the European project EUFORBIA.

[1]  David W. Chadwick Understanding X.500 - the directory , 1994 .

[2]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[3]  Elisa Bertino,et al.  An Approach to Authorization Modeling in Object-Oriented Database Systems , 1994, Data Knowl. Eng..

[4]  Gian Piero Zarri,et al.  NKRL, a knowledge representation tool for encoding the ‘meaning’ of complex narrative texts , 1997, Natural Language Engineering.

[5]  Günter Karjoth Authorization in CORBA Security , 2000, J. Comput. Secur..

[6]  Gail-Joon Ahn,et al.  Role-based Access Control on the Web Using LDAP , 2001, DBSec.

[7]  Elisa Bertino,et al.  An Authorization Model for a Distributed Hypertext System , 1996, IEEE Trans. Knowl. Data Eng..

[8]  Gail-Joon Ahn,et al.  Role-based access control on the web , 2001, TSEC.

[9]  Elisa Bertino,et al.  A Content-Based Authorization Model for Digital Libraries , 2002, IEEE Trans. Knowl. Data Eng..

[10]  George Pangalos A tutorial on secure database systems , 1994, Inf. Softw. Technol..

[11]  Paul Resnick,et al.  PICS: Internet access controls without censorship , 1996, CACM.

[12]  C. M. Sperberg-McQueen,et al.  Extensible Markup Language (XML) , 1997, World Wide Web J..

[13]  Marianne Winslett,et al.  Using Digital Credentials on the World Wide Web , 1997, J. Comput. Secur..

[14]  Ehud Gudes,et al.  Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases , 1990, DBSec.

[15]  Ravi S. Sandhu The typed access matrix model , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.