Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GB/T 42888-2023 English PDF

US$649.00 ยท In stock
Delivery: <= 6 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 42888-2023: Information security technology - Assessment specification for security of machine learning algorithms
Status: Valid
Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GB/T 42888-2023649 Add to Cart 6 days Information security technology - Assessment specification for security of machine learning algorithms Valid

Similar standards

GB/T 42453   GB/T 42447   GB/T 42460   GB/Z 42885   GB/T 42884   

Basic data

Standard ID: GB/T 42888-2023 (GB/T42888-2023)
Description (Translated English): Information security technology - Assessment specification for security of machine learning algorithms
Sector / Industry: National Standard (Recommended)
Classification of Chinese Standard: L80
Classification of International Standard: 35.030
Word Count Estimation: 34,370
Date of Issue: 2023-08-06
Date of Implementation: 2024-03-01
Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration

GB/T 42888-2023: Information security technology - Assessment specification for security of machine learning algorithms


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35.030 CCSL80 National Standards of People's Republic of China Information security technology Machine learning algorithm security assessment specifications Published on 2023-08-06 2024-03-01 Implementation State Administration for Market Regulation Released by the National Standardization Administration Committee

Table of contents

Preface III 1 Scope 1 2 Normative reference documents 1 3 Terms and Definitions 1 4 Overview 2 4.1 Safety Principle 2 4.2 Safety requirement classification 2 5 Machine learning algorithm technical security requirements and assessment methods 2 5.1 Safety requirements 2 5.2 Assessment Method 5 6 Machine learning algorithm service security requirements and assessment methods 9 6.1 Safety requirements 9 6.2 Assessment methods 9 7 Machine learning algorithm security assessment process 11 7.1 Process requirements 11 7.2 Preparing for assessment 11 7.3 Evaluation Plan 11 7.4 Assessment Execution 12 7.5 Assessment Conclusion 12 7.6 Assessment Report 12 Appendix A (Normative) Security Requirements for Algorithm Recommendation Services 14 Appendix B (normative) Algorithm recommendation service evaluation method 21 Reference 29

Foreword

This document complies with the provisions of GB/T 1.1-2020 "Standardization Work Guidelines Part 1.Structure and Drafting Rules of Standardization Documents" Drafting. Please note that some content in this document may be subject to patents. The publisher of this document assumes no responsibility for identifying patents. This document is proposed and coordinated by the National Information Security Standardization Technical Committee (SAC/TC260). This document was drafted by. Beijing Saixi Technology Development Co., Ltd., Institute of Computing Technology, Chinese Academy of Sciences, Tsinghua University, National Planning Computer Network Emergency Technology Coordination Center, Shanghai SenseTime Intelligent Technology Co., Ltd., Beijing Ruilai Intelligent Technology Co., Ltd., Alibaba (China) Co., Ltd., Institute of Information Engineering, Chinese Academy of Sciences, China Academy of Information and Communications Technology, China Electronics Technology Group Corporation Fifteenth Research Institute Institute, National Information Technology Security Research Center, Guangzhou University, Peking University, East China Normal University, Beihang University, Huawei Technologies Co., Ltd. Co., Ltd., Beijing Megvii Technology Co., Ltd., Beijing Baidu Network Technology Co., Ltd., Shenzhen Tencent Computer Systems Co., Ltd., Zhejiang University School, Beijing Qihu Technology Co., Ltd., Beijing Xiaoju Technology Co., Ltd., Anhui Engineering University, Beijing Zhizhi Tianxia Technology Co., Ltd., Beijing Jiaotong University, Zhejiang University of Technology, Shanghai Industrial Control Safety Innovation Technology Co., Ltd., People's Public Security University of China, Shenzhen Big Data Research Academy, Beijing Institute of Computer Technology and Applications, Institute of Automation, Chinese Academy of Sciences, Shanghai Suiyuan Technology Co., Ltd., Fengtai Technology (Beijing) Co., Ltd., China Electronics Technology Standardization Institute. The main drafters of this document. Shangguan Xiaoli, Hao Chunliang, Xu Xiaogeng, Hu Ying, Chen Zhong, Shen Huawei, Jiang Hui, Mei Jingqing, Zhang Yuguang, Peng Juntao, Guo Yan, Li Pengxiao, Ai Zhengyang, Zhao Yunwei, Han Han, Liu Ming, Yin Zhiyi, Pang Liang, Wang Xiaoshi, Liu Zongzhen, Zhou Xi, Meng Guozhu, Jing Huiyun, Zhang Linlin, Zhu Chunchao, Huo Shanshan, Liu Jian, Liu He, Su Hang, Jin Tao, Liu Jiqiang, Ren Kui, Zhang Xudong, Cheng Jin, Zhu Hongru, Yang Tao, Li Qin, Liu Xianglong, Wang Yifei, Wu Geng, He Ran, Gu Zhaoquan, Li Shi, Cao Xiaoqi, Yan Minrui, Fu Yingbo, Guo Ying, Sun Air Force, Tang Jiayu, Liu Xize, Wang Zhelin, Ren Lu, Xu Yongtai, Zhang Yi, Qin Zhan, An Zeliang, Xu Yuqing, Li Xue, Li Dahai, Xu Guangxia, Bao Shenfu, Guo Jianling, Xuan Qi, Zhang Shitian, Zhao Yongxin, Wang Jiao, Wang Bingzheng, Lu Tianliang, Wu Baoyuan, Han Lei, Zhang Yutong, Peng Quan. Information security technology Machine learning algorithm security assessment specifications

1 Scope

This document specifies the security requirements and assessment methods for machine learning algorithm technologies and services, as well as the machine learning algorithm security assessment process. This document is suitable for guiding machine learning algorithm providers to ensure the security of the machine learning algorithm life cycle and carry out machine learning algorithm security. A comprehensive assessment can also provide reference for regulatory assessment.

2 Normative reference documents

This document has no normative references.

3 Terms and definitions

The following terms and definitions apply to this document. 3.1 Algorithms that functional units improve their performance by learning new knowledge and skills or sorting out existing knowledge and skills. 3.2 Organizations that utilize machine learning algorithms to perform specific functions. Note. This document is referred to as algorithm provider, including algorithm technology providers and algorithm service providers. Algorithm technology provider refers to the development and Provider, algorithm service provider refers to a service provider that uses applied algorithm technology. 3.3 Services that apply algorithm recommendation technology to provide information. Note 1.Application algorithm recommendation technology refers to the use of machine learning algorithms to generate synthetic categories, personalized push categories, sorting and selection categories, retrieval and filtering categories, and scheduling decisions. Categorization and other algorithmic technologies are used to provide information to users. Note 2.This document refers to algorithms such as generation and synthesis, personalized push, sorting and selection, retrieval and filtering, and scheduling and decision-making as five categories of algorithms. 3.4 algorithm lifecyclealgorithmlifecycle The evolution of machine learning algorithms from design to retirement. Note 1.The algorithm life cycle includes design and development, verification and confirmation, deployment and operation, maintenance and upgrade, and decommissioning. Note 2.General algorithm services are in the deployment and running stage.
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 42888-2023_English be delivered?

Answer: Upon your order, we will start to translate GB/T 42888-2023_English as soon as possible, and keep you informed of the progress. The lead time is typically 4 ~ 6 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 42888-2023_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 42888-2023_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.