- Sort Score
- Result 10 results
- Languages All
Results 1 - 2 of 2 for isolation (0.24 sec)
-
SECURITY.md
tenant isolation, resource allocation, model sharing and hardware attacks. ### Tenant isolation Since any tenants or users providing models, graphs or checkpoints can execute code in context of the TensorFlow service, it is important to design isolation mechanisms that prevent unwanted access to the data from other tenants.
Plain Text - Registered: Tue May 07 12:40:20 GMT 2024 - Last Modified: Sun Oct 01 06:06:35 GMT 2023 - 9.6K bytes - Viewed (0) -
SECURITY.md
## Public Discussions Please restrain from publicly discussing a potential security vulnerability. 🙊 It's better to discuss privately and try to find a solution first, to limit the potential impact as much as possible. --- Thanks for your help!
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Sun Sep 11 16:15:49 GMT 2022 - 1.3K bytes - Viewed (0)