Sellami et al., 2023 - Google Patents
Interaction Patterns for Regulatory Compliance in Federated Learning.Sellami et al., 2023
View PDF- Document ID
- 18184516567789480183
- Author
- Sellami M
- Momcilovic T
- Kuhn P
- Balta D
- Publication year
- Publication venue
- CIISR@ Wirtschaftsinformatik
External Links
Snippet
Organizations in highly regulated domains often struggle to build well-performing machine learning (ML) models due to restrictions from data protection regulation. Federated learning (FL) has recently been introduced as a potential remedy, whereby organizations share local …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
McDaniel et al. | Methods and limitations of security policy reconciliation | |
Dickinson et al. | Multi-cloud performance and security driven federated workflow management | |
Breaux et al. | A distributed requirements management framework for legal compliance and accountability | |
Putz et al. | Trust Factors and Insider Threats in Permissioned Distributed Ledgers: An Analytical Study and Evaluation of Popular DLT Frameworks | |
Mouratidis et al. | A security requirements modelling language for cloud computing environments | |
Armando et al. | SATMC: a SAT-based model checker for security protocols, business processes, and security APIs | |
Lin et al. | Policy decomposition for collaborative access control | |
Salnitri et al. | Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach | |
O’REILLY et al. | 2020 cybersecurity and privacy annual report | |
Razzaq | A Web3 secure platform for assessments and educational resources based on blockchain | |
Kashif et al. | Differential privacy preserving based framework using blockchain for internet-of-things | |
Alijoyo et al. | Blockchain-Based Secure Data Sharing Algorithms for Cognitive Decision Management | |
Sellami et al. | Interaction Patterns for Regulatory Compliance in Federated Learning. | |
Kishor et al. | SPAM: An Enhanced Performance of Security and Privacy-Aware Model over Split Learning in Consumer Electronics | |
Petto et al. | Interpreted and Confidential Execution of Process Choreographies on a Blockchain | |
Marcelletti et al. | Balancing Confidentiality and Transparency for Blockchain-based Process-Aware Information Systems | |
Karmakar et al. | Jurisprudence: blockchain enabled privacy preserving framework complying digital ethics | |
Bounceur et al. | The Transparency Challenge in Blockchain-Enabled Sustainable Development Goals Applications: Exploring Privacy-Preserving Techniques and Emerging Platforms | |
Akhtar et al. | Blockchain based auditable access control for business processes with event driven policies | |
Singh et al. | Decentralization and Federated Approach for Personal Data Protection and Privacy Control. | |
Sommer et al. | PRIME architecture V3 | |
Iyer et al. | Hybrid Cloud Security Patterns | |
Soni et al. | Secure data communication in client-cloud environment: A survey | |
Meersman et al. | On the Move to Meaningful Internet Systems: OTM 2012: Confederated International Conferences: CoopIS, DOA-SVI, and ODBASE 2012, Rome, Italy, September 10-14, 2012. Proceedings, Part II | |
Alaqra et al. | Signatures for privacy, trust and accountability in the cloud: Applications and requirements |