{"id":"https://openalex.org/W7131120980","doi":"https://doi.org/10.1109/snams67467.2025.11391136","title":"Trustless Compliance: On-Device LLM Orchestration for Zero-Data-Exposure Security","display_name":"Trustless Compliance: On-Device LLM Orchestration for Zero-Data-Exposure Security","publication_year":2025,"publication_date":"2025-11-25","ids":{"openalex":"https://openalex.org/W7131120980","doi":"https://doi.org/10.1109/snams67467.2025.11391136"},"language":null,"primary_location":{"id":"doi:10.1109/snams67467.2025.11391136","is_oa":false,"landing_page_url":"https://doi.org/10.1109/snams67467.2025.11391136","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 12th International Conference on Social Networks Analysis, Management and Security (SNAMS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071736540","display_name":"Saminu Salisu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210110766","display_name":"Diplomatic Academy of Vienna","ror":"https://ror.org/01s3pkg06","country_code":"AT","type":"education","lineage":["https://openalex.org/I4210110766"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Saminu Salisu","raw_affiliation_strings":["Bilic,CTO,Vienna,Austria"],"affiliations":[{"raw_affiliation_string":"Bilic,CTO,Vienna,Austria","institution_ids":["https://openalex.org/I4210110766"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126613324","display_name":"Chidera Stanley Onwuatu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210111684","display_name":"Beni American University","ror":"https://ror.org/01pj8yd54","country_code":"NG","type":"education","lineage":["https://openalex.org/I4210111684"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Chidera Stanley Onwuatu","raw_affiliation_strings":["Bilic,AI Systems Engineer,Abuja,Nigeria"],"affiliations":[{"raw_affiliation_string":"Bilic,AI Systems Engineer,Abuja,Nigeria","institution_ids":["https://openalex.org/I4210111684"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5126643222","display_name":"Kolapo Goodness Temilorun","orcid":null},"institutions":[{"id":"https://openalex.org/I8033065","display_name":"University of Abuja","ror":"https://ror.org/007e69832","country_code":"NG","type":"education","lineage":["https://openalex.org/I8033065"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Kolapo Goodness Temilorun","raw_affiliation_strings":["Bilic,Software Engineer,Abuja,Nigeria"],"affiliations":[{"raw_affiliation_string":"Bilic,Software Engineer,Abuja,Nigeria","institution_ids":["https://openalex.org/I8033065"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5071736540"],"corresponding_institution_ids":["https://openalex.org/I4210110766"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.88575686,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"399","last_page":"404"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.5525000095367432,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.5525000095367432,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.09359999746084213,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.04270000010728836,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.5796999931335449},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5443999767303467},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.49160000681877136},{"id":"https://openalex.org/keywords/orchestration","display_name":"Orchestration","score":0.4747999906539917},{"id":"https://openalex.org/keywords/sovereignty","display_name":"Sovereignty","score":0.39719998836517334},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.3384000062942505},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.3310000002384186},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.3138999938964844}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6725000143051147},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5877000093460083},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.5796999931335449},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5443999767303467},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.49160000681877136},{"id":"https://openalex.org/C199168358","wikidata":"https://www.wikidata.org/wiki/Q3367000","display_name":"Orchestration","level":3,"score":0.4747999906539917},{"id":"https://openalex.org/C186229450","wikidata":"https://www.wikidata.org/wiki/Q42008","display_name":"Sovereignty","level":3,"score":0.39719998836517334},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.34709998965263367},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.3384000062942505},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3310000002384186},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3190999925136566},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.3138999938964844},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.29820001125335693},{"id":"https://openalex.org/C34974158","wikidata":"https://www.wikidata.org/wiki/Q131257","display_name":"Intellectual property","level":2,"score":0.29409998655319214},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.2906000018119812},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2881999909877777},{"id":"https://openalex.org/C2776834041","wikidata":"https://www.wikidata.org/wiki/Q25346349","display_name":"Execution model","level":2,"score":0.28439998626708984},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.2833999991416931},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.2816999852657318},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.27549999952316284},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.2648000121116638},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2635999917984009},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.25619998574256897},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.2515000104904175}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/snams67467.2025.11391136","is_oa":false,"landing_page_url":"https://doi.org/10.1109/snams67467.2025.11391136","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 12th International Conference on Social Networks Analysis, Management and Security (SNAMS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2027595342"],"related_works":[],"abstract_inverted_index":{"Modern":[0],"enterprises":[1],"increasingly":[2],"leverage":[3],"multicloud":[4],"architectures,":[5],"introducing":[6],"complex":[7],"security":[8,169],"and":[9,24,33,76,112,155,182],"compliance":[10,75,119,180],"challenges.":[11],"While":[12],"Cloud-Native":[13],"Application":[14],"Protection":[15],"Platforms":[16],"(CNAPPs)":[17],"offer":[18],"unified":[19],"solutions,":[20],"most":[21],"are":[22,152],"cloud-hosted":[23,135],"require":[25],"exporting":[26],"sensitive":[27,98],"configuration":[28],"data,":[29],"posing":[30],"significant":[31],"privacy":[32],"data":[34,81,122,162],"sovereignty":[35,163],"risks.":[36],"This":[37,85,165],"paper":[38],"introduces":[39],"Sentinel,":[40],"a":[41,48,61,68,138,153],"novel":[42,173],"private-by-design":[43],"CNAPP":[44],"agent":[45],"that":[46,116,127,147],"embodies":[47],"new":[49],"architectural":[50],"pattern":[51],"we":[52],"term":[53],"the":[54,93,113],"Locally-Orchestrated,":[55],"Privacy-Preserving":[56],"Agent":[57],"(LOPPA).":[58],"Sentinel":[59,128],"employs":[60],"modular,":[62],"on-device":[63,176],"execution":[64,184],"model":[65,115],"orchestrated":[66],"by":[67],"fine-tuned":[69],"DeepSeek":[70],"language":[71],"model,":[72],"enabling":[73],"automated":[74],"threat":[77],"analysis":[78],"without":[79],"exposing":[80],"to":[82,133],"third-party":[83],"services.":[84],"is":[86,101],"particularly":[87],"critical":[88],"for":[89,158],"high-value":[90],"environments":[91],"like":[92],"Intel":[94],"Developer":[95],"Cloud,":[96],"where":[97],"intellectual":[99],"property":[100],"managed.":[102],"We":[103],"detail":[104],"Sentinel\u2019s":[105],"innovative":[106],"architecture,":[107],"its":[108,172],"privacy-preserving":[109,149,168],"fine-tuning":[110],"methodology,":[111],"LOPPA":[114],"maintains":[117],"continuous":[118],"while":[120],"eliminating":[121],"transfer.":[123],"Our":[124],"evaluation":[125],"demonstrates":[126],"achieves":[129],"detection":[130],"accuracy":[131],"comparable":[132],"leading":[134],"alternatives":[136],"(within":[137],"2-3%":[139],"F1":[140],"score)":[141],"with":[142,160],"acceptable":[143],"performance":[144],"trade-offs,":[145],"establishing":[146],"secure,":[148],"AI":[150],"agents":[151],"viable":[154],"superior":[156],"alternative":[157],"organizations":[159],"stringent":[161],"requirements.":[164],"work":[166],"advances":[167],"automation":[170],"through":[171],"combination":[174],"of":[175],"LLM":[177],"orchestration,":[178],"modular":[179],"engines,":[181],"local":[183],"guarantees.":[185]},"counts_by_year":[],"updated_date":"2026-02-25T06:17:34.324206","created_date":"2026-02-24T00:00:00"}
