{"id":400511,"date":"2024-10-20T04:50:36","date_gmt":"2024-10-20T04:50:36","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-2830-2021\/"},"modified":"2024-10-26T08:38:16","modified_gmt":"2024-10-26T08:38:16","slug":"ieee-2830-2021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-2830-2021\/","title":{"rendered":"IEEE 2830-2021"},"content":{"rendered":"
New IEEE Standard – Active. The framework and architecture for machine learning in which a model is trained using encrypted data that has been aggregated from multiple sources and is processed by a trusted third party are defined in this standard. Functional components, workflows, security requirements, technical requirements, and protocols are specified in this standard.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Std 2830\u2122-2021 Front cover <\/td>\n<\/tr>\n | ||||||
2<\/td>\n | Title page <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Important Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 1.\u2002Overview 1.1\u2002Scope 1.2\u2002Purpose 1.3\u2002Word usage <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 2.\u2002Normative references 3.\u2002Definitions, acronyms, and abbreviations 3.1\u2002Definitions 3.2\u2002Acronyms and abbreviations <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4.\u2002General overview 5.\u2002Technical framework 5.1\u2002Architecture framework <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.2\u2002Functional components of a TEE-based SML system 5.3\u2002Processing procedure <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.\u2002Technical requirements for shared machine learning system 6.1\u2002Basic technical requirements <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.2\u2002Scalability requirements 6.3\u2002Reliability requirements 6.4\u2002Compatibility requirements 6.5\u2002Performance requirements <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.6\u2002Usability requirements 7.\u2002Security requirements for sharing machine learning system 7.1\u2002Authentication requirements 7.2\u2002Access control requirements 7.3\u2002Security Auditing requirements <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 7.4\u2002Data security requirements <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Annex\u00a0A (informative) TEE-based shared machine learning application scenarios A.1\u2002Intelligent credit and risk control A.2\u2002Intelligent Marketing A.3\u2002Identifying telecom frauds across networks <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Back cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard for Technical Framework and Requirements of Trusted Execution Environment based Shared Machine Learning<\/b><\/p>\n |