SlideShare a Scribd company logo
Trusted Execution
Environment for
Decentralized
Process Mining
Valerio Goretti, Sapienza University of Rome
Davide Basile, Sapienza University of Rome
Luca Barbaro, Sapienza University of Rome – luca.barbaro@uniroma1.it
Claudio Di Ciccio, Utrecht University
Outsourcing or not,
that is the question
2
Outsourcing or not,
that is the question
3
Decentralized process mining
4
Inter-organizational scenario
5
Inter-organizational scenario
6
Inter-organizational scenario
7
Inter-organizational scenario
8
Inter-organizational scenario
9
Inter-organizational scenario
10
Inter-organizational scenario
11
Inter-organizational scenario
12
Inter-organizational scenario
13
Inter-organizational scenario
14
Inter-organizational scenario
15
Inter-organizational scenario
16
Inter-organizational scenario
17
Inter-organizational scenario
18
Inter-organizational scenario
National
Institute of
Statistics
University
19
Confidential computing
20
Outsourcing of the event
log introduces critical issues
in terms of data secrecy
What if the University disclose Alice’s
hospitalization data with unauthorized
parties?
21
“Confidential Computing is the protection
of data in use by performing computation
in a hardware-based, attested Trusted
Execution Environment.”
Confidential Computing Consortium
Confidential computing
Our Requirements
Organizational
autonomy
No fixed roles
No event log alteration
or abstraction
No computational
synchronization
22
No event log alteration
or abstraction
Results derived directly from
the original information source
23
Once the logs are loaded, are
then processed by a single
machine
No computational
synchronization
24
Organizational
autonomy
Each participating organization
retains the discretion to choose
when and how mining
operations are conducted
25
No fixed roles
Peer-to-peer scenario in which
organizations can
simultaneously be data
provisioners or miners
26
CONFINE
Architecture
27
Log Recorder
Secure Miner
Node
Node
Secure Miner
Node
Event Log Exchange
Node
Provisioner
Secure Miner
Provisioner
28
High-level architecture
Miner Node
Node
Secure Miner
Node
Provisioner Node
29
Provisioner
Secure Miner
High-level architecture
Operating System
PAIS
Log Server
Provisioner Node
Provisioner
Log Recorder
Log Provider
30
Provisioner architecture
Provisioner Node
Operating System
P.A.I.S.
Log Server
Execution environment:
Data transfer
31
Provisioner
Log Recorder
Log Provider
Provisioner deployment
Miner Node
Provisioner
Secure Miner
Log Receiver
Log Manager
Log Elaborator
Log Requester
32
Miner architecture
Miner Node
Provisioner Secure Miner
Log Receiver
Log Manager
Log Elaborator
Log Requester
33
Miner architecture
Trusted Execution Environment
Trusted App
Event Log Data
Execution environment:
Miner deployment
34
Miner Node
Secure Miner
Log Receiver
Log Manager
Log Elaborator
Log Requester
Trusted Execution Environment
Trusted App
Event Log Data
Execution environment:
Operating System
TEE Interface
Execution environment
Method invocation
Miner Node
Deployment
Provisioner Node
Provision
er
P.A.I.S.
Log Server
Trusted Execution Environment
Event Log Data
Operating System
TEE Interface
Execution environment
Execution environment
Execution environment
Operating System
Trusted App
Data transfer
Method invocation
Web communication
35
The CONFINE
Protocol
36
Protocol Phases
37
Initialization
Data
Transmission Computation
Remote
Attestation
38
Initialization
Data
Transmission Computation
Remote
Attestation
Request cases
references
Provisioner Node
Miner Node
TEE
Trusted App: Secure Miner
Log Requester
Trusted Execution Environment
Log Server:
Log Provider
39
Initialization
Data
Transmission Computation
Remote
Attestation
Request cases
references
Provisioner Node
Miner Node
TEE
Trusted App: Secure Miner
Log Requester
Identify miner
Trusted Execution Environment
Log Server:
Log Provider
40
Initialization
Data
Transmission Computation
Remote
Attestation
Request cases
references
Provisioner Node
Miner Node
TEE
Trusted App: Secure Miner
Log Requester PAIS: Log
Recorder
Identify miner
Access event log
Trusted Execution Environment
Log Server:
Log Provider
41
Initialization
Data
Transmission Computation
Remote
Attestation
Request cases
references
Provisioner Node
Miner Node
TEE
Trusted App: Secure Miner
Log Requester PAIS: Log
Recorder
Identify miner
Access event log
Send event log
Trusted Execution Environment
Log Server:
Log Provider
42
Initialization
Data
Transmission Computation
Remote
Attestation
Request cases
references
Provisioner Node
Miner Node
TEE
Trusted App: Secure Miner
Log Requester PAIS: Log
Recorder
Identify miner
Access event log
Send event log
Send cases
references
Trusted Execution Environment
Log Server:
Log Provider
Miner Node
43
Initialization
Data
Transmission Computation
Remote
Attestation
TEE
Request cases
Provisioner Node
Miner Node
TEE
Trusted App: Secure Miner
Log Requester
Trusted Execution Environment
Log Server:
Log Provider
Miner Node
44
Initialization
Data
Transmission Computation
Remote
Attestation
TEE
Request cases
Provisioner Node
Miner Node
TEE
Trusted App: Secure Miner
Log Requester
Trusted Execution Environment
Request attestation
data
Log Receiver
Log Server:
Log Provider
Miner Node
45
Initialization
Data
Transmission Computation
Remote
Attestation
TEE
Request cases
Provisioner Node
Miner Node
TEE
Trusted App: Secure Miner
Log Requester
Trusted Execution Environment
Request attestation
data
Log Receiver
Send report
Log Server:
Log Provider
Miner Node
46
Initialization
Data
Transmission Computation
Remote
Attestation
TEE
Request cases
Provisioner Node
Miner Node
TEE
Trusted App: Secure Miner
Log Requester
Trusted Execution Environment
Request attestation
data
Log Receiver
Send report
Identify miner and
verify report
Log Server:
Log Provider
47
Initialization
Data
Transmission Computation
Remote
Attestation
TEE
Provisioner Node
Miner Node
TEE
Trusted App: Secure Miner
Trusted Execution Environment
PAIS: Log
Recorder
Access event log
Log Server:
Log Provider
Log Receiver
48
Initialization
Data
Transmission Computation
Remote
Attestation
TEE
Provisioner Node
Miner Node
TEE
Trusted App: Secure Miner
Trusted Execution Environment
PAIS: Log
Recorder
Access event log
Send event log
Log Server:
Log Provider
Log Receiver
49
Initialization
Data
Transmission Computation
Remote
Attestation
TEE
Provisioner Node
Miner Node
TEE
Trusted App: Secure Miner
Trusted Execution Environment
PAIS: Log
Recorder
Generate segments
Access event log
Send event log
Log Server:
Log Provider
Log Receiver
50
Initialization
Data
Transmission Computation
Remote
Attestation
TEE
Provisioner Node
Miner Node
TEE
Trusted App: Secure Miner
Trusted Execution Environment
PAIS: Log
Recorder
Generate segments
Access event log
Send event log
Send encrypted
segments
Log Server:
Log Provider
Log Receiver
51
Initialization
Data
Transmission Computation
Remote
Attestation
Provisioner Node
Miner Node
TEE
PAIS: Log
Recorder
Generate segments
Access event log
Send event log
Send encrypted
segments
Log Server:
Log Provider
Trusted App: Secure Miner
Trusted Execution Environment
Log Receiver
Decrypt segment
52
Initialization
Data
Transmission Computation
Remote
Attestation
Provisioner Node
Miner Node
TEE
PAIS: Log
Recorder
Generate segments
Access event log
Send event log
Send encrypted
segments
Log Server:
Log Provider
Trusted App: Secure Miner
Trusted Execution Environment
Log Receiver
Decrypt segment
Forward segment cases
Log Manager
Provisioner Node
Miner Node
TEE
PAIS: Log
Recorder
Generate segments
Access event log
Send event log
Send encrypted
segments
Log Server:
Log Provider
Trusted App: Secure Miner
Trusted Execution Environment
Log Receiver
Decrypt segment
Forward segment cases
Log Manager
Merge and store
53
Initialization
Data
Transmission Computation
Remote
Attestation
Miner Node Miner Node
Trusted App: Secure Miner
Trusted Execution Environment
Log Manager
Forward
merged cases
Log Elaborator
54
Initialization
Data
Transmission Computation
Remote
Attestation
Miner Node
55
Initialization
Data
Transmission Computation
Miner Node Miner Node
Trusted App: Secure Miner
Trusted Execution Environment
Log Manager
Forward
merged cases
Operating System
Log Elaborator
Run mining algorithm
Remote
Attestation
Miner Node
56
Initialization
Data
Transmission Computation
Miner Node Miner Node
Trusted App: Secure Miner
Trusted Execution Environment
Log Manager
Forward
merged cases
Operating System
Log Elaborator
Run mining algorithm
Remote
Attestation
Operating System
TEE Interface
result
Return
Evaluation
57
58
Name Type Activities Cases Max
events
Min
events
Avg
events
Parties
Motivating
scenario
Synthetic 19 1000 18 9 14 3
Sepsis Real 16 1050 185 3 15 3
BPIC 2013 Real 7 1487 123 1 9 3
Event Logs
Memory Usage
59
Memory Usage
60
Memory Usage
61
Memory Usage
62
Memory Usage
63
Memory Usage
64
Memory Usage
65
Scalability
66
Scalability
67
Future Work
68
Clock
synch
Future Work
More algorithms
integration
Utilization
rules
69
Agreement on case
identification
https://github.com/Process-in-Chains/CONFINE
Trusted
Execution
Environment for
Decentralized
Process Mining
Valerio Goretti, Sapienza University of Rome
Davide Basile, Sapienza University of Rome
Luca Barbaro, Sapienza University of Rome
Claudio Di Ciccio, Utrecht University

More Related Content

Similar to Trusted Execution Environment for Decentralized Process Mining

Websecurity
Websecurity Websecurity
Websecurity
Merve Bilgen
 
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
Adam Pennington
 
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Adam Pennington
 
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
 BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S... BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
BlueHat Security Conference
 
Update from the MITRE ATT&CK Team
Update from the MITRE ATT&CK TeamUpdate from the MITRE ATT&CK Team
Update from the MITRE ATT&CK Team
Adam Pennington
 
Automation: The Wonderful Wizard of CTI (or is it?)
Automation: The Wonderful Wizard of CTI (or is it?) Automation: The Wonderful Wizard of CTI (or is it?)
Automation: The Wonderful Wizard of CTI (or is it?)
MITRE ATT&CK
 
MITRE_ATTACK_Enterprise_11x17.pdf
MITRE_ATTACK_Enterprise_11x17.pdfMITRE_ATTACK_Enterprise_11x17.pdf
MITRE_ATTACK_Enterprise_11x17.pdf
AisyiFree
 
GDPR & Forensics Readiness -English
GDPR & Forensics Readiness -EnglishGDPR & Forensics Readiness -English
GDPR & Forensics Readiness -English
Studio Fiorenzi Security & Forensics
 
Putting the PRE into ATTACK
Putting the PRE into ATTACKPutting the PRE into ATTACK
Putting the PRE into ATTACK
MITRE - ATT&CKcon
 
Understanding Network Insight Integrations to Automate Containment and Kick S...
Understanding Network Insight Integrations to Automate Containment and Kick S...Understanding Network Insight Integrations to Automate Containment and Kick S...
Understanding Network Insight Integrations to Automate Containment and Kick S...
Core Security
 
Managing microservices with istio on OpenShift - Meetup
Managing microservices with istio on OpenShift - MeetupManaging microservices with istio on OpenShift - Meetup
Managing microservices with istio on OpenShift - Meetup
José Román Martín Gil
 
Novetta Cyber Analytics
Novetta Cyber AnalyticsNovetta Cyber Analytics
Novetta Cyber Analytics
Novetta
 
Airbnb - StreamAlert
Airbnb - StreamAlertAirbnb - StreamAlert
Airbnb - StreamAlert
Amazon Web Services
 
Exploring Risk and Mapping the Internet of Things with Autonomous Drones
Exploring Risk and Mapping the Internet of Things with Autonomous DronesExploring Risk and Mapping the Internet of Things with Autonomous Drones
Exploring Risk and Mapping the Internet of Things with Autonomous Drones
Praetorian
 
(SACON) Wasim Halani & Arpan Raval - Practical Threat Hunting - Developing an...
(SACON) Wasim Halani & Arpan Raval - Practical Threat Hunting - Developing an...(SACON) Wasim Halani & Arpan Raval - Practical Threat Hunting - Developing an...
(SACON) Wasim Halani & Arpan Raval - Practical Threat Hunting - Developing an...
Priyanka Aash
 
Practical Event Systems - Microservices for the Data Architect
Practical Event Systems - Microservices for the Data ArchitectPractical Event Systems - Microservices for the Data Architect
Practical Event Systems - Microservices for the Data Architect
David Dawson
 
The “Predictive” Battlespace: Leveraging the Power of Event-Driven Architect...
The “Predictive” Battlespace:  Leveraging the Power of Event-Driven Architect...The “Predictive” Battlespace:  Leveraging the Power of Event-Driven Architect...
The “Predictive” Battlespace: Leveraging the Power of Event-Driven Architect...
Nathaniel Palmer
 
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
MskDotNet Community
 
SplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based securitySplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based security
Splunk
 
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CanSecWest
 

Similar to Trusted Execution Environment for Decentralized Process Mining (20)

Websecurity
Websecurity Websecurity
Websecurity
 
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
 
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
 
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
 BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S... BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
 
Update from the MITRE ATT&CK Team
Update from the MITRE ATT&CK TeamUpdate from the MITRE ATT&CK Team
Update from the MITRE ATT&CK Team
 
Automation: The Wonderful Wizard of CTI (or is it?)
Automation: The Wonderful Wizard of CTI (or is it?) Automation: The Wonderful Wizard of CTI (or is it?)
Automation: The Wonderful Wizard of CTI (or is it?)
 
MITRE_ATTACK_Enterprise_11x17.pdf
MITRE_ATTACK_Enterprise_11x17.pdfMITRE_ATTACK_Enterprise_11x17.pdf
MITRE_ATTACK_Enterprise_11x17.pdf
 
GDPR & Forensics Readiness -English
GDPR & Forensics Readiness -EnglishGDPR & Forensics Readiness -English
GDPR & Forensics Readiness -English
 
Putting the PRE into ATTACK
Putting the PRE into ATTACKPutting the PRE into ATTACK
Putting the PRE into ATTACK
 
Understanding Network Insight Integrations to Automate Containment and Kick S...
Understanding Network Insight Integrations to Automate Containment and Kick S...Understanding Network Insight Integrations to Automate Containment and Kick S...
Understanding Network Insight Integrations to Automate Containment and Kick S...
 
Managing microservices with istio on OpenShift - Meetup
Managing microservices with istio on OpenShift - MeetupManaging microservices with istio on OpenShift - Meetup
Managing microservices with istio on OpenShift - Meetup
 
Novetta Cyber Analytics
Novetta Cyber AnalyticsNovetta Cyber Analytics
Novetta Cyber Analytics
 
Airbnb - StreamAlert
Airbnb - StreamAlertAirbnb - StreamAlert
Airbnb - StreamAlert
 
Exploring Risk and Mapping the Internet of Things with Autonomous Drones
Exploring Risk and Mapping the Internet of Things with Autonomous DronesExploring Risk and Mapping the Internet of Things with Autonomous Drones
Exploring Risk and Mapping the Internet of Things with Autonomous Drones
 
(SACON) Wasim Halani & Arpan Raval - Practical Threat Hunting - Developing an...
(SACON) Wasim Halani & Arpan Raval - Practical Threat Hunting - Developing an...(SACON) Wasim Halani & Arpan Raval - Practical Threat Hunting - Developing an...
(SACON) Wasim Halani & Arpan Raval - Practical Threat Hunting - Developing an...
 
Practical Event Systems - Microservices for the Data Architect
Practical Event Systems - Microservices for the Data ArchitectPractical Event Systems - Microservices for the Data Architect
Practical Event Systems - Microservices for the Data Architect
 
The “Predictive” Battlespace: Leveraging the Power of Event-Driven Architect...
The “Predictive” Battlespace:  Leveraging the Power of Event-Driven Architect...The “Predictive” Battlespace:  Leveraging the Power of Event-Driven Architect...
The “Predictive” Battlespace: Leveraging the Power of Event-Driven Architect...
 
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
 
SplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based securitySplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based security
 
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
 

Recently uploaded

The Role of Technology in Payroll Statutory Compliance (1).pdf
The Role of Technology in Payroll Statutory Compliance (1).pdfThe Role of Technology in Payroll Statutory Compliance (1).pdf
The Role of Technology in Payroll Statutory Compliance (1).pdf
paysquare consultancy
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
RaminGhanbari2
 
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
aslasdfmkhan4750
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
The Evolution of Remote Server Management
The Evolution of Remote Server ManagementThe Evolution of Remote Server Management
The Evolution of Remote Server Management
Bert Blevins
 
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
Edge AI and Vision Alliance
 
Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024
aakash malhotra
 
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
Priyanka Aash
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
ishalveerrandhawa1
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
maigasapphire
 
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and OllamaTirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Zilliz
 
The Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF GuideThe Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF Guide
Shiv Technolabs
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
Eric D. Schabell
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc
 
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAIApplying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
ssuserd4e0d2
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
Bert Blevins
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptxDublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Kunal Gupta
 

Recently uploaded (20)

The Role of Technology in Payroll Statutory Compliance (1).pdf
The Role of Technology in Payroll Statutory Compliance (1).pdfThe Role of Technology in Payroll Statutory Compliance (1).pdf
The Role of Technology in Payroll Statutory Compliance (1).pdf
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
 
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
The Evolution of Remote Server Management
The Evolution of Remote Server ManagementThe Evolution of Remote Server Management
The Evolution of Remote Server Management
 
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
 
Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024
 
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
 
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and OllamaTirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
 
The Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF GuideThe Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF Guide
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
 
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAIApplying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptxDublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
 

Trusted Execution Environment for Decentralized Process Mining