Skip to main content

Comparison of the Legal Principle Foundation of Chinese and American Secret Information Access Control Technique

  • Conference paper
  • First Online:
  • 1304 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11634))

Abstract

This paper firstly put forward the concept of secrecy legal principle foundation for information security and Secrecy Techniques. Secondly, the variance of the secret information access control technique between China and American was analyzed using contrast analysis. Thirdly, analysis of American sensitive compartmented information based on the lattice which was not suitable in China was given. Finally, according to the limitations of China control scheme in access scope, the suggestions for establishing secret information access control mechanism and model with China legal principle foundation is put forward.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. The Overview of Foreign Confidentiality Legislation (2009). http://lanxicy.com/read/3933d3c8fdee354b219ee9d6.html

  2. Muller, E., Grant, T., Poll, E.: Multi Level Security, 3 1/2 decades later (13th ICCRTS:C2 for Complex Endeavaors)

    Google Scholar 

  3. Bell, D.E., LaPadula, L.J.: Secure computer systems: a mathematical model, M74- 244. The MITRE Corporation (1973)

    Google Scholar 

  4. Bell, D.E., LaPadula, L.J.: Secure computer system: unified exposition and multics interpretation. The Mitre Corp. (1976)

    Google Scholar 

  5. Bell, D.E.: Looking Back at the Bell-La Padula Model Reston VA, 20191, 7 December 2005

    Google Scholar 

  6. Bell, D.E.: Looking back at the Bell-LaPadula model. In: ACSAC, pp 337–351. IEEE Computer Society, 7 December 2005

    Google Scholar 

  7. Sun, D., Wang, Y., Mao, R.: Standards and implements of foreign electronic documents marking technology. Confidentiality Sci. Technol. (01), 49 (2010)

    Google Scholar 

  8. Biba, K.J.: Integrity considerations for secure computer system, ESD-76- 372. PSAF Electronic System Division, Hanscom Air Force Base, Bedford (1977)

    Google Scholar 

  9. Denning, D.E.: A lattice model of secure information flow. Commun. ACM 19(5), 236–243 (1976)

    Article  MathSciNet  Google Scholar 

  10. Sandhu, R.S.: Lattice-based access control models. Computer 26(11), 9–19 (1993)

    Article  Google Scholar 

  11. Zhong, J.: Special Contact Project – Special Types of the US Secret Management Confidentiality, no. 03 (2015)

    Google Scholar 

  12. Mei, M., Tianfu, B.: How Does the US Use the “Safety Marking” to Achieve Confidential Information Sharing. http://www.360doc.com/content/17/0330/13/40745881_641388699.shtml

  13. Tianfu, B.: The Threat of the US Signal Intelligence Strategy. http://zhuanlan.51cto.com/art/201706/541657.htm

  14. Wang, H.: Important military information resources measurement and characteristic signal information. Modern Mil. (07) (2003)

    Google Scholar 

  15. Zhang, M.: Measurement feature information and signal subtle feature analysis. Air Force Equipment Res. 4(004) (2001)

    Google Scholar 

  16. Jin, Y.: The US National intelligence agency and its activities. Foreign Mil. Inf. Warfare (04) (2010)

    Google Scholar 

  17. Zhou, Q., et al.: Steganography using reversible texture synthesis based on seeded region growing and LSB. CMC: Comput. Mater. Continua 55(1), 151–163 (2018)

    Google Scholar 

  18. Qu, Z., Zhu, T., Wang, J., Wang, X.: A novel quantum stegonagraphy based on brown states. CMC: Comput. Mater. Continua 56(1), 47–59 (2018)

    Google Scholar 

  19. Qing, S.: Covert channel analysis of high security level security operating system. J. Softw. 15(12), 1837–1849 (2004)

    MATH  Google Scholar 

  20. Anderson, R., Ning, Q.: Information Security Engineering, 2nd edn, pp. 173–185, 197–200. Tsinghua University Press (2012)

    Google Scholar 

  21. Zhou, Z., Liu, Y., Shen, C.: A new unified security strategy for confidentiality and integrity. Comput. Eng. Appl. (34) (2007)

    Google Scholar 

Download references

Acknowledgement

The research was supported by Hainan Provincial Natural Science Foundation (Grant No. 617079).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to LongJuan Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, L., Tang, F. (2019). Comparison of the Legal Principle Foundation of Chinese and American Secret Information Access Control Technique. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11634. Springer, Cham. https://doi.org/10.1007/978-3-030-24271-8_57

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24271-8_57

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24270-1

  • Online ISBN: 978-3-030-24271-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics