{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:52:32Z","timestamp":1726037552327},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242701"},{"type":"electronic","value":"9783030242718"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24271-8_57","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:19:24Z","timestamp":1563391164000},"page":"644-657","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Comparison of the Legal Principle Foundation of Chinese and American Secret Information Access Control Technique"],"prefix":"10.1007","author":[{"given":"LongJuan","family":"Wang","sequence":"first","affiliation":[]},{"given":"FangMing","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"57_CR1","unstructured":"The Overview of Foreign Confidentiality Legislation (2009). \n                      http:\/\/lanxicy.com\/read\/3933d3c8fdee354b219ee9d6.html"},{"key":"57_CR2","unstructured":"Muller, E., Grant, T., Poll, E.: Multi Level Security, 3 1\/2 decades later (13th ICCRTS:C2 for Complex Endeavaors)"},{"key":"57_CR3","unstructured":"Bell, D.E., LaPadula, L.J.: Secure computer systems: a mathematical model, M74- 244. The MITRE Corporation (1973)"},{"key":"57_CR4","doi-asserted-by":"crossref","unstructured":"Bell, D.E., LaPadula, L.J.: Secure computer system: unified exposition and multics interpretation. The Mitre Corp. (1976)","DOI":"10.21236\/ADA023588"},{"key":"57_CR5","unstructured":"Bell, D.E.: Looking Back at the Bell-La Padula Model Reston VA, 20191, 7 December 2005"},{"key":"57_CR6","unstructured":"Bell, D.E.: Looking back at the Bell-LaPadula model. In: ACSAC, pp 337\u2013351. IEEE Computer Society, 7 December 2005"},{"key":"57_CR7","unstructured":"Sun, D., Wang, Y., Mao, R.: Standards and implements of foreign electronic documents marking technology. Confidentiality Sci. Technol. (01), 49 (2010)"},{"key":"57_CR8","unstructured":"Biba, K.J.: Integrity considerations for secure computer system, ESD-76- 372. PSAF Electronic System Division, Hanscom Air Force Base, Bedford (1977)"},{"issue":"5","key":"57_CR9","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"DE Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Commun. ACM 19(5), 236\u2013243 (1976)","journal-title":"Commun. ACM"},{"issue":"11","key":"57_CR10","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/2.241422","volume":"26","author":"RS Sandhu","year":"1993","unstructured":"Sandhu, R.S.: Lattice-based access control models. Computer 26(11), 9\u201319 (1993)","journal-title":"Computer"},{"key":"57_CR11","unstructured":"Zhong, J.: Special Contact Project \u2013 Special Types of the US Secret Management Confidentiality, no. 03 (2015)"},{"key":"57_CR12","unstructured":"Mei, M., Tianfu, B.: How Does the US Use the \u201cSafety Marking\u201d to Achieve Confidential Information Sharing. \n                      http:\/\/www.360doc.com\/content\/17\/0330\/13\/40745881_641388699.shtml"},{"key":"57_CR13","unstructured":"Tianfu, B.: The Threat of the US Signal Intelligence Strategy. \n                      http:\/\/zhuanlan.51cto.com\/art\/201706\/541657.htm"},{"key":"57_CR14","unstructured":"Wang, H.: Important military information resources measurement and characteristic signal information. Modern Mil. (07) (2003)"},{"key":"57_CR15","unstructured":"Zhang, M.: Measurement feature information and signal subtle feature analysis. Air Force Equipment Res. 4(004) (2001)"},{"key":"57_CR16","unstructured":"Jin, Y.: The US National intelligence agency and its activities. Foreign Mil. Inf. Warfare (04) (2010)"},{"issue":"1","key":"57_CR17","first-page":"151","volume":"55","author":"Q Zhou","year":"2018","unstructured":"Zhou, Q., et al.: Steganography using reversible texture synthesis based on seeded region growing and LSB. CMC: Comput. Mater. Continua 55(1), 151\u2013163 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"issue":"1","key":"57_CR18","first-page":"47","volume":"56","author":"Z Qu","year":"2018","unstructured":"Qu, Z., Zhu, T., Wang, J., Wang, X.: A novel quantum stegonagraphy based on brown states. CMC: Comput. Mater. Continua 56(1), 47\u201359 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"issue":"12","key":"57_CR19","first-page":"1837","volume":"15","author":"S Qing","year":"2004","unstructured":"Qing, S.: Covert channel analysis of high security level security operating system. J. Softw. 15(12), 1837\u20131849 (2004)","journal-title":"J. Softw."},{"key":"57_CR20","unstructured":"Anderson, R., Ning, Q.: Information Security Engineering, 2nd edn, pp. 173\u2013185, 197\u2013200. Tsinghua University Press (2012)"},{"key":"57_CR21","unstructured":"Zhou, Z., Liu, Y., Shen, C.: A new unified security strategy for confidentiality and integrity. Comput. Eng. Appl. (34) (2007)"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24271-8_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:40:23Z","timestamp":1563392423000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24271-8_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242701","9783030242718"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24271-8_57","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}