Controlled Sharing of Information in Virtual Organizations
First Claim
1. A method for extracting data items for a task requesting a set of data items in a virtual organization including a plurality of members, the method comprising:
- determining a set of confidentiality sub-policies associated with the set of data items;
determining an information utility sub-policy associated with the task; and
retrieving, by a computing device, at least a portion of the set of data items for the task based on an analysis that optimally balances confidentiality and information utility using the set of confidentiality sub-policies and the information utility sub-policy.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method for extracting data items for a task requesting a set of data items in a virtual organization including a plurality of members is provided. A set of confidentiality sub-policies associated with the set of data items and an information utility sub-policy associated with the task are retrieved. At least a portion of the set of data items for the task are retrieved based on an analysis that optimally balances confidentiality and information utility using the set of confidentiality sub-policies and the information utility sub-policy.
-
Citations
20 Claims
-
1. A method for extracting data items for a task requesting a set of data items in a virtual organization including a plurality of members, the method comprising:
-
determining a set of confidentiality sub-policies associated with the set of data items; determining an information utility sub-policy associated with the task; and retrieving, by a computing device, at least a portion of the set of data items for the task based on an analysis that optimally balances confidentiality and information utility using the set of confidentiality sub-policies and the information utility sub-policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable storage medium containing instructions for extracting data items for a task requesting a set of data items in a virtual organization including a plurality of members, the instructions for controlling a computer system to be operable to:
-
determine a set of confidentiality sub-policies associated with the set of data items; determine an information utility sub-policy associated with the task; and retrieve at least a portion of the set of data items for the task based on an analysis that optimally balances confidentiality and information utility using the set of confidentiality sub-policies and the information utility sub-policy. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A system for extracting data items for a task requesting a set of data items in a virtual organization including a plurality of members, the system comprising:
-
storage configured to store; data items for each member, and a confidentiality sub-policy for data items for each member, an information extraction component configured to; determine an optimum balance of confidentiality and information utility based on a set confidentiality sub-policies associated with the set of data items and an information utility sub-policy associated with the task; and retrieve at least a portion of the set of data items based on the optimum balancing of the confidentiality and the information utility using the set of confidentiality sub-policies and the information utility sub-policy. - View Dependent Claims (20)
-
Specification