Tag

security framework

1 views collected around this technical thread.

AntTech
AntTech
Aug 12, 2024 · Artificial Intelligence

DKCF Trustworthy Framework for Large Model Applications and AI Security Practices

The article outlines the DKCF (Data‑Knowledge‑Collaboration‑Feedback) trustworthy framework presented at the 2024 Shanghai Cybersecurity Expo, detailing challenges of large AI models, four key trust factors, and Ant Group's practical security implementations for professional AI deployments.

AI SafetyDKCFLarge Language Models
0 likes · 10 min read
DKCF Trustworthy Framework for Large Model Applications and AI Security Practices
AntTech
AntTech
Jul 9, 2024 · Artificial Intelligence

2024 Large Model Security Practice Whitepaper Unveiled at the World AI Conference

The jointly authored 2024 Large Model Security Practice whitepaper, released at the World AI Conference, outlines a comprehensive safety framework covering security, reliability, and controllability, presents industry case studies, and proposes a five‑dimensional governance model to guide high‑quality development of large AI models.

AI SafetyWhitepaperindustry practice
0 likes · 7 min read
2024 Large Model Security Practice Whitepaper Unveiled at the World AI Conference
Data Thinking Notes
Data Thinking Notes
May 28, 2024 · Information Security

What Can Government Data Security Standards Teach Other Industries?

The article outlines a comprehensive government data processing security framework—including management, technical, personal information protection, operational, regulatory, and assessment requirements—that offers reusable, practical guidance for data security across various sectors.

Data Securitygovernment standardsprivacy protection
0 likes · 4 min read
What Can Government Data Security Standards Teach Other Industries?
Data Thinking Notes
Data Thinking Notes
Nov 8, 2023 · Information Security

Building a Comprehensive Data Security Framework: From Protection to Operations

This guide outlines a complete data security architecture, covering protection systems, design principles, overall framework concepts, management and technical systems, and operational processes, emphasizing holistic, lifecycle‑focused strategies rather than isolated security domains.

Data Securitydata lifecycleinformation security
0 likes · 2 min read
Building a Comprehensive Data Security Framework: From Protection to Operations
JD Tech
JD Tech
Apr 26, 2023 · Information Security

Overview of JD.com's Five‑Element Zero Trust Security Framework

This whitepaper outlines JD.com's practical zero‑trust security approach, detailing a five‑element framework that includes asset digitization, asset identity, diversified security checkpoints, a strategy center, and a zero‑trust cockpit, to help digital enterprises strengthen security, reduce costs, and meet regulatory requirements.

Digital TransformationJD.cominformation security
0 likes · 6 min read
Overview of JD.com's Five‑Element Zero Trust Security Framework
Architects Research Society
Architects Research Society
Oct 22, 2022 · Information Security

Enterprise Information Security Architecture (EISA): Structure, Content, and Implementation Approaches

Enterprise Information Security Architecture (EISA) provides a structured framework that links business drivers with technical guidance through three perspectives—business, information, and technology—detailing its documentation layers, strategic approaches, and the integration of security into overall enterprise architecture to enable effective, iterative security programs.

Architecture ModelsEISASecurity Planning
0 likes · 7 min read
Enterprise Information Security Architecture (EISA): Structure, Content, and Implementation Approaches
Architects Research Society
Architects Research Society
Mar 4, 2022 · Information Security

Enterprise Information Security Architecture (EISA): Structure, Content, and Implementation Approaches

The article explains the Enterprise Information Security Architecture (EISA) framework, its three-dimensional view, the three-layer documentation (requirements, principles, models), various strategic approaches to building security architecture, and how it integrates with enterprise architecture to form an effective, iterative security program.

EISAenterprise architectureinformation security
0 likes · 8 min read
Enterprise Information Security Architecture (EISA): Structure, Content, and Implementation Approaches
Top Architect
Top Architect
Dec 19, 2021 · Information Security

Comparing Apache Shiro and Spring Security: Features, Workflow, and When to Choose

This article compares Apache Shiro and Spring Security, outlining each framework's core features, execution workflow, and strengths, and provides guidance on selecting the appropriate solution based on project size, Spring adoption, and development timeline.

JavaSpring Securityauthentication
0 likes · 6 min read
Comparing Apache Shiro and Spring Security: Features, Workflow, and When to Choose
Top Architect
Top Architect
Mar 31, 2021 · Information Security

Comparison of Apache Shiro and Spring Security: Features, Execution Flow, and Choosing the Right Framework

This article compares Apache Shiro and Spring Security, outlining each framework's features, execution flow, and strengths, and provides guidance on when to choose Shiro for lightweight, framework-agnostic projects versus Spring Security for deeper Spring integration and broader community support.

JavaSpring Securityauthentication
0 likes · 5 min read
Comparison of Apache Shiro and Spring Security: Features, Execution Flow, and Choosing the Right Framework
Java Captain
Java Captain
Jun 21, 2019 · Information Security

Understanding Permissions: Definitions, Design Principles, Role Relationships, and Security Frameworks

This article explores the concept of permissions, distinguishes their noun and verb attributes, outlines minimal‑privilege and data‑abstraction principles, examines server‑side versus client‑side access control, discusses role‑based access control and table design, and compares common Java security frameworks.

RBACaccess controlinformation security
0 likes · 11 min read
Understanding Permissions: Definitions, Design Principles, Role Relationships, and Security Frameworks