Controlled sharing of information in virtual organizations
First Claim
Patent Images
1. A method comprising:
- determining, by a computing device, a set of confidentiality sub-policies associated with a set of data items, wherein the set of confidentiality sub-policies specifies confidentiality values for the set of data items, and wherein different confidentiality values represent different levels of confidentiality;
determining, by the computing device, an information utility sub-policy associated with a task being performed by a virtual organization including a plurality of members, wherein the information utility sub-policy specifies information utility values for data items in the set of data items associated with the task, and wherein different information utility values represent different levels of utility to enable execution of the task;
performing, by the computing device, an analysis that optimally balances the confidentiality values and the information utility values specified in the set of confidentiality sub-policies and the information utility sub-policy to determine at least a portion of the set of data items associated with a first member in the plurality of members; and
providing, by the computing device, the at least a portion of the set of data items to a second member such that the second member can execute the task using the retrieved at least a portion of the set of data items, wherein the analysis balances preserving confidentiality while ensuring that the at least a portion of the set of data items provided to the second member are useful to execute the task.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method for extracting data items for a task requesting a set of data items in a virtual organization including a plurality of members is provided. A set of confidentiality sub-policies associated with the set of data items and an information utility sub-policy associated with the task are retrieved. At least a portion of the set of data items for the task are retrieved based on an analysis that optimally balances confidentiality and information utility using the set of confidentiality sub-policies and the information utility sub-policy.
-
Citations
20 Claims
-
1. A method comprising:
-
determining, by a computing device, a set of confidentiality sub-policies associated with a set of data items, wherein the set of confidentiality sub-policies specifies confidentiality values for the set of data items, and wherein different confidentiality values represent different levels of confidentiality; determining, by the computing device, an information utility sub-policy associated with a task being performed by a virtual organization including a plurality of members, wherein the information utility sub-policy specifies information utility values for data items in the set of data items associated with the task, and wherein different information utility values represent different levels of utility to enable execution of the task; performing, by the computing device, an analysis that optimally balances the confidentiality values and the information utility values specified in the set of confidentiality sub-policies and the information utility sub-policy to determine at least a portion of the set of data items associated with a first member in the plurality of members; and providing, by the computing device, the at least a portion of the set of data items to a second member such that the second member can execute the task using the retrieved at least a portion of the set of data items, wherein the analysis balances preserving confidentiality while ensuring that the at least a portion of the set of data items provided to the second member are useful to execute the task. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable storage medium containing instructions for controlling a computer system to be configured to:
-
determine a set of confidentiality sub-policies associated with a set of data items, wherein the set of confidentiality sub-policies specifies confidentiality values for the set of data items, and wherein different confidentiality values represent different levels of confidentiality; determine an information utility sub-policy associated with a task being performed by a virtual organization including a plurality of members, wherein the information utility sub-policy specifies information utility values for data items in the set of data items associated with the task, and wherein different information utility values represent different levels of utility to enable execution of the task; perform an analysis that optimally balances the confidentiality values and the information utility values specified in the set of confidentiality sub-policies and the information utility sub-policy to determine at least a portion of the set of data items associated with a first member in the plurality of members; and provide the at least a portion of the set of data items to a second member such that the second member can execute the task using the retrieved at least a portion of the set of data items, wherein the analysis balances preserving confidentiality while ensuring that the at least a portion of the set of data items provided to the second member are useful to execute the task. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A system comprising:
-
a storage device configured to store; data items for each member, and a non-transitory computer-readable storage medium containing instructions for controlling a computer system to be configured to; determine a set of confidentiality sub-policies associated with a set of data items, wherein the set of confidentiality sub-policies specifies confidentiality values for the set of data items, and wherein different confidentiality values represent different levels of confidentiality; determine an information utility sub-policy associated with a task being performed by a virtual organization including a plurality of members, wherein the information utility sub-policy specifies information utility values for data items in the set of data items associated with the task, and wherein different information utility values represent different levels of utility to enable execution of the task; perform an analysis that optimally balances the confidentiality values and the information utility values specified in the set of confidentiality sub-policies and the information utility sub-policy to determine at least a portion of the set of data items associated with a first member in the plurality of members; and provide the at least a portion of the set of data items to a second member such that the second member can execute the task using the retrieved at least a portion of the set of data items, wherein the analysis balances preserving confidentiality while ensuring that the at least a portion of the set of data items provided to the second member are useful to execute the task. - View Dependent Claims (20)
-
Specification