Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 1 of 1 for Content (0.14 sec)

  1. SECURITY.md

    tenant isolation, resource allocation, model sharing and hardware attacks.
    
    ### Tenant isolation
    
    Since any tenants or users providing models, graphs or checkpoints can execute
    code in context of the TensorFlow service, it is important to design isolation
    mechanisms that prevent unwanted access to the data from other tenants.
    
    Network isolation between different models is also important not only to prevent
    Plain Text
    - Registered: Tue May 07 12:40:20 GMT 2024
    - Last Modified: Sun Oct 01 06:06:35 GMT 2023
    - 9.6K bytes
    - Viewed (0)
Back to top