Proceedings of the 13th International Conference on Availability, Reliability and Security 2018
DOI: 10.1145/3230833.3233268
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and DRM Requirements for Collaborative Development of AI Applications

Abstract: The use of data is essential for the capabilities of Datadriven Artificial intelligence (AI), Deep Learning and Big Data analysis techniques. This data usage, however, raises intrinsically the concerns on data privacy. In addition, supporting collaborative development of AI applications across organisations has become a major need in AI system design. Digital Rights Management (DRM) is required to protect intellectual property in such collaboration. As a consequence of DRM, privacy threats and privacy-enforcin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…We have also found some works in the literature that report on the use of use cases, business process modeling, class diagrams, user story, user experience, design thinking, among others, for software privacy and privacy requirements' elicitation [44,48,49,[56][57][58] and have related works to software privacy and privacy requirements for cloud deployment models [46,47,59] and Internet of Things (IoT) [41,42,60,61]. This diversity of works found in several areas [43,45,62] demonstrates how important the elicitation of software privacy and privacy requirements is during the software development process and the growing concern of researchers from various fields of knowledge regarding the privacy of user data.…”
Section: Rq1 According To the Literature What Are The Methodologiementioning
confidence: 91%
“…We have also found some works in the literature that report on the use of use cases, business process modeling, class diagrams, user story, user experience, design thinking, among others, for software privacy and privacy requirements' elicitation [44,48,49,[56][57][58] and have related works to software privacy and privacy requirements for cloud deployment models [46,47,59] and Internet of Things (IoT) [41,42,60,61]. This diversity of works found in several areas [43,45,62] demonstrates how important the elicitation of software privacy and privacy requirements is during the software development process and the growing concern of researchers from various fields of knowledge regarding the privacy of user data.…”
Section: Rq1 According To the Literature What Are The Methodologiementioning
confidence: 91%
“…Different methods have been proposed to enforce privacy and security of the AI systems. [26] proposed a pipeline for data protection when two or more agencies are involved in development of AI system. [27] discuss different type of attacks that can happen on AI system and what measures should be taken to prevent them.…”
Section: The Principle Of Prevention Of Harmmentioning
confidence: 99%
“…An initial analysis of the security threads against the VP is given in [21]. It lists 13 simple threats by unexperienced malicious users, ranging from by passing license constraints to artefact execution on wrong VPs, and techniques to protect against them.…”
Section: ) the Use Of A Virtualisation Concepts And Of Containers Inmentioning
confidence: 99%