A practical overview of security architectures, threat models, and controls for protecting proprietary enterprise data in retrieval-augmented generation (RAG) systems.
Tianpei Lu (The State Key Laboratory of Blockchain and Data Security, Zhejiang University), Bingsheng Zhang (The State Key Laboratory of Blockchain and Data Security, Zhejiang University), Xiaoyuan ...