Patents by Inventor Angela Marie Schuett
Angela Marie Schuett has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8429758Abstract: A risk assessment system and method includes an information system configured to disclose information to a third party. A risk determination model is configured to compute identifiability risk for on one or more records in storage. The identifiability risk is compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party.Type: GrantFiled: July 27, 2012Date of Patent: April 23, 2013Assignee: International Business Machines CorporationInventors: Weifeng Chen, Zhen Liu, Anton Riabov, Angela Marie Schuett
-
Patent number: 8332959Abstract: A risk assessment system and method includes an information system configured to disclose information to a third party. A risk determination model is configured to compute identifiability risk for on one or more records in storage. The identifiability risk is compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party.Type: GrantFiled: June 4, 2008Date of Patent: December 11, 2012Assignee: International Business Machines CorporationInventors: Weifeng Chen, Zhen Liu, Anton Riabov, Angela Marie Schuett
-
Publication number: 20120291144Abstract: A risk assessment system and method includes an information system configured to disclose information to a third party. A risk determination model is configured to compute identifiability risk for on one or more records in storage. The identifiability risk is compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party.Type: ApplicationFiled: July 27, 2012Publication date: November 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Weifeng CHEN, Zhen LIU, Anton RIABOV, Angela Marie SCHUETT
-
Patent number: 8276192Abstract: A method for security planning with hard security constraints includes: receiving security-related requirements of a network to be developed using system inputs and processing components; and generating the network according to the security-related requirements, wherein the network satisfies hard security constraints.Type: GrantFiled: May 30, 2008Date of Patent: September 25, 2012Assignee: International Business Machines CorporationInventors: Kay Schwendimann Anderson, Pau-Chen Cheng, Genady Ya. Grabarnik, Paul Ashley Karger, Marc Lelarge, Zhen Liu, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Grant Wagner
-
Patent number: 8099781Abstract: An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage process with security risks managed by the first security-related information and the second security-related information is performed to produce the requested product.Type: GrantFiled: July 23, 2009Date of Patent: January 17, 2012Assignee: International Business Machines CorporationInventors: Kay S. Anderson, Pau-Chen Cheng, Mark D. Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R. Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V. Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
-
Patent number: 8087090Abstract: An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the range is acceptable with mitigation measures. A mitigation module determines the mitigation measures which reduce the parameter within the range by mapping the effectiveness of performing the mitigation measures to determine a residual risk after a mitigation measure has been implemented.Type: GrantFiled: June 2, 2008Date of Patent: December 27, 2011Assignee: International Business Machines CorporationInventors: Pau-Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
-
Patent number: 8032924Abstract: A method for protecting information in a distributed stream processing system, including: assigning a principal label to a processing component; assigning a first channel label to a first communication channel that is input to the processing component; comparing the principal label to the first channel label to determine if the processing component can read data attributes of the first channel label; and reading the data attributes of the first channel label when the principal label is equal to or has precedence over the first channel label, wherein the principal label includes a read label and a write label and at least one of a selection label, an addition label or a suppression label.Type: GrantFiled: May 30, 2008Date of Patent: October 4, 2011Assignee: International Business Machines CorporationInventors: Weifeng Chen, Alexandre V. Evfimievski, Zhen Liu, Ralf Rantzau, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Ramakrishnan Srikant, Grant Wagner
-
Patent number: 8020213Abstract: A method for protecting information in a distributed stream processing system, including: assigning a principal label to a processing component; assigning a first channel label to a first communication channel that is input to the processing component; comparing the principal label to the first channel label to determine if the processing component can read data attributes of the first channel label; and reading the data attributes of the first channel label when the principal label is equal to or has precedence over the first channel label, wherein the principal label includes a read label and a write label and at least one of a selection label, an addition label or a suppression label.Type: GrantFiled: August 1, 2006Date of Patent: September 13, 2011Assignee: International Business Machines CorporationInventors: Weifeng Chen, Alexandre V. Evfunievski, Zhen Liu, Ralf Rantzau, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Ramakrishnan Srikant, Grant Wagner
-
Patent number: 7832007Abstract: An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage process with security risks managed by the first security-related information and the second security-related information is performed to produce the requested product.Type: GrantFiled: January 10, 2006Date of Patent: November 9, 2010Assignee: International Business Machines CorporationInventors: Kay S. Anderson, Pau-Chen Cheng, Mark D. Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R. Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V. Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
-
Publication number: 20090282487Abstract: An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage process with security risks managed by the first security-related information and the second security-related information is performed to produce the requested product.Type: ApplicationFiled: July 23, 2009Publication date: November 12, 2009Applicant: International Business Machines CorporationInventors: Kay S. Anderson, Pau-Chen Cheng, Mark D. Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R. Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V. Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
-
Publication number: 20090228990Abstract: A risk assessment system and method includes an information system configured to disclose information to a third party. A risk determination model is configured to compute identifiability risk for on one or more records in storage. The identifiability risk is compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party.Type: ApplicationFiled: June 4, 2008Publication date: September 10, 2009Inventors: Weifeng Chen, Zhen Liu, Anton Riabov, Angela Marie Schuett
-
Patent number: 7530110Abstract: An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the range is acceptable with mitigation measures. A mitigation module determines the mitigation measures which reduce the parameter within the range.Type: GrantFiled: May 6, 2005Date of Patent: May 5, 2009Assignee: International Business Machines CorporationInventors: Pau-Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
-
Publication number: 20090064343Abstract: A method for protecting information in a distributed stream processing system, including: assigning a principal label to a processing component; assigning a first channel label to a first communication channel that is input to the processing component; comparing the principal label to the first channel label to determine if the processing component can read data attributes of the first channel label; and reading the data attributes of the first channel label when the principal label is equal to or has precedence over the first channel label, wherein the principal label includes a read label and a write label and at least one of a selection label, an addition label or a suppression label.Type: ApplicationFiled: May 30, 2008Publication date: March 5, 2009Inventors: Weifeng Chen, Alexandre V. Evfimievski, Zhen Liu, Ralf Rantzau, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Ramakrishnan Srikant, Grant Wagner
-
Publication number: 20090055890Abstract: A method for security planning with hard security constraints includes: receiving security-related requirements of a network to be developed using system inputs and processing components; and generating the network according to the security-related requirements, wherein the network satisfies hard security constraints.Type: ApplicationFiled: May 30, 2008Publication date: February 26, 2009Inventors: Kay Schwendimann Anderson, Pau-Chen Cheng, Genady Ya. Grabarnik, Paul Ashley Karger, Marc Lelarge, Zhen Liu, Anton Viktotovich Riabov, Pankai Rohatgi, Angela Marie Schuett, Grant Wagner
-
Publication number: 20080263662Abstract: An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the range is acceptable with mitigation measures. A mitigation module determines the mitigation measures which reduce the parameter within the range.Type: ApplicationFiled: June 2, 2008Publication date: October 23, 2008Inventors: Pau-Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
-
Publication number: 20080034439Abstract: A method for protecting information in a distributed stream processing system, including: assigning a principal label to a processing component; assigning a first channel label to a first communication channel that is input to the processing component; comparing the principal label to the first channel label to determine if the processing component can read data attributes of the first channel label; and reading the data attributes of the first channel label when the principal label is equal to or has precedence over the first channel label, wherein the principal label includes a read label and a write label and at least one of a selection label, an addition label or a suppression label.Type: ApplicationFiled: August 1, 2006Publication date: February 7, 2008Inventors: Weifeng Chen, Alexandre V. Evfimievski, Zhen Liu, Ralf Rantzau, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Ramakrishnan Srikant, Grant Wagner
-
Publication number: 20080016547Abstract: A method for security planning with hard security constraints includes: receiving security-related requirements of a network to be developed using system inputs and processing components; and generating the network according to the security-related requirements, wherein the network satisfies hard security constraints.Type: ApplicationFiled: July 11, 2006Publication date: January 17, 2008Inventors: Kay Schwendimann Anderson, Pau-Chen Cheng, Genady Ya. Grabarnik, Paul Ashley Karger, Marc Lelarge, Zhen Liu, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Grant Wagner
-
Publication number: 20080005778Abstract: A risk assessment system and method includes an information system configured to disclose information to a third party. A risk determination model is configured to compute identifiability risk for on one or more records in storage. The identifiability risk is compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party.Type: ApplicationFiled: July 3, 2006Publication date: January 3, 2008Inventors: Weifeng Chen, Zhen Liu, Anton Riabov, Angela Marie Schuett