{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:10:16Z","timestamp":1770840616066,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,6]],"date-time":"2022-07-06T00:00:00Z","timestamp":1657065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ericsson-Carleton Partnership 5G Fellowship Program"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,6]]},"DOI":"10.1145\/3551902.3565070","type":"proceedings-article","created":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T13:30:47Z","timestamp":1675776647000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Security Patterns for Machine Learning: The Data-Oriented Stages"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4118-5211","authenticated-orcid":false,"given":"Xinrui","family":"Zhang","sequence":"first","affiliation":[{"name":"Systems and Computer Engineering, Carleton University, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6316-3040","authenticated-orcid":false,"given":"Jason","family":"Jaskolka","sequence":"additional","affiliation":[{"name":"Systems and Computer Engineering, Carleton University, Canada"}]}],"member":"320","published-online":{"date-parts":[[2023,2,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-017-0110-7"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2018.2888775"},{"key":"e_1_3_2_1_4_1","unstructured":"Amazon. n.d. Amazon S3. https:\/\/aws.amazon.com\/s3\/. Accessed: 2022-04-24."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00042"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664257"},{"key":"e_1_3_2_1_7_1","unstructured":"M. Baldwin. 2022. Azure security baseline for Azure Machine Learning. https:\/\/docs.microsoft.com\/en-us\/security\/benchmark\/azure\/baselines\/machine-learning-security-baseline?context=\/azure\/machine-learning\/context\/ml-context. Accessed: 2022-04-24."},{"key":"e_1_3_2_1_8_1","unstructured":"BentoML. n.d. Model Serving Made Easy. https:\/\/www.bentoml.ai\/. Accessed: 2022-04-24."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SYSCON.2017.7934755"},{"key":"e_1_3_2_1_10_1","volume-title":"A System of Patterns","author":"Buschmann Frank","unstructured":"Frank Buschmann, Regine Meunier, Hans Rohnert, Peter Sommerlad, and Michael Stal. 2013. Pattern-Oriented Software Architecture, A System of Patterns. Wiley."},{"key":"e_1_3_2_1_11_1","unstructured":"Centers for Disease Control and Prevention. 2021. Introduction to Data Security. https:\/\/www.cdc.gov\/cancer\/npcr\/tools\/security\/index.htm."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07040-8"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-06384-y"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2891852"},{"key":"e_1_3_2_1_15_1","unstructured":"Databricks Inc.n.d. An open source platform for the machine learning lifecycle. https:\/\/mlflow.org\/. Accessed: 2022-04-24."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature21056"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1233341.1233436"},{"key":"e_1_3_2_1_18_1","volume-title":"Security patterns in practice: Building secure architectures using software patterns","author":"Fernandez B.","unstructured":"Eduardo\u00a0B. Fernandez. 2013. Security patterns in practice: Building secure architectures using software patterns. John Wiley & Sons, Inc."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73538-0_19"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCGI.2007.57"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-022-00109-w"},{"key":"e_1_3_2_1_22_1","unstructured":"Micah Goldblum Dimitris Tsipras Chulin Xie Xinyun Chen Avi Schwarzschild Dawn Song Aleksander Madry Bo Li and Tom Goldstein. 2020. Dataset Security for Machine Learning: Data Poisoning Backdoor Attacks and Defenses. CoRR abs\/2012.10544(2020) 1\u201339. https:\/\/arxiv.org\/abs\/2012.10544"},{"key":"e_1_3_2_1_23_1","unstructured":"Amazon\u00a0Developer Guide. n.d. Security in Amazon SageMaker. https:\/\/docs.aws.amazon.com\/sagemaker\/latest\/dg\/security.html. Accessed: 2022-04-24."},{"key":"e_1_3_2_1_24_1","unstructured":"Google\u00a0Cloud Guides. n.d. Monitor and secure. https:\/\/cloud.google.com\/vertex-ai\/docs\/general\/monitoring-security. Accessed: 2022-04-24."},{"key":"e_1_3_2_1_25_1","unstructured":"Karen Hao and Patrick\u00a0Howell O\u2019Neill. 2020. The hack that could make face recognition think someone else is you. https:\/\/www.technologyreview.com\/2020\/08\/05\/1006008\/ai-face-recognition-hack-misidentifies-person\/. Accessed: 2022-05-03."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894819"},{"key":"e_1_3_2_1_27_1","volume-title":"Model Building, and MLOps. O\u2019Reilly Media","author":"Lakshmanan Valliappa","unstructured":"Valliappa Lakshmanan, Sara Robinson, and Michael Munn. 2021. Machine Learning Design Patterns: Solutions to Common Challenges in Data Preparation, Model Building, and MLOps. O\u2019Reilly Media, Inc."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805680"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.2986704"},{"key":"e_1_3_2_1_30_1","unstructured":"Microsoft. n.d. Azure Blob Storage documentation. https:\/\/docs.microsoft.com\/en-ca\/azure\/storage\/blobs\/. Accessed: 2022-04-24."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2970615"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-38557-6_10"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3282308.3282321"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2929330"},{"key":"e_1_3_2_1_35_1","unstructured":"Elizabeth Morey. n.d.. Medical Image Hacking Could Fool Both AI and Radiologists Study Shows. https:\/\/blog.thebreastcancersite.greatergood.com\/medical-image-hacks\/. Accessed: 2022-05-03."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS49300.2020.9116436"},{"key":"e_1_3_2_1_37_1","unstructured":"Netflix Inc.2021. What is Metaflow. https:\/\/docs.metaflow.org\/introduction\/what-is-metaflow."},{"key":"e_1_3_2_1_38_1","unstructured":"Lily\u00a0Hay Newman. 2021. Hackers Got Past Windows Hello by Tricking a Webcam. https:\/\/www.wired.com\/story\/windows-hello-facial-recognition-bypass\/. Accessed: 2022-05-03."},{"key":"e_1_3_2_1_39_1","unstructured":"NIST. n.d. What is Dioptra?https:\/\/pages.nist.gov\/dioptra\/index.html. Accessed: 2022-04-24."},{"key":"e_1_3_2_1_40_1","unstructured":"David\u00a0G. Ortega. 2021. Continuous Machine Learning (CML). https:\/\/github.com\/iterative\/cml."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.02.023"},{"key":"e_1_3_2_1_42_1","volume-title":"Label Sanitization Against Label Flipping Poisoning Attacks. In ECML PKDD 2018 Workshops. Springer International Publishing, Cham, 5\u201315","author":"Paudice Andrea","year":"2019","unstructured":"Andrea Paudice, Luis Mu\u00f1oz-Gonz\u00e1lez, and Emil\u00a0C. Lupu. 2019. Label Sanitization Against Label Flipping Poisoning Attacks. In ECML PKDD 2018 Workshops. Springer International Publishing, Cham, 5\u201315."},{"key":"e_1_3_2_1_43_1","volume-title":"Computer Vision \u2013 ECCV 2020 Workshops","author":"Neehar Peri","unstructured":"Neehar Peri 2020. Deep k-NN Defense Against Clean-Label Data Poisoning Attacks. In Computer Vision \u2013 ECCV 2020 Workshops. Springer International Publishing, Cham, 55\u201370."},{"key":"e_1_3_2_1_44_1","volume-title":"Analyzing computer security: A threat\/vulnerability\/countermeasure approach","author":"Pfleeger P","unstructured":"Charles\u00a0P Pfleeger and Shari\u00a0Lawrence Pfleeger. 2012. Analyzing computer security: A threat\/vulnerability\/countermeasure approach. Prentice Hall Professional."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449205"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.07.001"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0112"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-013-0195-2"},{"key":"e_1_3_2_1_49_1","volume-title":"Security Patterns: Integrating Security and Systems Engineering","author":"Schumacher Markus","year":"2005","unstructured":"Markus Schumacher, Eduardo\u00a0B. Fernandez, Duane Hybertson, Frank Buschmann, and Peter Sommerlad. 2005. Security Patterns: Integrating Security and Systems Engineering. John Wiley & Sons, Inc. 600 pages."},{"key":"e_1_3_2_1_50_1","first-page":"3215","article-title":"A Review Report on Security Threats on Database","volume":"5","author":"Singh Shivnandan","year":"2014","unstructured":"Shivnandan Singh and Rakesh\u00a0Kumar Rai. 2014. A Review Report on Security Threats on Database. International Journal of Computer Science and Information Technologies 5, 3(2014), 3215\u20133219.","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.85"},{"key":"e_1_3_2_1_52_1","unstructured":"Shoshanna Solomon. 2019. Israeli researchers show medical scans vulnerable to fake tumors. https:\/\/www.timesofisrael.com\/israeli-researchers-show-medical-scans-vulnerable-to-fake-tumors\/. Accessed: 2022-05-03."},{"key":"e_1_3_2_1_53_1","unstructured":"Google\u00a0Cloud Storage. n.d. Cloud Storage. https:\/\/cloud.google.com\/storage. Accessed: 2022-04-24."},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings of the Conference on Pattern Languages of Programs 2021(PLoP \u201921)","author":"Thapa Bijayita","year":"2021","unstructured":"Bijayita Thapa and Eduardo Fern\u00e1ndez. 2021. Secure Abstract and Radar Sensor Patterns. In Proceedings of the Conference on Pattern Languages of Programs 2021(PLoP \u201921). ACM, New York, NY, USA, 1\u201311."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.03.003"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2396716.2396721"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2987435"},{"key":"e_1_3_2_1_58_1","first-page":"39","article-title":"Accelerating the Machine Learning Lifecycle with MLflow","volume":"41","author":"Zaharia A.","year":"2018","unstructured":"Matei\u00a0A. Zaharia, Andrew Chen, Aaron Davidson, Ali Ghodsi, Sue\u00a0Ann Hong, Andy Konwinski, Siddharth Murching, Tomas Nykodym, Paul Ogilvie, Mani Parkhe, Fen Xie, and Corey Zumar. 2018. Accelerating the Machine Learning Lifecycle with MLflow. IEEE Data Engineering Bulletin 41 (2018), 39\u201345.","journal-title":"IEEE Data Engineering Bulletin"}],"event":{"name":"EuroPLop '22: 27th European Conference on Pattern Languages of Programs","location":"Irsee Germany","acronym":"EuroPLop '22"},"container-title":["Proceedings of the 27th European Conference on Pattern Languages of Programs"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551902.3565070","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551902.3565070","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T00:44:27Z","timestamp":1768265067000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551902.3565070"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,6]]},"references-count":58,"alternative-id":["10.1145\/3551902.3565070","10.1145\/3551902"],"URL":"https:\/\/doi.org\/10.1145\/3551902.3565070","relation":{},"subject":[],"published":{"date-parts":[[2022,7,6]]},"assertion":[{"value":"2023-02-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}