{"id":456738,"date":"2024-10-20T09:47:57","date_gmt":"2024-10-20T09:47:57","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-3156-2023-3\/"},"modified":"2024-10-26T18:14:46","modified_gmt":"2024-10-26T18:14:46","slug":"ieee-3156-2023-3","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-3156-2023-3\/","title":{"rendered":"IEEE 3156-2023"},"content":{"rendered":"

New IEEE Standard – Active. To meet the evolving requirements of multi-sourced data computing and sharing, a standard for privacy-preserving computation integrated platforms is needed. Requirements of privacy computation integrated platforms, including the reference architecture, the functional requirements, the performance requirements, and the security requirements of privacy-preserving computation integrated platforms, are provided by this standard.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nIEEE Std 3156\u2122-2023 Front cover <\/td>\n<\/tr>\n
2<\/td>\nTitle page <\/td>\n<\/tr>\n
4<\/td>\nImportant Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n
8<\/td>\nParticipants <\/td>\n<\/tr>\n
10<\/td>\nIntroduction <\/td>\n<\/tr>\n
11<\/td>\nContents <\/td>\n<\/tr>\n
12<\/td>\n1.\u2002Overview
1.1\u2002Scope
1.2\u2002Purpose
1.3\u2002Word usage <\/td>\n<\/tr>\n
13<\/td>\n2.\u2002Normative references
3.\u2002Definitions, acronyms, and abbreviations
3.1\u2002Definitions
3.2\u2002Acronyms and abbreviations <\/td>\n<\/tr>\n
14<\/td>\n4.\u2002Reference architecture of privacy-preserving computation integrated platforms <\/td>\n<\/tr>\n
16<\/td>\n5.\u2002Functional requirements
5.1\u2002Hardware <\/td>\n<\/tr>\n
18<\/td>\n5.2\u2002System software <\/td>\n<\/tr>\n
19<\/td>\n5.3\u2002Privacy-preserving computation protocols
5.4\u2002Operation and management <\/td>\n<\/tr>\n
21<\/td>\n6.\u2002Performance requirements <\/td>\n<\/tr>\n
22<\/td>\n7.\u2002Security requirements
7.1\u2002Identity authentication
7.2\u2002Access control <\/td>\n<\/tr>\n
23<\/td>\n7.3\u2002Data security
7.4\u2002Software security <\/td>\n<\/tr>\n
24<\/td>\n7.5\u2002Hardware security <\/td>\n<\/tr>\n
26<\/td>\n7.6\u2002Non-invasive security <\/td>\n<\/tr>\n
28<\/td>\nAnnex\u00a0A (informative) Common cryptographic operations <\/td>\n<\/tr>\n
29<\/td>\nAnnex\u00a0B (informative) Bibliography <\/td>\n<\/tr>\n
30<\/td>\nBack cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard for Requirements of Privacy-Preserving Computation Integrated Platforms (Published)<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2023<\/td>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":456747,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-456738","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/456738","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/456747"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=456738"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=456738"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=456738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}