Abstract
This paper firstly put forward the concept of secrecy legal principle foundation for information security and Secrecy Techniques. Secondly, the variance of the secret information access control technique between China and American was analyzed using contrast analysis. Thirdly, analysis of American sensitive compartmented information based on the lattice which was not suitable in China was given. Finally, according to the limitations of China control scheme in access scope, the suggestions for establishing secret information access control mechanism and model with China legal principle foundation is put forward.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
The Overview of Foreign Confidentiality Legislation (2009). http://lanxicy.com/read/3933d3c8fdee354b219ee9d6.html
Muller, E., Grant, T., Poll, E.: Multi Level Security, 3 1/2 decades later (13th ICCRTS:C2 for Complex Endeavaors)
Bell, D.E., LaPadula, L.J.: Secure computer systems: a mathematical model, M74- 244. The MITRE Corporation (1973)
Bell, D.E., LaPadula, L.J.: Secure computer system: unified exposition and multics interpretation. The Mitre Corp. (1976)
Bell, D.E.: Looking Back at the Bell-La Padula Model Reston VA, 20191, 7 December 2005
Bell, D.E.: Looking back at the Bell-LaPadula model. In: ACSAC, pp 337–351. IEEE Computer Society, 7 December 2005
Sun, D., Wang, Y., Mao, R.: Standards and implements of foreign electronic documents marking technology. Confidentiality Sci. Technol. (01), 49 (2010)
Biba, K.J.: Integrity considerations for secure computer system, ESD-76- 372. PSAF Electronic System Division, Hanscom Air Force Base, Bedford (1977)
Denning, D.E.: A lattice model of secure information flow. Commun. ACM 19(5), 236–243 (1976)
Sandhu, R.S.: Lattice-based access control models. Computer 26(11), 9–19 (1993)
Zhong, J.: Special Contact Project – Special Types of the US Secret Management Confidentiality, no. 03 (2015)
Mei, M., Tianfu, B.: How Does the US Use the “Safety Marking” to Achieve Confidential Information Sharing. http://www.360doc.com/content/17/0330/13/40745881_641388699.shtml
Tianfu, B.: The Threat of the US Signal Intelligence Strategy. http://zhuanlan.51cto.com/art/201706/541657.htm
Wang, H.: Important military information resources measurement and characteristic signal information. Modern Mil. (07) (2003)
Zhang, M.: Measurement feature information and signal subtle feature analysis. Air Force Equipment Res. 4(004) (2001)
Jin, Y.: The US National intelligence agency and its activities. Foreign Mil. Inf. Warfare (04) (2010)
Zhou, Q., et al.: Steganography using reversible texture synthesis based on seeded region growing and LSB. CMC: Comput. Mater. Continua 55(1), 151–163 (2018)
Qu, Z., Zhu, T., Wang, J., Wang, X.: A novel quantum stegonagraphy based on brown states. CMC: Comput. Mater. Continua 56(1), 47–59 (2018)
Qing, S.: Covert channel analysis of high security level security operating system. J. Softw. 15(12), 1837–1849 (2004)
Anderson, R., Ning, Q.: Information Security Engineering, 2nd edn, pp. 173–185, 197–200. Tsinghua University Press (2012)
Zhou, Z., Liu, Y., Shen, C.: A new unified security strategy for confidentiality and integrity. Comput. Eng. Appl. (34) (2007)
Acknowledgement
The research was supported by Hainan Provincial Natural Science Foundation (Grant No. 617079).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, L., Tang, F. (2019). Comparison of the Legal Principle Foundation of Chinese and American Secret Information Access Control Technique. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11634. Springer, Cham. https://doi.org/10.1007/978-3-030-24271-8_57
Download citation
DOI: https://doi.org/10.1007/978-3-030-24271-8_57
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24270-1
Online ISBN: 978-3-030-24271-8
eBook Packages: Computer ScienceComputer Science (R0)