Katevas et al., 2020 - Google Patents

Policy-based federated learning

Katevas et al., 2020

View PDF
Document ID
6704643075104282912
Author
Katevas K
Bagdasaryan E
Waterman J
Safadieh M
Birrell E
Haddadi H
Estrin D
Publication year
Publication venue
arXiv preprint arXiv:2003.06612

External Links

Snippet

In this paper we present PoliFL, a decentralized, edge-based framework that supports heterogeneous privacy policies for federated learning. We evaluate our system on three use cases that train models with sensitive user data collected by mobile phones-predictive text …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/30707Clustering or classification into predefined classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/101Collaborative creation of products or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data

Similar Documents

Publication Publication Date Title
Nguyen et al. {FLAME}: Taming backdoors in federated learning
Sookhak et al. Security and privacy of smart cities: a survey, research issues and challenges
US20240022607A1 (en) Automated and adaptive model-driven security system and method for operating the same
US11303432B2 (en) Label-based double key encryption
US10581924B2 (en) Data sensitivity based authentication and authorization
Ghorbel et al. Privacy in cloud computing environments: a survey and research challenges
Xu et al. An efficient privacy‐enhanced attribute‐based access control mechanism
Pai et al. Formal verification of OAuth 2.0 using Alloy framework
WO2019086553A1 (en) Privacy management
Fernandez et al. A critical analysis of Zero Trust Architecture (ZTA)
Bagdasaryan et al. Ancile: Enhancing privacy for ubiquitous computing with use-based privacy
KR20090055555A (en) Security language translations with logic resolution
Gupta et al. Multi-layer authorization framework for a representative Hadoop ecosystem deployment
Schlögl et al. eNNclave: Offline inference with model confidentiality
Park et al. An empirical study on the influential factors affecting continuous usage of mobile cloud service
Aftab et al. Traditional and hybrid access control models: a detailed survey
Xu et al. A Feasible Fuzzy‐Extended Attribute‐Based Access Control Technique
Katevas et al. Policy-based federated learning
Salini et al. Elicitation of security requirements for e-health system by applying Model Oriented Security Requirements Engineering (MOSRE) framework
Peng et al. Big data security access control algorithm based on memory index acceleration in WSNs
Ghosh et al. Securing loosely-coupled collaboration in cloud environment through dynamic detection and removal of access conflicts
Jalali et al. Comprehensive framework for implementing blockchain-enabled federated learning and full homomorphic encryption for chatbot security system
Kiran et al. Ontology‐based data access control model supported with grid computing for improving security in healthcare data
Palanisamy et al. Users’ attitude on perceived security of mobile cloud computing: empirical evidence from SME users in China
Thiele et al. ztLang: A Modelling Language for Zero Trust Networks