The Application of Information Flow Control Technology Based on Electronic Confidentiality Level Identifier in the Removable Storage Medium

Article Preview

Abstract:

With the rapid development of information technology, the electronic information is ubiquitous, which has brought severe challenges to the transmission and reception of classified information. The common electronic information protection technology and measures were described and the primary means of foreign spy and intelligence agencies attack theft were pointed out. Through the introduction of electronic confidentiality level identifier technology and information flow control technology, the security of electronic information was achieve. Take the secret exchange of special U disk of a company in Mianyang as an example, the application of information flow control system based on electronic confidentiality level identifier in the removable storage medium to transmit information was introduced

You might also be interested in these eBooks

Info:

Periodical:

Pages:

182-186

Citation:

Online since:

February 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Tang Fangming. Mobile storage medium protective control technology status analysis and development trends [J]. Information security and technology, 2010, ( 10): 15 - 17.

Google Scholar

[2] Chen Shangyi. Electronic document security technology status and development trends [J]. Information security technology and application, 2008, ( 04): 80-81.

Google Scholar

[3] Wang Wenyu, Chen Shangyi. Electronic document security management system key technologies and design [J]. Information security and confidentiality of communications, 2009, ( 10): 76-78.

Google Scholar

[4] Chen Shangyi. Study on electronic file security protection model [J]. Information security and confidentiality of communications, 2008, ( 10): 77-79.

Google Scholar

[5] Wang Jisheng. Close to prevent from the net, - Shenzhen city to carry out a comprehensive computer illegal Internet supervision [J]. Security work, 2008, ( 03): 31-32.

Google Scholar

[6] Guo Yajun, Li Li. Information security theory and technology [M]. Beijing: Tsinghua University press, (2008).

Google Scholar