
prevent circumvention at the same time, the policy
model should provide different views for a specific
policy. For example, the filtering party must access
all details of the filtering mechanism including its
general functioning and its required parameters. On
the other hand, regular Internet users must not see all
these details, but they must have access to the legal
basis that authorizes the filtering.
5 AN ABSTRACT CONCEPT FOR
A POLICY MODEL
This section outlines a possible structure of a policy
model that satisfies the requirements of section 4.
The proposed structure consists of three layers of
different expressiveness and abstraction. The first
layer is the most general one and only provides non-
technical information. The other two layers expand
their preceding layers by adding further details.
The first layer contains information about the le-
gal bases for the Internet filtering. It refers to the
specific statutes that legitimate the filtering, briefly
describes their contents, and states the topics of the
data to be filtered. Since this layer only contains
public information, there are no constraints on its
accessibility. Its contents may be directly provided
by the filtering country’s government.
The second layer outlines the code of conduct of
the filtering party. This code of conduct extends the
legal basis with party-specific regulations. In most
cases, this party is a corporation acting on behalf of
the state it operates in such as the members of the
GNI. The second layer also contains only abstract
information about the filtering and can therefore be
accessed by any party. Its contents are directly pro-
vided by the filtering party. The first and the second
layer satisfy the transparency requirement.
The third layer extends the abstract regulations
of the first two layers with technical implementation
details. These cover the filtering components, the
specific methods, and their required input parame-
ters. An example dataset of this layer contains the IP
addresses that are used for IP packet dropping. Since
this layer contains sensitive information concerning
the circumvention of the filtering, its access must be
restricted to the filtering parties. Furthermore, this
layer is necessary as a communication tool between
different filtering parties that act on behalf of the
same statues. It conforms to the enforceability re-
quirement.
6 CONCLUSIONS
This paper explained the need for a policy language
model for Internet communication filtering as stated
by the reports of the ONI and the principles of the
GNI. The paper also outlined the basic requirements
for such a policy model and outlined an abstract
concept which fulfils these requirements. The spe-
cific details of the proposed model and its formaliza-
tion must still be developed. In order to achieve a
broader reusability of the model, it is intended to
design the model as a web ontology. The expres-
siveness of the policy’s layered structure could also
be extended. A fourth layer describing the user’s
view could be added. This layer could describe the
contents the user wants to access, the legal bases she
is bound to, and the technical components she uses
for her Internet communications.
REFERENCES
Anderson, A., 2005. Comparison of Two Privacy Policy
Languages: EPAL and XACML. Sun Microsystems
Laboratories.
Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter,
M., 2003. Enterprise Privacy Authorization Language
(EPAL 1.2). W3C Member Submission.
Clayton, R., 2006. Failures in a Hybrid Content Blocking
System. In Proceedings of the PET Workshop.
Cranor, L. F., 2003. P3P: Making Privacy Policies More
Useful. In IEEE Security and Privacy, vol. 1(6).
Deibert, J., Villeneuve, N., 2004. Firewalls and Power: An
Overview of Global State Censorship of the Internet.
In Human Rights in the Digital Age. GlassHouse
Press.
Deibert, J., Palfrey, J., Rohozinski, R., Zittrain, J., 2008.
Access Denied: The Practice and Policy of Global
Internet Filtering. The MIT Press.
Deibert, J., Palfrey, J., Rohozinski, R., Zittrain, J., 2010.
Access Controlled: The Shaping of Power, Rights, and
Rule in Cyberspace. The MIT Press. Springer.
Dornseif, M., 2004. Government mandated blocking of
foreign Web content. In Security, E-Learning, E-
Services: Proceedings of the 17. DFN-Arbeitstagung
über Kommunikationsnetze.
Faris, R., Villeneuve, N., 2008. Measuring Global Internet
Filtering, In Deibert, 2008, pp. 5-27.
Iannella, R., 2002. Open Digital Rights Language (ODRL)
Version 1.1. W3C Note.
Global Network Initiative (GNI), 2011. Principles on
Freedom of Expression and Privacy.
Moses, T., 2005. eXtensible Access Control Markup Lan-
guage (XACML) Version 2.0. OASIS Standard.
Murdoch, S. J., Anderson, R., 2008. Tools and Technol-
ogy of Internet Filtering. In Deibert, 2008, pp. 57-72.
SECRYPT 2011 - International Conference on Security and Cryptography
412