Tagged articles
10 articles
Page 1 of 1
AntTech
AntTech
Aug 12, 2024 · Artificial Intelligence

DKCF Trustworthy Framework for Large Model Applications and AI Security Practices

The article outlines the DKCF (Data‑Knowledge‑Collaboration‑Feedback) trustworthy framework presented at the 2024 Shanghai Cybersecurity Expo, detailing challenges of large AI models, four key trust factors, and Ant Group's practical security implementations for professional AI deployments.

AI SafetyDKCFKnowledge Engineering
0 likes · 10 min read
DKCF Trustworthy Framework for Large Model Applications and AI Security Practices
AntTech
AntTech
Jul 9, 2024 · Artificial Intelligence

2024 Large Model Security Practice Whitepaper Unveiled at the World AI Conference

The jointly authored 2024 Large Model Security Practice whitepaper, released at the World AI Conference, outlines a comprehensive safety framework covering security, reliability, and controllability, presents industry case studies, and proposes a five‑dimensional governance model to guide high‑quality development of large AI models.

AI SafetyLarge Modelindustry practice
0 likes · 7 min read
2024 Large Model Security Practice Whitepaper Unveiled at the World AI Conference
Data Thinking Notes
Data Thinking Notes
May 28, 2024 · Information Security

What Can Government Data Security Standards Teach Other Industries?

The article outlines a comprehensive government data processing security framework—including management, technical, personal information protection, operational, regulatory, and assessment requirements—that offers reusable, practical guidance for data security across various sectors.

data securitygovernment standardsprivacy protection
0 likes · 4 min read
What Can Government Data Security Standards Teach Other Industries?
JD Tech
JD Tech
Apr 26, 2023 · Information Security

Overview of JD.com's Five‑Element Zero Trust Security Framework

This whitepaper outlines JD.com's practical zero‑trust security approach, detailing a five‑element framework that includes asset digitization, asset identity, diversified security checkpoints, a strategy center, and a zero‑trust cockpit, to help digital enterprises strengthen security, reduce costs, and meet regulatory requirements.

Digital TransformationJD.comZero Trust
0 likes · 6 min read
Overview of JD.com's Five‑Element Zero Trust Security Framework
Architects Research Society
Architects Research Society
Oct 22, 2022 · Information Security

Enterprise Information Security Architecture (EISA): Structure, Content, and Implementation Approaches

Enterprise Information Security Architecture (EISA) provides a structured framework that links business drivers with technical guidance through three perspectives—business, information, and technology—detailing its documentation layers, strategic approaches, and the integration of security into overall enterprise architecture to enable effective, iterative security programs.

Architecture ModelsEISASecurity Planning
0 likes · 7 min read
Enterprise Information Security Architecture (EISA): Structure, Content, and Implementation Approaches
Top Architect
Top Architect
Mar 31, 2021 · Information Security

Comparison of Apache Shiro and Spring Security: Features, Execution Flow, and Choosing the Right Framework

This article compares Apache Shiro and Spring Security, outlining each framework's features, execution flow, and strengths, and provides guidance on when to choose Shiro for lightweight, framework-agnostic projects versus Spring Security for deeper Spring integration and broader community support.

AuthenticationAuthorizationShiro
0 likes · 5 min read
Comparison of Apache Shiro and Spring Security: Features, Execution Flow, and Choosing the Right Framework
Java Captain
Java Captain
Jun 21, 2019 · Information Security

Understanding Permissions: Definitions, Design Principles, Role Relationships, and Security Frameworks

This article explores the concept of permissions, distinguishes their noun and verb attributes, outlines minimal‑privilege and data‑abstraction principles, examines server‑side versus client‑side access control, discusses role‑based access control and table design, and compares common Java security frameworks.

Permission DesignRBACaccess control
0 likes · 11 min read
Understanding Permissions: Definitions, Design Principles, Role Relationships, and Security Frameworks