A Multi - Stage Filtering Scheme for Internet Access Control Ghassan

نویسنده

  • Ghassan F. Issa
چکیده

ةیتوبكنعلا ةكبشلا و ينورتكللإا ثدحتلا و دیربلا لثم ةددعتملا اھتامدخب تینرتنلإا ةكبش ربتعت لا تامولعملا لدابت و لقنل ةیلاعف رثكلأا ةقیرط . يتلا تایوتحملاب ةمحدزم تدغ ةكبشلا هذھ نأ لاإ امداصت تببس " احضاو " امداصت لب اندیلاقت و انتاداع عم " نوناقلا عم . ةلیلق و ةئیذبلا عقاوملا ةیرصنعلا و ةیھاركلا ىلع عجشت يتلا عقاوملا و ةیحابلإا تایوتحملا تاذ ماشتحلاا لاإ تسیل يھ لافطلأا مھنمض نم و تینرتنلإا ةكبش يمدختسم ةفاكل ةرفوتملا داوملا نم ةلثملأا ضعب . و لبس نع ثحبلاب دیدعلا أدب دقف نیمدختسملا ةیامحل ةمراصلا نیناوقلا و تاعیرشتلا رفوت نیحل انامأ رثكأ اھلعجل تینرتنلإا تایوتحم ةیقنت و ةبقارمل " ةمداقلا لایجلأل . عتسیو ةمدختسملا بیلاسلأا نم ددع مییقت و ةسارد للاخ نم ةیامحلا قرط ضعب ثحبلا اذھ ضر اجذومن ثحبلا مدقی امك ،تینرتنلإا ةكبش تایوتحم ةیقنتل " ةددعتم ةیقنتلا تایجمرب ءانبل ةلاعف ةقیرطب ةئیدرلا عقاوملا ىلا لوصولا عنم عیطتست يتلا و لحارملا . The Information superhighway with its tools such as electronic mail, bulletin boards, chat rooms and the World Wide Web has become the ultimate source of communication and endless information exchange. This superhighway however, has been jammed with material causing serious clashes with our traditions, moral standards, and even the law. Pornography, indecency, crimes, stalking, and dangerous material are only few examples of some of the contents accessible freely to every user including our children. Until the existing legal laws sort out the confusion regarding the Internet and its contents, users are resorting to a variety of methods and tools to monitor and to filter the contents of the Internet hoping to make it a safer place for their future generations. This paper presents a survey and an evaluation of some of the existing methods and tools used for Internet filtering. A proposal for a filtering program is being presented. This program overcomes the limitations of filtering techniques by its hierarchical organization which combines URL, word matching, and labeling approaches.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Online Free Penetration Multi-Stage Fuse Saving Protection Scheme in Distribution Systems with Photovoltaic Sources

In this paper, a multi-stage protective scheme is proposed to maintain the fuse and reclosers coordination. The proposed method operates online and proportional to the photovoltaic sources penetration rate. In the first step, a non-standard Current - Time - Voltage curve is used for fuse saving. If the new calculated TDS from the first stage is not implementable to the reclosers, the second sta...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

A Secure Chaos-Based Communication Scheme in Multipath Fading Channels Using Particle Filtering

In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. Unfortunately, despite the advantages of chaotic systems, Such as, noise-like correlation, easy hardware implementation, multitude of chaotic modes, flexible control of their dynamics, chaotic self-synchronization phenomena and potential communication confidence due to the very dynami...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

Efficient group key management for multi-privileged groups

Multi-privileged group communications containing multiple data streams have been studied in the traditional wired network environment and the Internet. With the rapid development of mobile and wireless networks and in particular mobile ad-hoc networks (MANETs), the traditional Internet has been integrated with mobile and wireless networks to form the mobile Internet. The multi-privileged group ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010