|
US$649.00 ยท In stock Delivery: <= 6 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 42888-2023: Information security technology - Assessment specification for security of machine learning algorithms Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 42888-2023 | English | 649 |
Add to Cart
|
6 days [Need to translate]
|
Information security technology - Assessment specification for security of machine learning algorithms
| Valid |
GB/T 42888-2023
|
PDF similar to GB/T 42888-2023
Basic data | Standard ID | GB/T 42888-2023 (GB/T42888-2023) | | Description (Translated English) | Information security technology - Assessment specification for security of machine learning algorithms | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.030 | | Word Count Estimation | 34,370 | | Date of Issue | 2023-08-06 | | Date of Implementation | 2024-03-01 | | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 42888-2023: Information security technology - Assessment specification for security of machine learning algorithms ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35.030
CCSL80
National Standards of People's Republic of China
Information security technology
Machine learning algorithm security assessment specifications
Published on 2023-08-06
2024-03-01 Implementation
State Administration for Market Regulation
Released by the National Standardization Administration Committee
Table of contents
Preface III
1 Scope 1
2 Normative reference documents 1
3 Terms and Definitions 1
4 Overview 2
4.1 Safety Principle 2
4.2 Safety requirement classification 2
5 Machine learning algorithm technical security requirements and assessment methods 2
5.1 Safety requirements 2
5.2 Assessment Method 5
6 Machine learning algorithm service security requirements and assessment methods 9
6.1 Safety requirements 9
6.2 Assessment methods 9
7 Machine learning algorithm security assessment process 11
7.1 Process requirements 11
7.2 Preparing for assessment 11
7.3 Evaluation Plan 11
7.4 Assessment Execution 12
7.5 Assessment Conclusion 12
7.6 Assessment Report 12
Appendix A (Normative) Security Requirements for Algorithm Recommendation Services 14
Appendix B (normative) Algorithm recommendation service evaluation method 21
Reference 29
Foreword
This document complies with the provisions of GB/T 1.1-2020 "Standardization Work Guidelines Part 1.Structure and Drafting Rules of Standardization Documents"
Drafting.
Please note that some content in this document may be subject to patents. The publisher of this document assumes no responsibility for identifying patents.
This document is proposed and coordinated by the National Information Security Standardization Technical Committee (SAC/TC260).
This document was drafted by. Beijing Saixi Technology Development Co., Ltd., Institute of Computing Technology, Chinese Academy of Sciences, Tsinghua University, National Planning
Computer Network Emergency Technology Coordination Center, Shanghai SenseTime Intelligent Technology Co., Ltd., Beijing Ruilai Intelligent Technology Co., Ltd., Alibaba
(China) Co., Ltd., Institute of Information Engineering, Chinese Academy of Sciences, China Academy of Information and Communications Technology, China Electronics Technology Group Corporation Fifteenth Research Institute
Institute, National Information Technology Security Research Center, Guangzhou University, Peking University, East China Normal University, Beihang University, Huawei Technologies Co., Ltd.
Co., Ltd., Beijing Megvii Technology Co., Ltd., Beijing Baidu Network Technology Co., Ltd., Shenzhen Tencent Computer Systems Co., Ltd., Zhejiang University
School, Beijing Qihu Technology Co., Ltd., Beijing Xiaoju Technology Co., Ltd., Anhui Engineering University, Beijing Zhizhi Tianxia Technology Co., Ltd., Beijing
Jiaotong University, Zhejiang University of Technology, Shanghai Industrial Control Safety Innovation Technology Co., Ltd., People's Public Security University of China, Shenzhen Big Data Research
Academy, Beijing Institute of Computer Technology and Applications, Institute of Automation, Chinese Academy of Sciences, Shanghai Suiyuan Technology Co., Ltd., Fengtai Technology (Beijing)
Co., Ltd., China Electronics Technology Standardization Institute.
The main drafters of this document. Shangguan Xiaoli, Hao Chunliang, Xu Xiaogeng, Hu Ying, Chen Zhong, Shen Huawei, Jiang Hui, Mei Jingqing, Zhang Yuguang, Peng Juntao,
Guo Yan, Li Pengxiao, Ai Zhengyang, Zhao Yunwei, Han Han, Liu Ming, Yin Zhiyi, Pang Liang, Wang Xiaoshi, Liu Zongzhen, Zhou Xi, Meng Guozhu, Jing Huiyun, Zhang Linlin,
Zhu Chunchao, Huo Shanshan, Liu Jian, Liu He, Su Hang, Jin Tao, Liu Jiqiang, Ren Kui, Zhang Xudong, Cheng Jin, Zhu Hongru, Yang Tao, Li Qin, Liu Xianglong,
Wang Yifei, Wu Geng, He Ran, Gu Zhaoquan, Li Shi, Cao Xiaoqi, Yan Minrui, Fu Yingbo, Guo Ying, Sun Air Force, Tang Jiayu, Liu Xize, Wang Zhelin, Ren Lu,
Xu Yongtai, Zhang Yi, Qin Zhan, An Zeliang, Xu Yuqing, Li Xue, Li Dahai, Xu Guangxia, Bao Shenfu, Guo Jianling, Xuan Qi, Zhang Shitian, Zhao Yongxin, Wang Jiao,
Wang Bingzheng, Lu Tianliang, Wu Baoyuan, Han Lei, Zhang Yutong, Peng Quan.
Information security technology
Machine learning algorithm security assessment specifications
1 Scope
This document specifies the security requirements and assessment methods for machine learning algorithm technologies and services, as well as the machine learning algorithm security assessment process.
This document is suitable for guiding machine learning algorithm providers to ensure the security of the machine learning algorithm life cycle and carry out machine learning algorithm security.
A comprehensive assessment can also provide reference for regulatory assessment.
2 Normative reference documents
This document has no normative references.
3 Terms and definitions
The following terms and definitions apply to this document.
3.1
Algorithms that functional units improve their performance by learning new knowledge and skills or sorting out existing knowledge and skills.
3.2
Organizations that utilize machine learning algorithms to perform specific functions.
Note. This document is referred to as algorithm provider, including algorithm technology providers and algorithm service providers. Algorithm technology provider refers to the development and
Provider, algorithm service provider refers to a service provider that uses applied algorithm technology.
3.3
Services that apply algorithm recommendation technology to provide information.
Note 1.Application algorithm recommendation technology refers to the use of machine learning algorithms to generate synthetic categories, personalized push categories, sorting and selection categories, retrieval and filtering categories, and scheduling decisions.
Categorization and other algorithmic technologies are used to provide information to users.
Note 2.This document refers to algorithms such as generation and synthesis, personalized push, sorting and selection, retrieval and filtering, and scheduling and decision-making as five categories of algorithms.
3.4
algorithm lifecyclealgorithmlifecycle
The evolution of machine learning algorithms from design to retirement.
Note 1.The algorithm life cycle includes design and development, verification and confirmation, deployment and operation, maintenance and upgrade, and decommissioning.
Note 2.General algorithm services are in the deployment and running stage.
|