Return to Article Details Secure Retrieval-Augmented Generation: Preventing Data Leakage with Provenance and Policy Enforcement Download Download PDF