1393 lines
110 KiB
Text
1393 lines
110 KiB
Text
|
<!DOCTYPE html>
|
|||
|
<html lang="en" dir="ltr" prefix="content: http://purl.org/rss/1.0/modules/content/ dc: http://purl.org/dc/terms/ foaf: http://xmlns.com/foaf/0.1/ og: http://ogp.me/ns# rdfs: http://www.w3.org/2000/01/rdf-schema# schema: http://schema.org/ sioc: http://rdfs.org/sioc/ns# sioct: http://rdfs.org/sioc/types# skos: http://www.w3.org/2004/02/skos/core# xsd: http://www.w3.org/2001/XMLSchema# ">
|
|||
|
<head>
|
|||
|
<meta charset="utf-8" /><script type="text/javascript">(window.NREUM||(NREUM={})).init={ajax:{deny_list:["bam.nr-data.net"]}};(window.NREUM||(NREUM={})).loader_config={licenseKey:"37b7ccb661",applicationID:"1089704227"};;/*! For license information please see nr-loader-rum-1.283.2.min.js.LICENSE.txt */
|
|||
|
(()=>{var e,t,r={122:(e,t,r)=>{"use strict";r.d(t,{a:()=>i});var n=r(944);function i(e,t){try{if(!e||"object"!=typeof e)return(0,n.R)(3);if(!t||"object"!=typeof t)return(0,n.R)(4);const r=Object.create(Object.getPrototypeOf(t),Object.getOwnPropertyDescriptors(t)),o=0===Object.keys(r).length?e:r;for(let a in o)if(void 0!==e[a])try{if(null===e[a]){r[a]=null;continue}Array.isArray(e[a])&&Array.isArray(t[a])?r[a]=Array.from(new Set([...e[a],...t[a]])):"object"==typeof e[a]&&"object"==typeof t[a]?r[a]=i(e[a],t[a]):r[a]=e[a]}catch(e){(0,n.R)(1,e)}return r}catch(e){(0,n.R)(2,e)}}},555:(e,t,r)=>{"use strict";r.d(t,{Vp:()=>c,fn:()=>s,x1:()=>u});var n=r(384),i=r(122);const o={beacon:n.NT.beacon,errorBeacon:n.NT.errorBeacon,licenseKey:void 0,applicationID:void 0,sa:void 0,queueTime:void 0,applicationTime:void 0,ttGuid:void 0,user:void 0,account:void 0,product:void 0,extra:void 0,jsAttributes:{},userAttributes:void 0,atts:void 0,transactionName:void 0,tNamePlain:void 0},a={};function s(e){try{const t=c(e);return!!t.licenseKey&&!!t.errorBeacon&&!!t.applicationID}catch(e){return!1}}function c(e){if(!e)throw new Error("All info objects require an agent identifier!");if(!a[e])throw new Error("Info for ".concat(e," was never set"));return a[e]}function u(e,t){if(!e)throw new Error("All info objects require an agent identifier!");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r&&(r.info=a[e])}},217:(e,t,r)=>{"use strict";r.d(t,{D0:()=>m,gD:()=>v,xN:()=>h});r(860).K7.genericEvents;const n="experimental.marks",i="experimental.measures",o="experimental.resources",a=e=>{if(!e||"string"!=typeof e)return!1;try{document.createDocumentFragment().querySelector(e)}catch{return!1}return!0};var s=r(614),c=r(944),u=r(384),l=r(122);const d="[data-nr-mask]",f=()=>{const e={feature_flags:[],experimental:{marks:!1,measures:!1,resources:!1},mask_selector:"*",block_selector:"[data-nr-block]",mask_input_options:{color:!1,date:!1,"datetime-local":!1,email:!1,month:!1,number:!1,range:!1,search:!1,tel:!1,text:!1,time:!1,url:!1,week:!1,textarea:!1,select:!1,password:!0}};return{ajax:{deny_list:void 0,block_internal:!0,enabled:!0,autoStart:!0},distributed_tracing:{enabled:void 0,exclude_newrelic_header:void 0,cors_use_newrelic_header:void 0,cors_use_tracecontext_headers:void 0,allowed_origins:void 0},get feature_flags(){return e.feature_flags},set feature_flags(t){e.feature_flags=t},generic_events:{enabled:!0,autoStart:!0},harvest:{interval:30},jserrors:{enabled:!0,autoStart:!0},logging:{enabled:!0,autoStart:!0},metrics:{enabled:!0,autoStart:!0},obfuscate:void 0,page_action:{enabled:!0},page_view_event:{enabled:!0,autoStart:!0},page_view_timing:{enabled:!0,autoStart:!0},performance:{get capture_marks(){return e.feature_flags.includes(n)||e.experimental.marks},set capture_marks(t){e.experimental.marks=t},get capture_measures(){return e.feature_flags.includes(i)||e.experimental.measures},set capture_measures(t){e.experimental.measures=t},capture_detail:!0,resources:{get enabled(){return e.feature_flags.includes(o)||e.experimental.resources},set enabled(t){e.experimental.resources=t},asset_types:[],first_party_domains:[],ignore_newrelic:!0}},privacy:{cookies_enabled:!0},proxy:{assets:void 0,beacon:void 0},session:{expiresMs:s.wk,inactiveMs:s.BB},session_replay:{autoStart:!0,enabled:!1,preload:!1,sampling_rate:10,error_sampling_rate:100,collect_fonts:!1,inline_images:!1,fix_stylesheets:!0,mask_all_inputs:!0,get mask_text_selector(){return e.mask_selector},set mask_text_selector(t){a(t)?e.mask_selector="".concat(t,",").concat(d):""===t||null===t?e.mask_selector=d:(0,c.R)(5,t)},get block_class(){return"nr-block"},get ignore_class(){return"nr-ignore"},get mask_text_class(){return"nr-mask"},get block_selector(){return e.block_selector},set block_selector(t){a(t)?e.block_selector+=",".concat(t):""!==t&&(0,c.R)(6,t)},get mask_input_options(){return e.mask_input_options},set mask_input_options(t){t&&"object"==typeof t?e.mask_input_options={...t,password:!0}:(0,c.R)(7,t)}},session_trace:{enabled:!0,autoStart:!0},soft_navigations:{enabled:!0,autoStart:!0},spa:{enabled:!0,autoStart:!0
|
|||
|
<noscript><style>form.antibot * :not(.antibot-message) { display: none !important; }</style>
|
|||
|
</noscript><script async src="https://www.googletagmanager.com/gtag/js?id=G-HEQ0YF2VYL"></script>
|
|||
|
<script>window.dataLayer = window.dataLayer || [];function gtag(){dataLayer.push(arguments)};gtag("js", new Date());gtag("set", "developer_id.dMDhkMT", true);gtag('set', {'cookie_flags': 'SameSite=None;Secure', 'cookie_domain': 'www.nist.gov'});gtag("config", "G-HEQ0YF2VYL", {"groups":"default","page_placeholder":"PLACEHOLDER_page_location","link_attribution":true,"allow_ad_personalization_signals":false});gtag("config", "G-CSLL4ZEK4L", {"groups":"default","page_placeholder":"PLACEHOLDER_page_location","link_attribution":true,"allow_ad_personalization_signals":false});gtag("event", "custom", {"node_title":"Protecting Model Updates in Privacy-Preserving Federated Learning: Part Two","node_id":"1847391","blog_author":"David Darais, Joseph Near, Mark Durkee , Dave Buckley","content_type":"Blog entry"});</script>
|
|||
|
<meta name="description" content="The problem " />
|
|||
|
<link rel="canonical" href="https://www.nist.gov/blogs/cybersecurity-insights/protecting-model-updates-privacy-preserving-federated-learning-part-two" />
|
|||
|
<link rel="shortlink" href="https://www.nist.gov/node/1847391" />
|
|||
|
<meta name="citation_title" content="Protecting Model Updates in Privacy-Preserving Federated Learning: Part Two | NIST" />
|
|||
|
<meta property="og:site_name" content="NIST" />
|
|||
|
<meta property="og:type" content="Article" />
|
|||
|
<meta property="og:url" content="https://www.nist.gov/blogs/cybersecurity-insights/protecting-model-updates-privacy-preserving-federated-learning-part-two" />
|
|||
|
<meta property="og:title" content="Protecting Model Updates in Privacy-Preserving Federated Learning: Part Two" />
|
|||
|
<meta property="og:description" content="The problem " />
|
|||
|
<meta property="og:image" content="https://www.nist.gov/themes/custom/nist_www/img/homepage/nist_mark.png" />
|
|||
|
<meta property="article:author" content="David Darais" />
|
|||
|
<meta property="article:tag" content="data privacy" />
|
|||
|
<meta property="article:published_time" content="2024-05-02T08:00-04:00" />
|
|||
|
<meta property="article:modified_time" content="2024-05-02T11:11-04:00" />
|
|||
|
<meta name="dcterms.title" content="Protecting Model Updates in Privacy-Preserving Federated Learning: Part Two" />
|
|||
|
<meta name="dcterms.creator" content="David Darais" />
|
|||
|
<meta name="dcterms.description" content="The problem " />
|
|||
|
<meta name="dcterms.publisher" content="David Darais" />
|
|||
|
<meta name="dcterms.contributor" content="NIST" />
|
|||
|
<meta name="dcterms.date" content="2024-05-02T08:00-04:00" />
|
|||
|
<meta name="dcterms.type" content="text" />
|
|||
|
<meta name="dcterms.format" content="text/html" />
|
|||
|
<meta name="dcterms.identifier" content="https://www.nist.gov/blogs/cybersecurity-insights/protecting-model-updates-privacy-preserving-federated-learning-part-two" />
|
|||
|
<meta name="dcterms.source" content="NIST" />
|
|||
|
<meta name="dcterms.created" content="2024-05-02T08:00-04:00" />
|
|||
|
<meta name="dcterms.modified" content="2024-05-02T11:11-04:00" />
|
|||
|
<meta name="twitter:card" content="summary_large_image" />
|
|||
|
<meta name="twitter:description" content="The problem " />
|
|||
|
<meta name="twitter:site" content="NIST" />
|
|||
|
<meta name="twitter:title" content="Protecting Model Updates in Privacy-Preserving Federated Learning: Part Two" />
|
|||
|
<meta name="google-site-verification" content="QMu0ODkER3rN5hLcMLqNVf7e3bkjYsNLTuhqfH48jCA" />
|
|||
|
<meta name="Generator" content="Drupal 10 (https://www.drupal.org)" />
|
|||
|
<meta name="MobileOptimized" content="width" />
|
|||
|
<meta name="HandheldFriendly" content="true" />
|
|||
|
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
|||
|
<meta name="nist_search_modified" class="elastic" content="2024-05-02T11:11:00-04:00" />
|
|||
|
<script type="application/ld+json">{
|
|||
|
"@context": "https://schema.org",
|
|||
|
"@graph": [
|
|||
|
{
|
|||
|
"@type": "Article",
|
|||
|
"@id": "https://www.nist.gov/blogs/cybersecurity-insights/protecting-model-updates-privacy-preserving-federated-learning-part-two",
|
|||
|
"headline": "Protecting Model Updates in Privacy-Preserving Federated Learning: Part Two",
|
|||
|
"name": "Protecting Model Updates in Privacy-Preserving Federated Learning: Part Two",
|
|||
|
"description": "The problem ",
|
|||
|
"datePublished": "2024-05-02T08:00-04:00",
|
|||
|
"dateModified": "2024-05-02T11:11-04:00",
|
|||
|
"author": [
|
|||
|
{
|
|||
|
"@type": "Person",
|
|||
|
"@id": "https://www.nist.gov/blogs/cybersecurity-insights/authors/david-darais",
|
|||
|
"name": "David Darais",
|
|||
|
"url": "https://www.nist.gov/blogs/cybersecurity-insights/authors/david-darais"
|
|||
|
},
|
|||
|
{
|
|||
|
"@type": "Person",
|
|||
|
"@id": "https://www.nist.gov/blogs/cybersecurity-insights/authors/joseph-near",
|
|||
|
"name": "Joseph Near",
|
|||
|
"url": "https://www.nist.gov/blogs/cybersecurity-insights/authors/joseph-near"
|
|||
|
},
|
|||
|
{
|
|||
|
"@type": "Person",
|
|||
|
"@id": "https://www.nist.gov/blogs/cybersecurity-insights/authors/mark-durkee",
|
|||
|
"name": "Mark Durkee",
|
|||
|
"url": "https://www.nist.gov/blogs/cybersecurity-insights/authors/mark-durkee"
|
|||
|
},
|
|||
|
{
|
|||
|
"@type": "Person",
|
|||
|
"@id": "https://www.nist.gov/blogs/cybersecurity-insights/authors/dave-buckley",
|
|||
|
"name": "Dave Buckley",
|
|||
|
"url": "https://www.nist.gov/blogs/cybersecurity-insights/authors/dave-buckley"
|
|||
|
}
|
|||
|
],
|
|||
|
"publisher": {
|
|||
|
"@type": "GovernmentOrganization",
|
|||
|
"@id": "https://www.nist.gov/",
|
|||
|
"name": "National Institute of Standards and Technology",
|
|||
|
"url": "https://www.nist.gov/"
|
|||
|
}
|
|||
|
}
|
|||
|
]
|
|||
|
}</script>
|
|||
|
<meta name="nist_search_bundle" class="elastic" content="blog" />
|
|||
|
<link rel="icon" href="/themes/custom/nist_www/favicon.ico" type="image/vnd.microsoft.icon" />
|
|||
|
|
|||
|
<title>Protecting Model Updates in Privacy-Preserving Federated Learning: Part Two | NIST</title>
|
|||
|
<link rel="stylesheet" media="all" href="/sites/default/files/css/css_hKAD9a0878O1Pdb6alKtCmESLiUtQmrBX15rQUvSgOA.css?delta=0&language=en&theme=nist_www&include=eJxNTgsOwyAIvZCpRzKotCNFaYTW9fazW5ctIYRH3i9CWoPJmM3H3x0oSXWV1II9sOD4CUdooUj2mRQiY2Cqq9NTDcvQKr75fmGJwB9t7_2L8WkX3-e2b8DTDd1B2NW_9zS8d75dCiyVZkpuJjZsPsFmNCqpJAIOBTPBFToYDKfsFkarJAe200vFJH8NCqUmSoYvWkVdRQ" />
|
|||
|
<link rel="stylesheet" media="all" href="/sites/default/files/css/css_kGS0ApDpFo-_3JI4Ijxg4RCWlTqsImK3lqH7bCv5v2U.css?delta=1&language=en&theme=nist_www&include=eJxNTgsOwyAIvZCpRzKotCNFaYTW9fazW5ctIYRH3i9CWoPJmM3H3x0oSXWV1II9sOD4CUdooUj2mRQiY2Cqq9NTDcvQKr75fmGJwB9t7_2L8WkX3-e2b8DTDd1B2NW_9zS8d75dCiyVZkpuJjZsPsFmNCqpJAIOBTPBFToYDKfsFkarJAe200vFJH8NCqUmSoYvWkVdRQ" />
|
|||
|
<link rel="stylesheet" media="print" href="/sites/default/files/css/css_-IXwLuTUdm8IGHxib8GX8wWKw3LjKsNWSYYskZ5fEGg.css?delta=2&language=en&theme=nist_www&include=eJxNTgsOwyAIvZCpRzKotCNFaYTW9fazW5ctIYRH3i9CWoPJmM3H3x0oSXWV1II9sOD4CUdooUj2mRQiY2Cqq9NTDcvQKr75fmGJwB9t7_2L8WkX3-e2b8DTDd1B2NW_9zS8d75dCiyVZkpuJjZsPsFmNCqpJAIOBTPBFToYDKfsFkarJAe200vFJH8NCqUmSoYvWkVdRQ" />
|
|||
|
<link rel="stylesheet" media="all" href="/sites/default/files/css/css_RS8YGnRq2Xi5aD-GQC3GKwBe6bOWBBmEmXrb2xB5FMM.css?delta=3&language=en&theme=nist_www&include=eJxNTgsOwyAIvZCpRzKotCNFaYTW9fazW5ctIYRH3i9CWoPJmM3H3x0oSXWV1II9sOD4CUdooUj2mRQiY2Cqq9NTDcvQKr75fmGJwB9t7_2L8WkX3-e2b8DTDd1B2NW_9zS8d75dCiyVZkpuJjZsPsFmNCqpJAIOBTPBFToYDKfsFkarJAe200vFJH8NCqUmSoYvWkVdRQ" />
|
|||
|
|
|||
|
<script src="/sites/default/files/js/js_GM8kl6wk698qKTTwusj83bCoGHHtOZ1UinjY1sE_Qbk.js?scope=header&delta=0&language=en&theme=nist_www&include=eJxdjWsSgyAMhC-kzZEyQSKmAnEApb198dFpx5n8yLfJ7hoaZizaZgHz2_GZO6fqPCNF8u8iQ4a70EXJBUdpmtUavZLFklqIRAeOznOWwhKWpBvDXdhbDq1MHLj1qjeUMKgFK5lMC_YS5-MHnFdDvr8sMDFZTl_EWuvfB7_KbgSb1oX848LTGMhFGWXoNuGa8bmGBQPHFQ7ud-53_gAS9G-N"></script>
|
|||
|
|
|||
|
</head>
|
|||
|
<body class="node-1847391">
|
|||
|
<a href="#main-content" class="visually-hidden focusable" data-elastic-exclude>
|
|||
|
Skip to main content
|
|||
|
</a>
|
|||
|
|
|||
|
<div class="dialog-off-canvas-main-canvas" data-off-canvas-main-canvas>
|
|||
|
|
|||
|
<!-- nist-index-ignore-start -->
|
|||
|
<section data-elastic-exclude class="usa-banner" aria-label="Official government website">
|
|||
|
<div class="usa-accordion">
|
|||
|
<header class="usa-banner__header">
|
|||
|
<div class="usa-banner__inner">
|
|||
|
<div class="grid-col-auto">
|
|||
|
<img class="usa-banner__header-flag" src="/libraries/nist-component-library/dist/img/us_flag_small.png" alt="U.S. flag">
|
|||
|
</div>
|
|||
|
<div class="grid-col-fill tablet:grid-col-auto">
|
|||
|
<p class="usa-banner__header-text">An official website of the United States government</p>
|
|||
|
<p class="usa-banner__header-action" aria-hidden="true">Here’s how you know</p>
|
|||
|
</div>
|
|||
|
<button class="usa-accordion__button usa-banner__button" aria-expanded="false" aria-controls="gov-banner-default">
|
|||
|
<span class="usa-banner__button-text">Here’s how you know</span>
|
|||
|
</button>
|
|||
|
</div>
|
|||
|
</header>
|
|||
|
<div class="usa-banner__content usa-accordion__content" id="gov-banner-default">
|
|||
|
<div class="grid-row grid-gap-lg">
|
|||
|
<div class="usa-banner__guidance tablet:grid-col-6">
|
|||
|
<img class="usa-banner__icon usa-media-block__img" src="/libraries/nist-component-library/dist/img/icon-dot-gov.svg" role="img" alt="" aria-hidden="true">
|
|||
|
<div class="usa-media-block__body">
|
|||
|
<p>
|
|||
|
<strong>Official websites use .gov</strong>
|
|||
|
<br/>
|
|||
|
A <strong>.gov</strong> website belongs to an official government organization in the United States.
|
|||
|
</p>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
<div class="usa-banner__guidance tablet:grid-col-6">
|
|||
|
<img class="usa-banner__icon usa-media-block__img" src="/libraries/nist-component-library/dist/img/icon-https.svg" role="img" alt="" aria-hidden="true">
|
|||
|
<div class="usa-media-block__body">
|
|||
|
<p>
|
|||
|
<strong>Secure .gov websites use HTTPS</strong>
|
|||
|
<br/>
|
|||
|
A <strong>lock</strong> ( <span class="icon-lock">
|
|||
|
<svg xmlns="http://www.w3.org/2000/svg" width="52" height="64" viewbox="0 0 52 64" class="usa-banner__lock-image" role="img" aria-labelledby="banner-lock-title banner-lock-description" focusable="false">
|
|||
|
<title id="banner-lock-title">Lock</title>
|
|||
|
<desc id="banner-lock-description">A locked padlock</desc><path fill="#000000" fill-rule="evenodd" d="M26 0c10.493 0 19 8.507 19 19v9h3a4 4 0 0 1 4 4v28a4 4 0 0 1-4 4H4a4 4 0 0 1-4-4V32a4 4 0 0 1 4-4h3v-9C7 8.507 15.507 0 26 0zm0 8c-5.979 0-10.843 4.77-10.996 10.712L15 19v9h22v-9c0-6.075-4.925-11-11-11z"/></svg>
|
|||
|
</span>
|
|||
|
) or <strong>https://</strong> means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
|
|||
|
</p>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</section>
|
|||
|
<!-- nist-index-ignore-end -->
|
|||
|
|
|||
|
|
|||
|
<div data-elastic-exclude>
|
|||
|
<!-- nist-index-ignore-start -->
|
|||
|
<div class="nist-print-header" style="display:none;">
|
|||
|
<p class="nist-print-header__url">https://www.nist.gov/blogs/cybersecurity-insights/protecting-model-updates-privacy-preserving-federated-learning-part-two</p>
|
|||
|
<img class="nist-print-header__logo" width="289" height="38" src="/libraries/nist-component-library/dist/img/logo/nist_logo_sidestack.svg" alt="National Institute of Standards and Technology" />
|
|||
|
</div>
|
|||
|
|
|||
|
|
|||
|
<div class="usa-overlay"></div>
|
|||
|
<header class="usa-header nist-header--www nist-header--minimal" role="banner">
|
|||
|
<div class="usa-navbar">
|
|||
|
<div class="usa-logo flex-fill">
|
|||
|
<a href="/" title="National Institute of Standards and Technology" aria-label="Home">
|
|||
|
<img src="/libraries/nist-component-library/dist/img/logo/logo.svg" alt="National Institute of Standards and Technology" width="300px" height="80px" />
|
|||
|
</a>
|
|||
|
</div>
|
|||
|
<div class="usa-header__right grid-row flex-auto">
|
|||
|
<div class="grid-col-fill nist-header__search-group">
|
|||
|
|
|||
|
<form class="usa-search usa-search--small"
|
|||
|
accept-charset="UTF-8"
|
|||
|
action="/search"
|
|||
|
id="search_form"
|
|||
|
method="get">
|
|||
|
<div role="search">
|
|||
|
<label class="usa-sr-only" for="search-form">Search NIST</label>
|
|||
|
<input class="usa-input" id="search-form" type="search" name="s" placeholder="Search NIST" required="" maxlength="128">
|
|||
|
<button class="usa-button" type="submit"><img src="/libraries/nist-component-library/dist/img/usa-icons-bg/search--white.svg" class="usa-search__submit-icon" alt="Search"></button>
|
|||
|
</div>
|
|||
|
</form>
|
|||
|
</div>
|
|||
|
<div class="grid-col-auto padding-left-1">
|
|||
|
<button class="usa-menu-btn">Menu</button>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<nav aria-label="Primary navigation" class="usa-nav">
|
|||
|
<div class="usa-nav__inner">
|
|||
|
<button class="usa-nav__close">Close</button>
|
|||
|
<ul class="usa-nav__primary usa-accordion">
|
|||
|
<li class="usa-nav__primary-item">
|
|||
|
<a class="usa-nav__link" href="/publications">Publications</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__primary-item">
|
|||
|
<button class="usa-accordion__button usa-nav__link" aria-expanded="false" aria-controls="primary_menu-2"><span>What We Do</span></button>
|
|||
|
<div id="primary_menu-2" class="usa-nav__submenu usa-megamenu">
|
|||
|
<div class="grid-row">
|
|||
|
<div class="tablet:grid-col-fill"><ul class="usa-nav__submenu-list">
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/topics" class="usa-nav__link">All Topics</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/advanced-communications" class="usa-nav__link">Advanced communications</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/artificial-intelligence" class="usa-nav__link">Artificial intelligence</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/bioscience" class="usa-nav__link">Bioscience</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/buildings-construction" class="usa-nav__link">Buildings and construction</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/chemistry" class="usa-nav__link">Chemistry</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/cybersecurity" class="usa-nav__link">Cybersecurity</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/electronics" class="usa-nav__link">Electronics</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/energy" class="usa-nav__link">Energy</a>
|
|||
|
</li>
|
|||
|
</ul></div><div class="column-break tablet:grid-col-fill"><ul class="usa-nav__submenu-list">
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/environment" class="usa-nav__link">Environment</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/fire" class="usa-nav__link">Fire</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/forensic-science" class="usa-nav__link">Forensic science</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/health" class="usa-nav__link">Health</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/information-technology" class="usa-nav__link">Information technology</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/infrastructure" class="usa-nav__link">Infrastructure</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/manufacturing" class="usa-nav__link">Manufacturing</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/materials" class="usa-nav__link">Materials</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/mathematics-statistics" class="usa-nav__link">Mathematics and statistics</a>
|
|||
|
</li>
|
|||
|
</ul></div><div class="column-break tablet:grid-col-fill"><ul class="usa-nav__submenu-list">
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/metrology" class="usa-nav__link">Metrology</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/nanotechnology" class="usa-nav__link">Nanotechnology</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/neutron-research" class="usa-nav__link">Neutron research</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/performance-excellence" class="usa-nav__link">Performance excellence</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/physics" class="usa-nav__link">Physics</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/public-safety" class="usa-nav__link">Public safety</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/quantum-information-science" class="usa-nav__link">Quantum information science</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/resilience" class="usa-nav__link">Resilience</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/standards" class="usa-nav__link">Standards</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/transportation" class="usa-nav__link">Transportation</a>
|
|||
|
</li>
|
|||
|
</ul>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__primary-item">
|
|||
|
<button class="usa-accordion__button usa-nav__link" aria-expanded="false" aria-controls="primary_menu-3"><span>Labs & Major Programs</span></button>
|
|||
|
<div id="primary_menu-3" class="usa-nav__submenu usa-megamenu">
|
|||
|
<div class="grid-row">
|
|||
|
<div class="tablet:grid-col-fill"><ul class="usa-nav__submenu-list">
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/adlp" class="usa-nav__link">Assoc Director of Laboratory Programs</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/laboratories" class="usa-nav__link">Laboratories</a>
|
|||
|
<ul class="usa-nav__submenu-list">
|
|||
|
<li>
|
|||
|
<a href="/ctl" class="usa-nav__link">Communications Technology Laboratory</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/el" class="usa-nav__link">Engineering Laboratory</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/itl" class="usa-nav__link">Information Technology Laboratory</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/mml" class="usa-nav__link">Material Measurement Laboratory</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/pml" class="usa-nav__link">Physical Measurement Laboratory</a>
|
|||
|
</li>
|
|||
|
</ul>
|
|||
|
</li>
|
|||
|
</ul></div><div class="column-break tablet:grid-col-fill"><ul class="usa-nav__submenu-list">
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/user-facilities" class="usa-nav__link">User Facilities</a>
|
|||
|
<ul class="usa-nav__submenu-list">
|
|||
|
<li>
|
|||
|
<a href="/ncnr" class="usa-nav__link">NIST Center for Neutron Research</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/cnst" class="usa-nav__link">CNST NanoFab</a>
|
|||
|
</li>
|
|||
|
</ul>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/labs-major-programs/research-test-beds" class="usa-nav__link">Research Test Beds</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/laboratories/projects-programs" class="usa-nav__link">Research Projects</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/laboratories/tools-instruments" class="usa-nav__link">Tools & Instruments</a>
|
|||
|
</li>
|
|||
|
</ul></div><div class="column-break tablet:grid-col-fill"><ul class="usa-nav__submenu-list">
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/major-programs" class="usa-nav__link">Major Programs</a>
|
|||
|
<ul class="usa-nav__submenu-list">
|
|||
|
<li>
|
|||
|
<a href="/baldrige" class="usa-nav__link">Baldrige Performance Excellence Program</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/chips" class="usa-nav__link">CHIPS for America Initiative</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/mep" class="usa-nav__link">Manufacturing Extension Partnership (MEP)</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/oam" class="usa-nav__link">Office of Advanced Manufacturing</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/spo" class="usa-nav__link">Special Programs Office</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/tpo" class="usa-nav__link">Technology Partnerships Office</a>
|
|||
|
</li>
|
|||
|
</ul>
|
|||
|
</li>
|
|||
|
</ul>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__primary-item">
|
|||
|
<button class="usa-accordion__button usa-nav__link" aria-expanded="false" aria-controls="primary_menu-4"><span>Services & Resources</span></button>
|
|||
|
<div id="primary_menu-4" class="usa-nav__submenu usa-megamenu">
|
|||
|
<div class="grid-row">
|
|||
|
<div class="tablet:grid-col-fill"><ul class="usa-nav__submenu-list">
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/content/standards-measurements" class="usa-nav__link">Standards and Measurements</a>
|
|||
|
<ul class="usa-nav__submenu-list">
|
|||
|
<li>
|
|||
|
<a href="/calibrations" class="usa-nav__link">Calibration Services</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/nvlap" class="usa-nav__link">Laboratory Accreditation (NVLAP)</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/nist-quality-system" class="usa-nav__link">Quality System</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/srm" class="usa-nav__link">Standard Reference Materials (SRMs)</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/sri" class="usa-nav__link">Standard Reference Instruments (SRIs)</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/standardsgov" class="usa-nav__link">Standards.gov</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/pml/time-and-frequency-division/time-services" class="usa-nav__link">Time Services</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/pml/owm" class="usa-nav__link">Office of Weights and Measures</a>
|
|||
|
</li>
|
|||
|
</ul>
|
|||
|
</li>
|
|||
|
</ul></div><div class="column-break tablet:grid-col-fill"><ul class="usa-nav__submenu-list">
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/services-resources/software" class="usa-nav__link">Software</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/data" class="usa-nav__link">Data</a>
|
|||
|
<ul class="usa-nav__submenu-list">
|
|||
|
<li>
|
|||
|
<a href="https://webbook.nist.gov/chemistry/" class="usa-nav__link">Chemistry WebBook</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="https://nvd.nist.gov/" class="usa-nav__link">National Vulnerability Database</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/pml/productsservices/physical-reference-data" class="usa-nav__link">Physical Reference Data</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/srd" class="usa-nav__link">Standard Reference Data (SRD)</a>
|
|||
|
</li>
|
|||
|
</ul>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="https://shop.nist.gov/" class="usa-nav__link">Storefront</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/tpo" class="usa-nav__link">License & Patents</a>
|
|||
|
</li>
|
|||
|
</ul></div><div class="column-break tablet:grid-col-fill"><ul class="usa-nav__submenu-list">
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="https://csrc.nist.gov/" class="usa-nav__link">Computer Security Resource Center (CSRC)</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/nist-research-library" class="usa-nav__link">NIST Research Library</a>
|
|||
|
</li>
|
|||
|
</ul>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__primary-item">
|
|||
|
<button class="usa-accordion__button usa-nav__link" aria-expanded="false" aria-controls="primary_menu-5"><span>News & Events</span></button>
|
|||
|
<div id="primary_menu-5" class="usa-nav__submenu usa-megamenu">
|
|||
|
<div class="grid-row">
|
|||
|
<div class="tablet:grid-col-fill"><ul class="usa-nav__submenu-list">
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/news-events/news" class="usa-nav__link">News</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/news-events/events" class="usa-nav__link">Events</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/blogs" class="usa-nav__link">Blogs</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/feature-stories" class="usa-nav__link">Feature Stories</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/awards" class="usa-nav__link">Awards</a>
|
|||
|
</li>
|
|||
|
</ul></div><div class="column-break tablet:grid-col-fill"><ul class="usa-nav__submenu-list">
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/video-gallery" class="usa-nav__link">Video Gallery</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/image-gallery" class="usa-nav__link">Image Gallery</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/pao/media-contacts" class="usa-nav__link">Media Contacts</a>
|
|||
|
</li>
|
|||
|
</ul>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__primary-item">
|
|||
|
<button class="usa-accordion__button usa-nav__link" aria-expanded="false" aria-controls="primary_menu-6"><span>About NIST</span></button>
|
|||
|
<div id="primary_menu-6" class="usa-nav__submenu usa-megamenu">
|
|||
|
<div class="grid-row">
|
|||
|
<div class="tablet:grid-col-fill"><ul class="usa-nav__submenu-list">
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/about-nist" class="usa-nav__link">About Us</a>
|
|||
|
<ul class="usa-nav__submenu-list">
|
|||
|
<li>
|
|||
|
<a href="/director/leadership" class="usa-nav__link">Leadership</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/director/nist-organization-structure" class="usa-nav__link">Organization Structure</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/about-nist/budget-planning" class="usa-nav__link">Budget & Planning</a>
|
|||
|
</li>
|
|||
|
</ul>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/about-nist/contact-us" class="usa-nav__link">Contact Us</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/about-nist/visit" class="usa-nav__link">Visit</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/careers" class="usa-nav__link">Careers</a>
|
|||
|
<ul class="usa-nav__submenu-list">
|
|||
|
<li>
|
|||
|
<a href="/iaao/academic-affairs-office" class="usa-nav__link">Student programs</a>
|
|||
|
</li>
|
|||
|
</ul>
|
|||
|
</li>
|
|||
|
</ul></div><div class="column-break tablet:grid-col-fill"><ul class="usa-nav__submenu-list">
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/about-nist/work-nist" class="usa-nav__link">Work with NIST</a>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/history" class="usa-nav__link">History</a>
|
|||
|
<ul class="usa-nav__submenu-list">
|
|||
|
<li>
|
|||
|
<a href="http://nistdigitalarchives.contentdm.oclc.org/" class="usa-nav__link">NIST Digital Archives</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/nist-museum" class="usa-nav__link">NIST Museum</a>
|
|||
|
</li>
|
|||
|
<li>
|
|||
|
<a href="/nist-and-nobel" class="usa-nav__link">NIST and the Nobel</a>
|
|||
|
</li>
|
|||
|
</ul>
|
|||
|
</li>
|
|||
|
<li class="usa-nav__submenu-item">
|
|||
|
<a href="/education" class="usa-nav__link">Educational Resources</a>
|
|||
|
</li>
|
|||
|
</ul>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</li>
|
|||
|
</ul>
|
|||
|
</div>
|
|||
|
</nav>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
</header>
|
|||
|
<!-- nist-index-ignore-end -->
|
|||
|
</div>
|
|||
|
|
|||
|
<div class="grid-container">
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<div
|
|||
|
id="block-nist-www-content" class="nist-block"
|
|||
|
>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<section
|
|||
|
class="nist-page__content usa-section clearfix"
|
|||
|
>
|
|||
|
|
|||
|
<a id="main-content" tabindex="-1"></a>
|
|||
|
|
|||
|
<div
|
|||
|
class="nist-page__region nist-page__region--content-top-full"
|
|||
|
>
|
|||
|
|
|||
|
<div
|
|||
|
class="nist-block"
|
|||
|
>
|
|||
|
|
|||
|
|
|||
|
<div class="entity-reference">
|
|||
|
|
|||
|
<div class="nist-blog-header nist-blog-header--darkgray nist-blog-header--inner">
|
|||
|
<div class="nist-blog-header__bkgrd">
|
|||
|
<div class="nist-blog-header__main grid-container">
|
|||
|
<div class="grid-row">
|
|||
|
<h2 class="nist-blog-header__title">
|
|||
|
<a href="/blogs/cybersecurity-insights"> Cybersecurity Insights
|
|||
|
</a>
|
|||
|
</h2>
|
|||
|
<div class="nist-blog-header__tagline">
|
|||
|
<p class="text">a NIST blog</p>
|
|||
|
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
<div class="grid-container margin-top-4">
|
|||
|
<div
|
|||
|
class="nist-page__region nist-page__region--content-top"
|
|||
|
>
|
|||
|
|
|||
|
<div
|
|||
|
class="nist-block"
|
|||
|
>
|
|||
|
|
|||
|
|
|||
|
<h1 class="nist-page__title">Protecting Model Updates in Privacy-Preserving Federated Learning: Part Two</h1>
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
<div
|
|||
|
class="font-body-md"
|
|||
|
>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<div class="daterange"><time datetime="2024-05-02T12:00:00Z">May 2, 2024</time>
|
|||
|
</div>
|
|||
|
|
|||
|
</div>
|
|||
|
<div
|
|||
|
class="nist-block"
|
|||
|
>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<span>By: </span>
|
|||
|
<a href="/blogs/cybersecurity-insights/authors/david-darais" hreflang="en">David Darais</a>, <a href="/blogs/cybersecurity-insights/authors/joseph-near" hreflang="en">Joseph Near</a>, <a href="/blogs/cybersecurity-insights/authors/mark-durkee" hreflang="en">Mark Durkee</a> and <a href="/blogs/cybersecurity-insights/authors/dave-buckley" hreflang="en">Dave Buckley</a>
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
<div
|
|||
|
class="nist-block"
|
|||
|
>
|
|||
|
|
|||
|
|
|||
|
<!-- nist-index-ignore-start -->
|
|||
|
<div data-elastic-exclude class="nist-block nist-social__wrapper">
|
|||
|
<h2 class="nist-social__title">Share</h2>
|
|||
|
<div class="social-media-sharing">
|
|||
|
<div class="nist-social__wrapper--share">
|
|||
|
<div>
|
|||
|
<a target="_blank" rel="noopener" href="https://www.facebook.com/share.php?u=https://www.nist.gov/blogs/cybersecurity-insights/protecting-model-updates-privacy-preserving-federated-learning-part-two"
|
|||
|
title="Facebook" class="nist-social nist-social--facebook-gray">
|
|||
|
<span>Facebook</span>
|
|||
|
</a>
|
|||
|
</div>
|
|||
|
<div>
|
|||
|
<a target="_blank" rel="noopener" href="https://www.linkedin.com/shareArticle?mini=true&url=https://www.nist.gov/blogs/cybersecurity-insights/protecting-model-updates-privacy-preserving-federated-learning-part-two&source=https://www.nist.gov/blogs/cybersecurity-insights/protecting-model-updates-privacy-preserving-federated-learning-part-two"
|
|||
|
title="Linkedin" class="nist-social nist-social--linkedin-gray">
|
|||
|
<span>Linkedin</span>
|
|||
|
</a>
|
|||
|
</div>
|
|||
|
<div>
|
|||
|
<a target="_blank" rel="noopener" href="https://x.com/intent/tweet?url=https://www.nist.gov/blogs/cybersecurity-insights/protecting-model-updates-privacy-preserving-federated-learning-part-two&status=https://www.nist.gov/blogs/cybersecurity-insights/protecting-model-updates-privacy-preserving-federated-learning-part-two"
|
|||
|
title="X.com" class="nist-social nist-social--x-gray">
|
|||
|
<span>X.com</span>
|
|||
|
</a>
|
|||
|
</div>
|
|||
|
<div>
|
|||
|
<a href="mailto:?subject=NIST.gov&body=Check out this site https://www.nist.gov/blogs/cybersecurity-insights/protecting-model-updates-privacy-preserving-federated-learning-part-two"
|
|||
|
title="Email" class="nist-social nist-social--envelope-gray">
|
|||
|
<span>Email</span>
|
|||
|
</a>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
<!-- nist-index-ignore-end -->
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
|
|||
|
<div class="grid-container margin-top-4">
|
|||
|
<div class="grid-row grid-gap-6">
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<div
|
|||
|
class="nist-page__region nist-page__region--content tablet-lg:grid-col-8"
|
|||
|
>
|
|||
|
|
|||
|
<div
|
|||
|
class="nist-block"
|
|||
|
>
|
|||
|
|
|||
|
|
|||
|
<div class="text-with-summary">
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<p><span lang="EN"><strong>The problem </strong></span></p><p class="MsoNormal"><span>The </span><a href="https://www.nist.gov/blogs/cybersecurity-insights/protecting-model-updates-privacy-preserving-federated-learning"><span lang="EN-US">previous post</span></a><span> in our series discussed techniques for providing input privacy in PPFL systems where data is horizontally partitioned. This blog will focus on techniques for providing input privacy when data is </span><em><span><strong>vertically partitioned</strong></span></em><span>.</span><span lang="EN"></span></p><p class="MsoNormal"><span lang="EN"> </span><span>As described in our </span><a href="https://www.nist.gov/blogs/cybersecurity-insights/data-distribution-privacy-preserving-federated-learning"><span lang="EN-US">third post</span></a><span>, vertical partitioning is where the training data is divided across parties such that each party holds different columns of the data. In contrast to horizontally partitioned data, training a model on vertically partitioned data is more challenging as it is generally not possible to train separate models on different </span><em><span>columns</span></em><span> of the data (but overlapping </span><em><span>rows</span></em><span>) and then compose them afterwards.</span><span lang="EN"></span><span lang="EN"></span></p><p class="MsoNormal"><span>Instead, we need methods to be able to train on the collective data while protecting the privacy of that data. One critical step required for this is </span><em><span><strong>privacy-preserving entity alignment: </strong></span></em><span>matching corresponding records (e.g. records referencing the same person) across different datasets</span><em><span><strong>. </strong></span></em><span>Parties can use the result of the entity alignment to train a model in a similar way to how they would in a horizontal partitioning scenario. </span></p><p class="MsoNormal"><span>Matching corresponding records without revealing the records themselves is a challenging task. In the remainder of this blog, we discuss two methods for privacy-preserving entity alignment: private set intersection and Bloom filters.</span></p><p><span lang="EN"><strong>Private set intersection</strong></span></p><p class="MsoNormal"><span>A </span><em><span><strong>private set intersection (PSI) </strong></span></em><span>is an input privacy technique that enables data linking between parties. The result of a PSI process reveals information to the participants </span><em><span>only</span></em><span> for rows of data that match on a common key. This is illustrated in Figure 1. For example, </span><a href="https://mccourt.georgetown.edu/news/a-federal-government-privacy-preserving-technology-demonstration/"><span lang="EN-US">a pilot research project led by researchers at Georgetown University</span></a><span> applied PSI to link U.S. Department of Education data with data from the National Student Loan Data System to compute financial aid statistics without revealing students’ social security numbers.</span></p>
|
|||
|
<figure class=" nist-image--lightbox nist-image" role="group">
|
|||
|
<div data-lightbox="https://www.nist.gov/sites/default/files/styles/2800_x_2800_limit/public/images/2024/05/02/Naomi%20Privacy%20Blog%205_1.png?itok=eXZWjCsp" data-media-id="707161">
|
|||
|
|
|||
|
<img alt="The result of carrying out a private set intersection between two data partitions that share a common id field." height="195" loading="lazy" src="/sites/default/files/styles/480_x_480_limit/public/images/2024/05/02/Naomi%20Privacy%20Blog%205_1.png?itok=61sdlxlU" typeof="foaf:Image" width="388">
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
<figcaption class="nist-image__caption">The result of carrying out a private set intersection between two data partitions that share a common id field.<div class="nist-image__credit">
|
|||
|
<span class="nist-image__credit-label">Credit:</span>
|
|||
|
|
|||
|
NIST
|
|||
|
|
|||
|
</div></figcaption>
|
|||
|
</figure>
|
|||
|
|
|||
|
<p class="MsoNormal"><span>Some PSI approaches reveal only the </span><em><span>number</span></em><span> of matching rows, while others reveal more information (e.g. the </span><em><span>contents</span></em><span> of matching rows, as in the example in Figure 1). PPFL systems often rely on the contents of the matching rows, and must therefore use “leaky” PSI approaches. There are also some trade-offs to consider between the strength of a PSI technique in protecting data against its performance when applied in federated learning scenarios on large data sets such as those in the UK-US PETs Prize Challenges.</span></p><p><span lang="EN"><strong>Bloom filters</strong></span></p><p class="MsoNormal"><span>A second approach to entity alignment is to construct a </span><a href="https://dl.acm.org/doi/abs/10.1145/362686.362692"><em><span lang="EN-US"><strong>Bloom filter</strong></span></em></a><span>---a probabilistic data structure that uses a collection of hash functions to enable efficient storage and lookup of elements. Since Bloom filters are probabilistic, they sometimes make mistakes (false positives).</span></p><p class="MsoNormal"><span lang="EN-GB"></span></p><p class="MsoNormal"><span lang="EN-GB">In the context of PPFL, Bloom filters can </span><em><span lang="EN-GB">also</span></em><span lang="EN-GB"> provide privacy benefits. Specifically, the false positives provide a kind of input privacy protection automatically. Some PPFL systems use Bloom filters to facilitate privacy-preserving </span><em><span lang="EN-GB">feature mining</span></em><span lang="EN-GB">—a process that determines which attributes of the data to use when building the model. This was the approach used by </span><a href="https://github.com/usnistgov/PrivacyEngCollabSpace/tree/master/tools/de-identification/Scarlet-PETs"><span lang="EN-GB">Scarlet-PETs</span></a><span lang="EN-GB">, a winning team from the US side of the </span><a href="https://www.nist.gov/itl/applied-cybersecurity/privacy-engineering/collaboration-space/challenges/prize-challenges"><span lang="EN-GB">UK-US PETs Prize Challenges</span></a><span lang="EN-GB">. Their solution is shown in Figure 2.</span></p>
|
|||
|
<figure class=" nist-image--lightbox nist-image" role="group">
|
|||
|
<div data-lightbox="https://www.nist.gov/sites/default/files/styles/2800_x_2800_limit/public/images/2024/05/02/Naomi%20Privacy%20Blog%205_2.png?itok=OGGkT1sq" data-media-id="707166">
|
|||
|
|
|||
|
<img alt="Architecture of Scarlet-PETs solution for the financial crime track of the UK-US PETs prize challenges, leveraging Bloom filters for privacy-preserving feature mining." height="125" loading="lazy" src="/sites/default/files/styles/480_x_480_limit/public/images/2024/05/02/Naomi%20Privacy%20Blog%205_2.png?itok=oWNhvV_d" typeof="foaf:Image" width="480">
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
<figcaption class="nist-image__caption">Architecture of Scarlet-PETs solution for the financial crime track of the UK-US PETs prize challenges, leveraging Bloom filters for privacy-preserving feature mining.<div class="nist-image__credit">
|
|||
|
<span class="nist-image__credit-label">Credit:</span>
|
|||
|
|
|||
|
NIST
|
|||
|
|
|||
|
</div></figcaption>
|
|||
|
</figure>
|
|||
|
|
|||
|
<p class="MsoNormal"><span lang="EN-GB">In the first step, feature mining is carried out locally at each bank to create local Bloom filters containing accounts that are deemed potentially suspicious based on the account-level data. These local filters are aggregated into a global Bloom filter, which is used to augment the payment network transaction data. Since Bloom filters are represented as strings of bits, they can be aggregated using the techniques described in </span><a href="https://www.nist.gov/blogs/cybersecurity-insights/protecting-model-updates-privacy-preserving-federated-learning"><span lang="EN-GB">our fourth post</span></a><span lang="EN-GB">. Finally, the payment network adds an additional binary field “BF” to the transaction data, which is 1 if either the sending or receiving account for the transaction is present in the global Bloom filter, and 0 otherwise. This completes the entity alignment step, and a (differentially private) classifier can then be trained on this augmented data.</span></p><p class="MsoNormal"><span lang="EN-GB"></span></p><p class="MsoNormal"><span lang="EN">The use of Bloom filters helps protect input privacy as there is no direct data sharing between the different parties; only information regarding the potential presence or absence of a specific feature is revealed, not the actual content of the data itself. However, it may still be possible for sensitive data to be leaked via a Bloom filter. In the example above, the global Bloom filter is shared with the </span><span lang="EN-GB">payment network</span><span lang="EN">. Depending on the accuracy of the filter and how it has been constructed, it may be possible for the </span><span lang="EN-GB">payment network </span><span lang="EN">to learn some information about the bank data that they should not. At minimum, in this setup the </span><span lang="EN-GB">payment network </span><span lang="EN">is able to learn that for transactions where BF = 1 there is a high probability that one of the banks has flagged either the sending or receiving account (or both) as suspicious. In the real world, a policy decision would need to be made between the banks and the </span><span lang="EN-GB">payment network </span><span lang="EN">to determine whether such data leakage would be permissible.</span></p><p><span lang="EN"><strong>Balancing performance with leakage</strong></span></p><p class="MsoNormal"><span>The techniques described in this post provide efficient methods for performing entity alignment with input privacy in PPFL, but they both leak some information about the private data involved. In the case of PSI, the system may leak information about the number or even the contents of matching rows; in the case of Bloom filters, the system will leak (noisy) information about the matching status of each row. It’s possible to layer additional techniques on top to eliminate this leakage such as secure multiparty computation, fully-homomorphic encryption, or secure enclaves---but as discussed </span><a href="https://www.nist.gov/blogs/cybersecurity-insights/protecting-model-updates-privacy-preserving-federated-learning"><span lang="EN-US">in our fourth post</span></a><span>, these techniques often carry a significant performance cost.</span></p><p class="MsoNormal"><span lang="EN"></span></p><p class="MsoNormal"><span>System designers must carefully consider the leakage of these techniques as part of the system’s </span><em><span>threat model</span></em><span>—the description of attackers the system is supposed to defend against. In some cases, the additional leakage poses little privacy risk, and it may be acceptable to use PSI or a Bloom filter as part of the system. In other cases, the leakage poses major privacy risks, and requires the use of additional techniques. Balancing the privacy risk of information leakage against the performance cost of preventing those leaks remains a significant challenge in vertical federated learning.</span></p><p><span lang="EN"><strong>Coming up next</strong><
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
</div>
|
|||
|
<div
|
|||
|
class="nist-block"
|
|||
|
>
|
|||
|
|
|||
|
|
|||
|
<div class="nist-tags">
|
|||
|
<a href="/cybersecurity-insights-categories/partnerships" hreflang="en">Partnerships</a></div>
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
<div
|
|||
|
class="nist-block"
|
|||
|
>
|
|||
|
|
|||
|
<h2
|
|||
|
class="nist-block__title"
|
|||
|
>About the author</h2>
|
|||
|
|
|||
|
<div class="nist-field nist-field--label-hidden entity-reference">
|
|||
|
<div class="nist-field__items">
|
|||
|
<div class="nist-field__item">
|
|||
|
|
|||
|
<article
|
|||
|
about="/blogs/cybersecurity-insights/authors/david-darais" class="nist-teaser"
|
|||
|
>
|
|||
|
<div class="nist-teaser__image">
|
|||
|
<div class="entity-reference"> <a href="/blogs/cybersecurity-insights/authors/david-darais" hreflang="en"><img loading="lazy" src="/sites/default/files/styles/thumbnail/public/images/2023/12/06/darais-new-640%2B240.jpg?itok=ogWja4KM" width="100" height="100" alt="David Darais" typeof="foaf:Image" />
|
|||
|
|
|||
|
</a>
|
|||
|
</div>
|
|||
|
|
|||
|
</div>
|
|||
|
<div class="nist-teaser__content-wrapper">
|
|||
|
<header>
|
|||
|
<h3 class="nist-teaser__title"><a href="/blogs/cybersecurity-insights/authors/david-darais"><span>David Darais</span>
|
|||
|
</a></h3>
|
|||
|
|
|||
|
</header>
|
|||
|
<div class="nist-teaser__content">
|
|||
|
<div class="text-with-summary"><p><span><span><span><span><span><span><span><span><strong>David Darais</strong> is a Principal Scientist at Galois, Inc. and supports NIST as a moderator for the Privacy Engineering Collaboration Space. David's research focuses on tools for achieving reliable software in critical, security-sensitive, and privacy-sensitive systems. David received his B.S. from the University of Utah, M.S. from Harvard University and Ph.D. from the University of Maryland.</span></span></span></span></span></span></span></span></p></div>
|
|||
|
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</article>
|
|||
|
</div>
|
|||
|
<div class="nist-field__item">
|
|||
|
|
|||
|
<article
|
|||
|
about="/blogs/cybersecurity-insights/authors/joseph-near" class="nist-teaser"
|
|||
|
>
|
|||
|
<div class="nist-teaser__image">
|
|||
|
<div class="entity-reference"> <a href="/blogs/cybersecurity-insights/authors/joseph-near" hreflang="en"><img loading="lazy" src="/sites/default/files/styles/thumbnail/public/images/2023/12/06/Jo%20Near.jpg?itok=r50VF0v7" width="86" height="100" alt="Joseph Near" typeof="foaf:Image" />
|
|||
|
|
|||
|
</a>
|
|||
|
</div>
|
|||
|
|
|||
|
</div>
|
|||
|
<div class="nist-teaser__content-wrapper">
|
|||
|
<header>
|
|||
|
<h3 class="nist-teaser__title"><a href="/blogs/cybersecurity-insights/authors/joseph-near"><span>Joseph Near</span>
|
|||
|
</a></h3>
|
|||
|
|
|||
|
</header>
|
|||
|
<div class="nist-teaser__content">
|
|||
|
<div class="text-with-summary"><p class="MsoBodyText"><span><span><strong>Joseph Near</strong> is an assistant professor of computer science at the University of Vermont who supports NIST as a moderator for the Privacy Engineering Collaboration Space. His research interests include data privacy, computer security, and programming languages. Joseph received his B.S. in computer science from Indiana University, and his M.S. and Ph.D. in computer science from MIT.</span></span></p></div>
|
|||
|
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</article>
|
|||
|
</div>
|
|||
|
<div class="nist-field__item">
|
|||
|
|
|||
|
<article
|
|||
|
about="/blogs/cybersecurity-insights/authors/mark-durkee" class="nist-teaser"
|
|||
|
>
|
|||
|
<div class="nist-teaser__image">
|
|||
|
<div class="entity-reference"> <a href="/blogs/cybersecurity-insights/authors/mark-durkee" hreflang="en"><img loading="lazy" src="/sites/default/files/styles/thumbnail/public/images/2024/01/24/Mark%20Durkee%20.png?itok=co4ZojG9" width="75" height="100" alt="Mark Durkee " typeof="foaf:Image" />
|
|||
|
|
|||
|
</a>
|
|||
|
</div>
|
|||
|
|
|||
|
</div>
|
|||
|
<div class="nist-teaser__content-wrapper">
|
|||
|
<header>
|
|||
|
<h3 class="nist-teaser__title"><a href="/blogs/cybersecurity-insights/authors/mark-durkee"><span>Mark Durkee</span>
|
|||
|
</a></h3>
|
|||
|
|
|||
|
</header>
|
|||
|
<div class="nist-teaser__content">
|
|||
|
<div class="text-with-summary"><p><span><span><em><span><span>Mark Durkee is Head of Data & Technology at the Centre for Data Ethics and Innovation (CDEI). He leads a portfolio of work including the CDEI's work on the Algorithmic Transparency Recording Standard, privacy enhancing technologies, and a broader programme of work focused on promoting responsible access to data. He previously led CDEI's independent review into bias in algorithmic decision-making. He has spent over a decade working in a variety of technology strategy, architecture and cyber security roles within the UK government, and previously worked as a software engineer and completed a PhD in Theoretical Physics.</span></span></em></span></span></p></div>
|
|||
|
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</article>
|
|||
|
</div>
|
|||
|
<div class="nist-field__item">
|
|||
|
|
|||
|
<article
|
|||
|
about="/blogs/cybersecurity-insights/authors/dave-buckley" class="nist-teaser"
|
|||
|
>
|
|||
|
<div class="nist-teaser__image">
|
|||
|
<div class="entity-reference"> <a href="/blogs/cybersecurity-insights/authors/dave-buckley" hreflang="en"><img loading="lazy" src="/sites/default/files/styles/thumbnail/public/images/2023/12/06/Dave%20Buckley%20UK.jpg?itok=bG0FtUq6" width="88" height="100" alt="Dave Buckley" typeof="foaf:Image" />
|
|||
|
|
|||
|
</a>
|
|||
|
</div>
|
|||
|
|
|||
|
</div>
|
|||
|
<div class="nist-teaser__content-wrapper">
|
|||
|
<header>
|
|||
|
<h3 class="nist-teaser__title"><a href="/blogs/cybersecurity-insights/authors/dave-buckley"><span>Dave Buckley</span>
|
|||
|
</a></h3>
|
|||
|
|
|||
|
</header>
|
|||
|
<div class="nist-teaser__content">
|
|||
|
<div class="text-with-summary"><p><span><span><span>Dave Buckley is a Senior Technology Adviser at the UK’s Centre for Data Ethics and Innovation, where he leads the Centre’s work on privacy enhancing technologies. He has led development of CDEI’s PETs Adoption Guide, was a co-editor of the 2023 UN PET Guide, and was a member of the core delivery team for the UK-US PETs prize challenges. Dave is a software engineer and data scientist by background, with a strong interest in quantitative methods for social science.</span></span></span></p></div>
|
|||
|
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</article>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
<div
|
|||
|
class="views-element-container nist-block"
|
|||
|
>
|
|||
|
|
|||
|
<h2
|
|||
|
class="nist-block__title"
|
|||
|
>Related posts</h2>
|
|||
|
|
|||
|
<div><div class="js-view-dom-id-4e0daca9d577efb21e612c7eb3a1521da744ff0ec8eeb65d71c39f1369c5cd12">
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<div>
|
|||
|
|
|||
|
<article
|
|||
|
about="/blogs/cybersecurity-insights/nists-international-cybersecurity-and-privacy-engagement-update-new" class="nist-teaser"
|
|||
|
>
|
|||
|
<div class="nist-teaser__content-wrapper">
|
|||
|
<header>
|
|||
|
<h3 class="nist-teaser__title"><a href="/blogs/cybersecurity-insights/nists-international-cybersecurity-and-privacy-engagement-update-new"><span>NIST’s International Cybersecurity and Privacy Engagement Update – New Translations</span>
|
|||
|
</a></h3>
|
|||
|
<div class="nist-teaser__date">
|
|||
|
<div class="daterange"><time datetime="2024-12-19T12:00:00Z">December 19, 2024</time>
|
|||
|
</div>
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
</header>
|
|||
|
<div class="nist-teaser__content">
|
|||
|
<div class="text-with-summary"> As the year comes to a close, NIST continues to engage with our international partners to strengthen cybersecurity, including sharing over ten new international
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</article>
|
|||
|
</div>
|
|||
|
<div>
|
|||
|
|
|||
|
<article
|
|||
|
about="/blogs/cybersecurity-insights/data-pipeline-challenges-privacy-preserving-federated-learning" class="nist-teaser"
|
|||
|
>
|
|||
|
<div class="nist-teaser__content-wrapper">
|
|||
|
<header>
|
|||
|
<h3 class="nist-teaser__title"><a href="/blogs/cybersecurity-insights/data-pipeline-challenges-privacy-preserving-federated-learning"><span>Data Pipeline Challenges of Privacy-Preserving Federated Learning</span>
|
|||
|
</a></h3>
|
|||
|
<div class="nist-teaser__date">
|
|||
|
<div class="daterange"><time datetime="2024-12-05T12:00:00Z">December 5, 2024</time>
|
|||
|
</div>
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
</header>
|
|||
|
<div class="nist-teaser__content">
|
|||
|
<div class="text-with-summary"> This post is part of a series on privacy-preserving federated learning. The series is a collaboration between NIST and the UK government’s Responsible
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</article>
|
|||
|
</div>
|
|||
|
<div>
|
|||
|
|
|||
|
<article
|
|||
|
about="/blogs/cybersecurity-insights/unlocking-cybersecurity-talent-power-apprenticeships" class="nist-teaser"
|
|||
|
>
|
|||
|
<div class="nist-teaser__content-wrapper">
|
|||
|
<header>
|
|||
|
<h3 class="nist-teaser__title"><a href="/blogs/cybersecurity-insights/unlocking-cybersecurity-talent-power-apprenticeships"><span>Unlocking Cybersecurity Talent: The Power of Apprenticeships</span>
|
|||
|
</a></h3>
|
|||
|
<div class="nist-teaser__date">
|
|||
|
<div class="daterange"><time datetime="2024-11-18T12:00:00Z">November 18, 2024</time>
|
|||
|
</div>
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
</header>
|
|||
|
<div class="nist-teaser__content">
|
|||
|
<div class="text-with-summary"> Cybersecurity is a fast-growing field, with a constant need for skilled professionals. But unlike other professions — like medicine or aviation — there’s no
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</article>
|
|||
|
</div>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
|
|||
|
<div
|
|||
|
class="nist-block no-print"
|
|||
|
>
|
|||
|
|
|||
|
<h2
|
|||
|
class="nist-block__title"
|
|||
|
>Comments</h2>
|
|||
|
|
|||
|
<section>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<h2>Add new comment</h2>
|
|||
|
<link rel="stylesheet" media="all" href="/sites/default/files/css/css_Lx5yvw0vUi4TN7C0L-5Rdrp4Q049mXEKn-dXREWOtBs.css?delta=0&language=en&theme=nist_www&include=eJxLzCvJTMov0U-E0Hpp-UW5OsmJBSXJGYn6SYnFqTppmTklqUX6KUWlBYk5ehAeAD47FNs&exclude=eJx1UAGOwyAM-xAdT0IBsi5bIBXQ9nqvv9B2WjXpJISwE-zEHsLLNdEzWf95u2c1_p8SBclmFBkZHWTgrVGo9pswmWpzd1IuyppZILpWVIbyaEc4ypUaUpqKLGi_iT7CzrUHJlRnYQ_FJYk2UgWvwkz5ZepWGyadsOLeb0cWD3x9D6eUfSBELG_o1nW9dl9wb8Gf1g1sLPMEfDuhCZIS5vamTzj4bVgIVyyHU4Ix052CWSiiOEweo6aBHC3D7zb0PIym07DYAFMjzbRKIGCXMBL0ffQ3wyZzc7pw0EjKZiVjEDbdqtr9vmkiM-NBueecJlXI81EcOh46_myYKBTpQf8BO5rHtg" />
|
|||
|
<form class="comment-comment-node-blog-form comment-form usa-form antibot" novalidate="novalidate" data-drupal-selector="comment-form" data-action="/comment/reply/node/1847391/comment_node_blog" action="/antibot" method="post" id="comment-form" accept-charset="UTF-8">
|
|||
|
<noscript>
|
|||
|
<div class="antibot-no-js antibot-message antibot-message-warning">You must have JavaScript enabled to use this form.</div>
|
|||
|
</noscript>
|
|||
|
<div class="form-item js-form-item form-type-textfield js-form-type-textfield form-item-name js-form-item-name">
|
|||
|
<label for="edit-name" class="usa-label">
|
|||
|
Your name
|
|||
|
</label>
|
|||
|
|
|||
|
|
|||
|
<input data-drupal-default-value="Anonymous" data-drupal-selector="edit-name" type="text" id="edit-name" name="name" value="" size="30" maxlength="60" class="form-text usa-input" />
|
|||
|
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
<input data-drupal-selector="form-ul2l1p3txktoorm9-dh3-lozympofhylb7cyjxtl0oc" type="hidden" name="form_build_id" value="form-UL2L1P3txKTOorM9_Dh3-LozYmPOfhylB7cyjxtl0oc" class="usa-input" /><input data-drupal-selector="edit-comment-comment-node-blog-form" type="hidden" name="form_id" value="comment_comment_node_blog_form" class="usa-input" /><input data-drupal-selector="edit-antibot-key" type="hidden" name="antibot_key" value="" class="usa-input" /><div class="field--type-text-long field--name-comment-body field--widget-text-textarea js-form-wrapper form-wrapper" data-drupal-selector="edit-comment-body-wrapper" id="edit-comment-body-wrapper"> <div class="js-text-format-wrapper js-form-item form-item">
|
|||
|
<div class="form-item js-form-item form-type-textarea js-form-type-textarea form-item-comment-body-0-value js-form-item-comment-body-0-value">
|
|||
|
<label for="edit-comment-body-0-value" class="usa-label form-required">
|
|||
|
Comment
|
|||
|
<span class="usa-label--required"> <span class="usa-sr-only">Required</span>*</span></label>
|
|||
|
|
|||
|
|
|||
|
<div class="form-textarea-wrapper">
|
|||
|
<textarea class="js-text-full text-full form-textarea required usa-textarea resize-vertical" data-entity_embed-host-entity-langcode="en" data-media-embed-host-entity-langcode="en" data-drupal-selector="edit-comment-body-0-value" id="edit-comment-body-0-value" name="comment_body[0][value]" rows="5" cols="60" placeholder="" required="required" aria-required="true"></textarea>
|
|||
|
</div>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
<div class="js-filter-wrapper filter-wrapper hidden js-form-wrapper form-wrapper" data-drupal-selector="edit-comment-body-0-format" id="edit-comment-body-0-format"><div class="js-filter-guidelines filter-guidelines js-form-wrapper form-wrapper" data-drupal-selector="edit-comment-body-0-format-guidelines" id="edit-comment-body-0-format-guidelines"><div data-drupal-format-id="plain_text">
|
|||
|
<h4>Plain text</h4>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<ul>
|
|||
|
<li>No HTML tags allowed.</li>
|
|||
|
<li>Web page addresses and email addresses turn into links automatically.</li>
|
|||
|
<li>Lines and paragraphs break automatically.</li>
|
|||
|
</ul>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
|
|||
|
<fieldset data-drupal-selector="edit-captcha" class="captcha captcha-type-challenge--image">
|
|||
|
<legend class="captcha__title js-form-required form-required">
|
|||
|
CAPTCHA
|
|||
|
</legend>
|
|||
|
<div class="captcha__element">
|
|||
|
<input data-drupal-selector="edit-captcha-sid" type="hidden" name="captcha_sid" value="652310686" class="usa-input" /><input data-drupal-selector="edit-captcha-token" type="hidden" name="captcha_token" value="0qPC_0e8L7maS3XyBt1FzvpV7jy3UmB6nsGqVf07uzk" class="usa-input" /><div class="captcha__image-wrapper js-form-wrapper form-wrapper" data-drupal-selector="edit-captcha-image-wrapper" id="edit-captcha-image-wrapper"><img data-drupal-selector="edit-captcha-image" src="/image-captcha-generate/652310686/1741101715" width="180" height="60" alt="Image CAPTCHA" title="Image CAPTCHA" loading="lazy" typeof="foaf:Image" />
|
|||
|
</div>
|
|||
|
<div class="form-item js-form-item form-type-textfield js-form-type-textfield form-item-captcha-response js-form-item-captcha-response">
|
|||
|
<label for="edit-captcha-response" class="usa-label form-required">
|
|||
|
What code is in the image?
|
|||
|
<span class="usa-label--required"> <span class="usa-sr-only">Required</span>*</span></label>
|
|||
|
|
|||
|
|
|||
|
<input autocomplete="off" data-drupal-selector="edit-captcha-response" aria-describedby="edit-captcha-response--description" type="text" id="edit-captcha-response" name="captcha_response" value="" size="15" maxlength="128" class="form-text required usa-input" required="required" aria-required="true" />
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<div id="edit-captcha-response--description" class="description help-block">
|
|||
|
Enter the characters shown in the image.
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
|
|||
|
</div>
|
|||
|
<div class="captcha__description description">This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.</div>
|
|||
|
</fieldset>
|
|||
|
<div data-drupal-selector="edit-actions" class="form-actions js-form-wrapper form-wrapper" id="edit-actions"><input data-drupal-selector="edit-submit" type="submit" id="edit-submit" name="op" value="Save" class="button button--primary js-form-submit form-submit usa-button" /></div>
|
|||
|
|
|||
|
<div class="comments__disclaimer padding-top-2">
|
|||
|
<em>Please be respectful when posting comments. We will post all comments without editing as long as they are appropriate for a public, family friendly website, are on topic and do not contain profanity, personal attacks, misleading or false information/accusations or promote specific commercial products, services or organizations. Comments that violate our comment policy or include links to non-government organizations/web pages will not be posted.</em>
|
|||
|
</div>
|
|||
|
</form>
|
|||
|
|
|||
|
|
|||
|
</section>
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
<aside class="nist-page__region nist-page__region--sidebar-second tablet-lg:grid-col-4">
|
|||
|
|
|||
|
<div>
|
|||
|
|
|||
|
<div
|
|||
|
class="nist-block"
|
|||
|
>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<div>
|
|||
|
<div about="/blogs/cybersecurity-insights">
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<div
|
|||
|
class="views-exposed-form usa-form filters nist-block" novalidate="novalidate" data-drupal-selector="views-exposed-form-search-blog-cybersecurity-insights-search-page"
|
|||
|
>
|
|||
|
|
|||
|
<h2
|
|||
|
class="nist-block__title"
|
|||
|
>Search</h2>
|
|||
|
|
|||
|
<form action="/blogs/cybersecurity-insights/search" method="get" id="views-exposed-form-search-blog-cybersecurity-insights-search-page" accept-charset="UTF-8" class="usa-form">
|
|||
|
<div class="form-item js-form-item form-type-textfield js-form-type-textfield form-item-k js-form-item-k form-no-label">
|
|||
|
|
|||
|
|
|||
|
<input placeholder="Search this blog" data-drupal-selector="edit-k" type="text" id="edit-k" name="k" value="" size="30" maxlength="128" class="form-text usa-input" />
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<div id="edit-k--description" class="description help-block">
|
|||
|
Put exact phrase in quotes (e.g., "information technology")
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
<div class="grid-col-12 form-actions js-form-wrapper form-wrapper" data-drupal-selector="edit-actions" id="edit-actions"><input data-drupal-selector="edit-submit-search-blog" type="submit" id="edit-submit-search-blog" value="Search" class="button js-form-submit form-submit usa-button" /></div>
|
|||
|
|
|||
|
|
|||
|
</form>
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
<div
|
|||
|
class="nist-block no-print"
|
|||
|
>
|
|||
|
|
|||
|
<h2
|
|||
|
class="nist-block__title"
|
|||
|
>Email alerts</h2>
|
|||
|
|
|||
|
<div class="text-long"><p>Sign up below to receive Cybersecurity Insights blog updates.</p>
|
|||
|
<form action="https://public.govdelivery.com/accounts/USNIST/subscribers/qualify" accept-charset="UTF-8" method="post">
|
|||
|
<input name="utf8" type="hidden" value="✓">
|
|||
|
<input type="hidden" name="authenticity_token" value="umng6itSRmNK2AM4clGhRFfjURNr8Xq93Wj+SgyY3mzPrAiisJN3Hm4xl+o5D5KH7uXFJ4nQ/OqkKO3CG8H0Vw==">
|
|||
|
<input type="hidden" name="topic_id" id="topic_id" value="USNIST_213">
|
|||
|
<div class="grid-row grid-gap-1">
|
|||
|
<div class="tablet:grid-col-8">
|
|||
|
<label class="usa-sr-only" for="email">Enter Email Address</label>
|
|||
|
<input class="usa-input" type="text" name="email" id="email" title="email">
|
|||
|
</div>
|
|||
|
<div class="tablet:grid-col-4">
|
|||
|
<input type="submit" name="commit" value="Sign Up" class="usa-button margin-top-1">
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</form></div>
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
<div
|
|||
|
class="nist-block no-print"
|
|||
|
>
|
|||
|
|
|||
|
<h2
|
|||
|
class="nist-block__title"
|
|||
|
>Stay Connected</h2>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<div><a href="https://www.x.com/nistcyber" class="nist-social nist-social--x" title="X (Twitter)" ><span>X (Twitter)</span></a><a href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?topic_id=USNIST_213" class="nist-social nist-social--envelope" title="GovDelivery" ><span>GovDelivery</span></a></div>
|
|||
|
|
|||
|
</div>
|
|||
|
<div
|
|||
|
class="views-element-container nist-block no-print"
|
|||
|
>
|
|||
|
|
|||
|
<h2
|
|||
|
class="nist-block__title"
|
|||
|
>Categories</h2>
|
|||
|
|
|||
|
<div><div class="js-view-dom-id-5b76e6d1899fa29478ef822ea703859beb0f7cafb4fa552085dd8707c0b9c8b4">
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<div>
|
|||
|
<select class="usa-select ViewsJumpMenu js-viewsJumpMenu" title="-- Choose --" id="blog-categories-block-2-jump-menu">
|
|||
|
<option>-- Choose --</option>
|
|||
|
<option data-url="/cybersecurity-insights-categories/events-and-workshops">Events and Workshops</option>
|
|||
|
<option data-url="/cybersecurity-insights-categories/implementation">Implementation</option>
|
|||
|
<option data-url="/cybersecurity-insights-categories/measurement-science">Measurement Science</option>
|
|||
|
<option data-url="/cybersecurity-insights-categories/multi-factor-authentication">Multi Factor Authentication</option>
|
|||
|
<option data-url="/cybersecurity-insights-categories/partnerships">Partnerships</option>
|
|||
|
<option data-url="/cybersecurity-insights-categories/publications">Publications</option>
|
|||
|
</select>
|
|||
|
</div>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
</div>
|
|||
|
</aside>
|
|||
|
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
|
|||
|
|
|||
|
<div class="grid-container">
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
</section>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<div data-elastic-exclude>
|
|||
|
<!-- nist-index-ignore-start -->
|
|||
|
|
|||
|
<footer class="nist-footer padding-bottom-4">
|
|||
|
|
|||
|
|
|||
|
<div class="grid-container nist-footer__info">
|
|||
|
<div class="grid-row">
|
|||
|
<div class="tablet:grid-col-6">
|
|||
|
<div class="nist-footer__logo">
|
|||
|
<a href="/" title="National Institute of Standards and Technology" rel="home">
|
|||
|
<img class="nist-footer__logo-img" src="/libraries/nist-component-library/dist/img/logo/NIST-Logo-Brand-White.svg" alt="National Institute of Standards and Technology logo" width="300px" height="42px" />
|
|||
|
</a>
|
|||
|
</div>
|
|||
|
<div class="nist-footer__contact">
|
|||
|
<h3 class="nist-footer__contact-heading">HEADQUARTERS</h3>
|
|||
|
<address>
|
|||
|
100 Bureau Drive<br>
|
|||
|
Gaithersburg, MD 20899<br>
|
|||
|
<a href="tel:301-975-2000">301-975-2000</a>
|
|||
|
</address>
|
|||
|
<p>
|
|||
|
<a href="mailto:do-webmaster@nist.gov">Webmaster</a> | <a href="https://www.nist.gov/about-nist/contact-us">Contact Us</a> | <a href="https://www.nist.gov/visit">Our Other Offices</a>
|
|||
|
</p>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
<div class="tablet:grid-col-6">
|
|||
|
<div class="nist-footer__social-links">
|
|||
|
|
|||
|
<a class="nist-social nist-social--x-white" href=" https://x.com/NIST">
|
|||
|
<span>X.com</span>
|
|||
|
</a>
|
|||
|
|
|||
|
<a class="nist-social nist-social--facebook-white" href=" https://www.facebook.com/NIST">
|
|||
|
<span>Facebook</span>
|
|||
|
</a>
|
|||
|
|
|||
|
<a class="nist-social nist-social--linkedin-white" href=" https://www.linkedin.com/company/nist">
|
|||
|
<span>LinkedIn</span>
|
|||
|
</a>
|
|||
|
|
|||
|
<a class="nist-social nist-social--instagram-white" href=" https://www.instagram.com/nist/">
|
|||
|
<span>Instagram</span>
|
|||
|
</a>
|
|||
|
|
|||
|
<a class="nist-social nist-social--youtube-white" href=" https://www.youtube.com/NIST">
|
|||
|
<span>YouTube</span>
|
|||
|
</a>
|
|||
|
|
|||
|
<a class="nist-social nist-social--giphy-white" href=" https://giphy.com/nist">
|
|||
|
<span>Giphy</span>
|
|||
|
</a>
|
|||
|
|
|||
|
<a class="nist-social nist-social--rss-white" href=" https://www.nist.gov/news-events/nist-rss-feeds">
|
|||
|
<span>RSS Feed</span>
|
|||
|
</a>
|
|||
|
|
|||
|
<a class="nist-social nist-social--envelope-white" href=" https://public.govdelivery.com/accounts/USNIST/subscriber/new">
|
|||
|
<span>Mailing List</span>
|
|||
|
</a>
|
|||
|
</div>
|
|||
|
<div class="nist-footer__feedback">
|
|||
|
How are we doing? <a class="usa-button" rel="nofollow" href="/form/nist-gov-feedback?destination=/blogs/cybersecurity-insights/protecting-model-updates-privacy-preserving-federated-learning-part-two" title="Provide feedback">Feedback</a>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
|
|||
|
|
|||
|
<div class="grid-container">
|
|||
|
<div class="nist-footer__nav" role="navigation">
|
|||
|
<ul>
|
|||
|
<li class="nist-footer__menu-item">
|
|||
|
<a href="https://www.nist.gov/privacy-policy">Site Privacy</a>
|
|||
|
</li>
|
|||
|
<li class="nist-footer__menu-item">
|
|||
|
<a href="https://www.nist.gov/oism/accessibility">Accessibility</a>
|
|||
|
</li>
|
|||
|
<li class="nist-footer__menu-item">
|
|||
|
<a href="https://www.nist.gov/privacy">Privacy Program</a>
|
|||
|
</li>
|
|||
|
<li class="nist-footer__menu-item">
|
|||
|
<a href="https://www.nist.gov/oism/copyrights">Copyrights</a>
|
|||
|
</li>
|
|||
|
<li class="nist-footer__menu-item">
|
|||
|
<a href="https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a>
|
|||
|
</li>
|
|||
|
<li class="nist-footer__menu-item">
|
|||
|
<a href="https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a>
|
|||
|
</li>
|
|||
|
<li class="nist-footer__menu-item">
|
|||
|
<a href="https://www.nist.gov/office-director/freedom-information-act">FOIA</a>
|
|||
|
</li>
|
|||
|
<li class="nist-footer__menu-item">
|
|||
|
<a href="https://www.nist.gov/environmental-policy-statement">Environmental Policy</a>
|
|||
|
</li>
|
|||
|
<li class="nist-footer__menu-item">
|
|||
|
<a href="https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a>
|
|||
|
</li>
|
|||
|
<li class="nist-footer__menu-item">
|
|||
|
<a href="https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a>
|
|||
|
</li>
|
|||
|
<li class="nist-footer__menu-item">
|
|||
|
<a href="https://www.commerce.gov/">Commerce.gov</a>
|
|||
|
</li>
|
|||
|
<li class="nist-footer__menu-item">
|
|||
|
<a href="http://www.science.gov/">Science.gov</a>
|
|||
|
</li>
|
|||
|
<li class="nist-footer__menu-item">
|
|||
|
<a href="http://www.usa.gov/">USA.gov</a>
|
|||
|
</li>
|
|||
|
<li class="nist-footer__menu-item">
|
|||
|
<a href="https://vote.gov/">Vote.gov</a>
|
|||
|
</li>
|
|||
|
</ul>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
|
|||
|
|
|||
|
</footer>
|
|||
|
<!-- nist-index-ignore-end -->
|
|||
|
</div>
|
|||
|
|
|||
|
</div>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<script type="application/json" data-drupal-selector="drupal-settings-json">{"path":{"baseUrl":"\/","pathPrefix":"","currentPath":"node\/1847391","currentPathIsAdmin":false,"isFront":false,"currentLanguage":"en"},"pluralDelimiter":"\u0003","suppressDeprecationErrors":true,"back_to_top":{"back_to_top_button_trigger":100,"back_to_top_speed":1200,"back_to_top_prevent_on_mobile":false,"back_to_top_prevent_in_admin":true,"back_to_top_button_type":"image","back_to_top_button_text":"Back to top"},"google_analytics":{"account":"G-HEQ0YF2VYL","trackOutbound":true,"trackMailto":true,"trackTel":true,"trackDownload":true,"trackDownloadExtensions":"7z|aac|arc|arj|asf|asx|avi|bin|bsh|c|csv|doc(x|m)?|dot(x|m)?|dw(fx|g|gd)|dxf|eps|epub|exe|f(90)|flv|gif|gz|gzip|hqx|jar|jpe?g|js|m1v|mp(2|3|4|e?g)|mobi|mov(ie)?|msi|msp|pdf|phps|pl|png|ppt(x|m)?|pot(x|m)?|pps(x|m)?|ppam|sld(x|m)?|thmx|qtm?|ra(m|r)?|rfa|rtf|rvt|sch|sea|sit|swf|tar|tgz|tif|txt|txz|wav|wma|wmv|wpd|wrl|xls(x|m|b)?|xlt(x|m)|xlam|xml|xsd|z|zip"},"nist_search":{"clickTracking":"search-report-click","isDebug":false,"clickTrackEnabled":true,"message":"NIST Search in debug mode. Check the browsers network inspector for Click Track reporting results..."},"data":{"extlink":{"extTarget":false,"extTargetNoOverride":false,"extNofollow":false,"extNoreferrer":false,"extFollowNoOverride":false,"extClass":"ext","extLabel":"(link is external)","extImgClass":false,"extSubdomains":true,"extExclude":"\\.gov\\\/|\\.mil\\\/|\\manufacturingusa\\.com\\\/","extInclude":"","extCssExclude":".ck-editor, .nist-video-thumbnail__lightbox-trigger, a.nist-icon--mail-blue","extCssExplicit":"","extAlert":true,"extAlertText":"Thank you for visiting NIST. We hope your visit was informative. We have provided a link to this site because it has information that may be of interest to our users. NIST does not necessarily endorse the views expressed or the facts presented on this site. Further, NIST does not endorse any commercial products that may be advertised or available on this site. Click OK to be directed to your link.","mailtoClass":"0","mailtoLabel":"(link sends email)","extUseFontAwesome":false,"extIconPlacement":"after","extFaLinkClasses":"fa fa-external-link","extFaMailtoClasses":"fa fa-envelope-o","whitelistedDomains":[]}},"viewsJumpMenu":{"blog-categories-block-2-jump-menu":{"new_window":false}},"ajaxTrustedUrl":{"\/blogs\/cybersecurity-insights\/search":true,"\/comment\/reply\/node\/1847391\/comment_node_blog":true},"user":{"uid":0,"permissionsHash":"bd6a443844dbe99b4e6942f3b1397526e760137efd2b1ee6b2d588fc414dff20"},"antibot":{"forms":{"comment-form":{"id":"comment-form","key":"8s3HerPNUiBWAup-NU0eICdfN5XSJ1VRGAW7gyEytXD"}}}}</script>
|
|||
|
<script src="/sites/default/files/js/js_jDaFaXhHm6gPUKstNYX9eIyoQXghVs3g7rbR0QoqpYY.js?scope=footer&delta=0&language=en&theme=nist_www&include=eJxdjw2OAyEIhS_klCMRHBlLqzJRpu7efp2fppsmJvg9eI_gaX6i6Xgr-M8fH81F1ZgYqVD6NZkbfAuuSDNcZGhBe0lKAa2OECkRIp3tJsaS16ovhm9h33JodufMY68mTxWzBgjSyI_gJOV5zEBM6ilNlwXuTIHrG7H3_m-Cf2w3QqjbSul24WnMFIssMruXcG_42PKKmcsGB087Tzs7KiZeDa56W7RmN641ru_gk_4AudN_yQ"></script>
|
|||
|
<script src="https://siteimproveanalytics.com/js/siteanalyze_6017546.js" async></script>
|
|||
|
<script src="/sites/default/files/js/js_yFXzHK1gkl-H3tLPLdnBw5DymsKPJCwJskyq7yQVS6A.js?scope=footer&delta=2&language=en&theme=nist_www&include=eJxdjw2OAyEIhS_klCMRHBlLqzJRpu7efp2fppsmJvg9eI_gaX6i6Xgr-M8fH81F1ZgYqVD6NZkbfAuuSDNcZGhBe0lKAa2OECkRIp3tJsaS16ovhm9h33JodufMY68mTxWzBgjSyI_gJOV5zEBM6ilNlwXuTIHrG7H3_m-Cf2w3QqjbSul24WnMFIssMruXcG_42PKKmcsGB087Tzs7KiZeDa56W7RmN641ru_gk_4AudN_yQ"></script>
|
|||
|
<script type="text/javascript">window.NREUM||(NREUM={});NREUM.info={"beacon":"bam.nr-data.net","licenseKey":"37b7ccb661","applicationID":"1089704227","transactionName":"YFxUN0sADEdYVkBaClkWdwBNCA1aFnFGRhVWVWoNVgUHaHpaWkcXWFVaBks9LFtdUGJaAEB6WQ1NEw1YVVBGHltBUFMU","queueTime":4,"applicationTime":811,"atts":"TBtXQQMaH0k=","errorBeacon":"bam.nr-data.net","agent":""}</script></body>
|
|||
|
</html>
|