{"id":456738,"date":"2024-10-20T09:47:57","date_gmt":"2024-10-20T09:47:57","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-3156-2023-3\/"},"modified":"2024-10-26T18:14:46","modified_gmt":"2024-10-26T18:14:46","slug":"ieee-3156-2023-3","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-3156-2023-3\/","title":{"rendered":"IEEE 3156-2023"},"content":{"rendered":"
New IEEE Standard – Active. To meet the evolving requirements of multi-sourced data computing and sharing, a standard for privacy-preserving computation integrated platforms is needed. Requirements of privacy computation integrated platforms, including the reference architecture, the functional requirements, the performance requirements, and the security requirements of privacy-preserving computation integrated platforms, are provided by this standard.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Std 3156\u2122-2023 Front cover <\/td>\n<\/tr>\n | ||||||
2<\/td>\n | Title page <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Important Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 1.\u2002Overview 1.1\u2002Scope 1.2\u2002Purpose 1.3\u2002Word usage <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 2.\u2002Normative references 3.\u2002Definitions, acronyms, and abbreviations 3.1\u2002Definitions 3.2\u2002Acronyms and abbreviations <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4.\u2002Reference architecture of privacy-preserving computation integrated platforms <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.\u2002Functional requirements 5.1\u2002Hardware <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.2\u2002System software <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.3\u2002Privacy-preserving computation protocols 5.4\u2002Operation and management <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.\u2002Performance requirements <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 7.\u2002Security requirements 7.1\u2002Identity authentication 7.2\u2002Access control <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 7.3\u2002Data security 7.4\u2002Software security <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 7.5\u2002Hardware security <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 7.6\u2002Non-invasive security <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Annex\u00a0A (informative) Common cryptographic operations <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Annex\u00a0B (informative) Bibliography <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Back cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard for Requirements of Privacy-Preserving Computation Integrated Platforms (Published)<\/b><\/p>\n |