• 0
    • ارسال درخواست
    • حذف همه
    • Industrial Standards
    • Defence Standards
  • درباره ما
  • درخواست موردی
  • فهرست استانداردها
    • Industrial Standards
    • Defence Standards
  • راهنما
  • Login
  • لیست خرید شما 0
    • ارسال درخواست
    • حذف همه
View Item 
  •   YSE
  • Industrial Standards
  • ETSI - European Telecommunications Standards Institute
  • View Item
  •   YSE
  • Industrial Standards
  • ETSI - European Telecommunications Standards Institute
  • View Item
  • All Fields
  • Title(or Doc Num)
  • Organization
  • Year
  • Subject
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Archive

Securing Artificial Intelligence (SAI); Data Supply Chain Security

ETSI TR 104 048 V1.1.1

Organization:
ETSI - European Telecommunications Standards Institute
Year: 2025

ETSI - European Telecommunications Standards Institute

URI: http://yse.yabesh.ir/std;jsessioutho4703177793325273135A68A10958014A0Fa/handle/yse/347582
Subject: artificial intelligence
Collections :
  • ETSI - European Telecommunications Standards Institute
  • Download PDF : (266.7Kb)
  • Show Full MetaData Hide Full MetaData
  • Statistics

    Securing Artificial Intelligence (SAI); Data Supply Chain Security

Show full item record

contributor authorETSI - European Telecommunications Standards Institute
date accessioned2025-09-30T22:59:52Z
date available2025-09-30T22:59:52Z
date copyright2025.01
date issued2025
identifier othertr_104048v010101p.pdf
identifier urihttp://yse.yabesh.ir/std;jsessioutho4703177793325273135A68A10958014A0Fa/handle/yse/347582
languageEnglish
publisherETSI - European Telecommunications Standards Institute
titleSecuring Artificial Intelligence (SAI); Data Supply Chain Securityen
titleETSI TR 104 048 V1.1.1num
typestandard
page21
statusPublished
treeETSI - European Telecommunications Standards Institute:;2025
contenttypefulltext
subject keywordsartificial intelligence
subject keywordsSECURITY
scopeData is a critical component in the development of AI systems. This includes raw data as well as information and feedback from other systems and humans in the loop, all of which can be used to change the function of the system by training and retraining the AI. However, access to suitable data is often limited causing a need to resort to less suitable sources of data. Compromising the integrity of training data has been demonstrated to be a viable attack vector against an AI system. This means that securing the supply chain of the data is an important step in securing the AI. This report will summarise the methods currently used to source data for training AI along with the regulations, standards and protocols that can control the handling and sharing of that data. It will then provide gap analysis on this information to scope possible requirements for standards for ensuring traceability and integrity in the data, associated attributes, information and feedback, as well as the confidentiality of these.
DSpace software copyright © 2017-2020  DuraSpace
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
yabeshDSpacePersian
 
DSpace software copyright © 2017-2020  DuraSpace
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
yabeshDSpacePersian