Why

Data sovereignty

Data spaces

International standards

We

Become a member

Members

Donate

Board

Head Office

IDSA ambassadors

Contact

Make

Working groups

Task forces

Network

Open source

Projects

Communities

Offers

Reference Architecture

Dataspace Protocol

IDSA Rulebook

Certification

IDS Reference Testbed

Data Connector Report

Adopt

Data Spaces Radar

Implementation partners

Professional qualifications

Training catalog

Knowledge Base

Publications

Most important documents

Papers

Magazine

Legacy

Events

Upcoming events

Calendar

Archive

News

Blog

Newsroom

Infohub

Newsletter

IDS-RAM 3.0

IDS-RAM 3.0

The IDS Reference Architecture Model (IDS-RAM) constitutes the conceptual basis of IDS-compliant data exchange between organizations. In addition to specifying rules and mechanisms ensuring data sovereignty within data ecosystems, version 3.0 of the IDS-RAM, which was...
How to Poison Data based on AI

How to Poison Data based on AI

Such poisoning attacks:1. compromises data collection2. the attacker subverts the learning process for the AI or machine learning system3. degrades or manipulates the performance of the system Possible attack scenarios include:- Applications that rely on untrusted...