{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T09:07:41Z","timestamp":1771924061691,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,25]]},"DOI":"10.1109\/snams67467.2025.11391136","type":"proceedings-article","created":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T20:45:45Z","timestamp":1771879545000},"page":"399-404","source":"Crossref","is-referenced-by-count":0,"title":["Trustless Compliance: On-Device LLM Orchestration for Zero-Data-Exposure Security"],"prefix":"10.1109","author":[{"given":"Saminu","family":"Salisu","sequence":"first","affiliation":[{"name":"Bilic,CTO,Vienna,Austria"}]},{"given":"Chidera Stanley","family":"Onwuatu","sequence":"additional","affiliation":[{"name":"Bilic,AI Systems Engineer,Abuja,Nigeria"}]},{"given":"Kolapo Goodness","family":"Temilorun","sequence":"additional","affiliation":[{"name":"Bilic,Software Engineer,Abuja,Nigeria"}]}],"member":"263","reference":[{"key":"ref1","journal-title":"The Wiz Cloud Security Platform"},{"key":"ref2","volume-title":"Prisma Cloud: Cloud Native Application Protection Platform","year":"2024"},{"key":"ref3","volume-title":"The Orca Cloud Security Platform","year":"2023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref5","first-page":"1273","article-title":"Communication-Efficient Learning of Deep Networks from Decentralized Data","volume-title":"Proc. 20th Int. Conf. on Artificial Intelligence and Statistics","author":"McMahan"},{"key":"ref6","article-title":"LoRA: Low-Rank Adaptation of Large Language Models","volume-title":"Proc. Int. Conf. on Learning Representations (ICLR)","author":"Hu"},{"key":"ref7","article-title":"Fine-tuning Language Models for Factuality","author":"Qi","year":"2023","journal-title":"arXiv preprint arXiv:2311.08401"},{"key":"ref8","article-title":"Constitutional AI: Harmlessness from AI Feedback","author":"Bai","year":"2022","journal-title":"arXiv preprint arXiv:2212.08073"},{"key":"ref9","article-title":"GPTQ: Accurate Post-Training Quantization for Generative Pre-trained Transformers","volume-title":"Proc. Int. Conf. on Learning Representations (ICLR)","author":"Frantar"},{"key":"ref10","article-title":"AgentBench: Evaluating LLMs as Agents","author":"Liu","year":"2023","journal-title":"arXiv preprint arXiv:2308.03688"},{"key":"ref11","article-title":"Ignore Previous Prompt: Attack Techniques For Language Models","author":"Perez","year":"2022","journal-title":"arXiv preprint arXiv:2211.09527"},{"key":"ref12","year":"2023","journal-title":"DeepSeek LLM"},{"key":"ref13","year":"2023","journal-title":"Qwen"},{"key":"ref14","volume-title":"Intel Developer Cloud","year":"2024"},{"key":"ref15","volume-title":"Cybersecurity Framework Version 2.0","year":"2024"},{"key":"ref16","volume-title":"CIS Benchmarks","year":"2024"},{"key":"ref17","volume-title":"Payment Card Industry Data Security Standard: Version 4.0","year":"2022"},{"key":"ref18","volume-title":"The HIPAA Security Rule","year":"2023"},{"key":"ref19","volume-title":"Regulation (EU) 2016\/679 (General Data Protection Regulation)","year":"2016"},{"key":"ref20","volume-title":"Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy"},{"key":"ref21","year":"2023","journal-title":"LangChain Framework"},{"issue":"2","key":"ref22","first-page":"110","article-title":"Federated Security Posture Management for Multi-Cloud Environments","volume":"12","author":"Kim","year":"2024","journal-title":"IEEE Trans. Cloud Computing"},{"key":"ref23","article-title":"Zero-Knowledge Compliance Attestation for Confidential Cloud Operations","volume-title":"Proc. ACM CCS Workshops","author":"Lee"}],"event":{"name":"2025 12th International Conference on Social Networks Analysis, Management and Security (SNAMS)","location":"Vienna, Austria","start":{"date-parts":[[2025,11,25]]},"end":{"date-parts":[[2025,11,28]]}},"container-title":["2025 12th International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11390733\/11390881\/11391136.pdf?arnumber=11391136","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T08:12:11Z","timestamp":1771920731000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11391136\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,25]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/snams67467.2025.11391136","relation":{},"subject":[],"published":{"date-parts":[[2025,11,25]]}}}