2022
DOI: 10.1002/cpe.6997
|View full text |Cite
|
Sign up to set email alerts
|

Providing assurance and scrutability on shared data and machine learning models with verifiable credentials

Abstract: Adopting shared data resources requires scientists to place trust in the originators of the data. When shared data is later used in the development of artificial intelligence (AI) systems or machine learning (ML) models, the trust lineage extends to the users of the system, typically practitioners in fields such as healthcare and finance. Practitioners rely on AI developers to have used relevant, trustworthy data, but may have limited insight and recourse. This article introduces a software architecture and im… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 34 publications
0
4
0
Order By: Relevance
“…Although some interviewees thought an AIBOM "contains only additional AI package information" (I1-Dev. ), the AI artifacts (e.g., data, code, model, configuration) also need provenance and co-versioning [27], [28]. An AIBOM (see Fig.…”
Section: ) Aibommentioning
confidence: 99%
See 1 more Smart Citation
“…Although some interviewees thought an AIBOM "contains only additional AI package information" (I1-Dev. ), the AI artifacts (e.g., data, code, model, configuration) also need provenance and co-versioning [27], [28]. An AIBOM (see Fig.…”
Section: ) Aibommentioning
confidence: 99%
“…Back in 2019, Barclay et al [38] introduced their ideas on applying BOMs to data ecosystems for transparency and traceability, where they detailed a conceptual model to combine a BOM (static) and a bill of lots (dynamic) to jointly record the static data components and the dynamic data of a specific experiment. Based on their previous work, as a step towards operationalizing the conceptual model, Barclay et al [39] recently introduced their work using a BOM as a verifiable credential for transparency into the AI SSCs, which is a step towards AIBOM.…”
Section: Related Workmentioning
confidence: 99%
“…Distributed ledger technology (DLT) [81] supports the automatic creation of digital identities and their associated decentralised and immutable registry. Similar to the way in which physical credentials are tied to identities, verifiable credentials (VC) [82] are bound with digital identities in web environments [83], where it is more challenging to verify and validate the information since digital arrangements are more quickly falsified than their physical and biological correspondents. In this sense, to create trust in a trustless environment, VCs must be secured from a cryptographic point of view, consider privacy and be machine verifiable [82].…”
Section: Decentralised Solutions and Blockchain Systems In Urban Heal...mentioning
confidence: 99%
“…Self-sovereign identity (SSI) [31] is terminology used to describe the ability of an individual to take ownership of their personal data and to control who has access to that data, without the need for a centralized infrastructure, or any control or authorization being required by any third party. To date, the focus of effort of SSI researchers has been on personal identity and data privacy for individuals [32], however the underlying computer science techniques can be applied to any type of entity, including digital assets such as datasets [33], and devices [34]. SSI is decentralized, and is built upon well-established cryptographic techniques whereby a user holds a private and shares a public key [35].…”
Section: Enabling Trustable Service Configurationsmentioning
confidence: 99%