Patents by Inventor Angela Schuett

Angela Schuett has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8141160
    Abstract: System and methods are provided for managing and mitigating privacy risks in a system having a network of processing elements. According to one method, there is receive a request for at least one output product from the system. The request includes a set of privacy parameters. At least one set of workflow generating strategies are created that results in the output product having a privacy risk value below a predefined threshold. At least one of the workflow generating strategies is deployed for automatically producing the at least one output product.
    Type: Grant
    Filed: July 26, 2006
    Date of Patent: March 20, 2012
    Assignee: International Business Machines Corporation
    Inventors: Kay S. Anderson, Alexandre V. Evfimievski, Mark D. Feblowitz, Genady Grabarnik, Nagui Halim, Zhen Liu, Ralf Rantzau, Anton V. Riabov, Angela Schuett, Ramakrishnan Srikant, Grant Wagner
  • Patent number: 8132259
    Abstract: A method for security planning with soft security constraints, include: receiving security-related requirements of a workflow to be developed using system inputs and processing components; and generating at least one proposed workflow according to the security-related requirements, wherein the at least one proposed workflow satisfies soft constraints.
    Type: Grant
    Filed: January 4, 2007
    Date of Patent: March 6, 2012
    Assignee: International Business Machines Corporation
    Inventors: Kay Schwendimann Anderson, Pau-Chen Cheng, Trenton Ray Jaeger, Zhen Liu, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Schuett Reninger, Grant Wagner
  • Publication number: 20100242120
    Abstract: System and methods are provided for managing and mitigating privacy risks in a system having a network of processing elements. According to one method, there is receive a request for at least one output product from the system. The request includes a set of privacy parameters. At least one set of workflow generating strategies are created that results in the output product having a privacy risk value below a predefined threshold. At least one of the workflow generating strategies is deployed for automatically producing the at least one output product.
    Type: Application
    Filed: July 26, 2006
    Publication date: September 23, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kay S. Anderson, Alexandre V. Evfimievski, Mark D. Feblowitz, Genady Grabarnik, Nagui Halim, Zhen Liu, Ralf Rantzau, Anton V. Riabov, Angela Schuett, Ramakrishnan Srikant, Grant Wagner
  • Publication number: 20080168529
    Abstract: A method for security planning with soft security constraints, include: receiving security-related requirements of a workflow to be developed using system inputs and processing components; and generating at least one proposed workflow according to the security-related requirements, wherein the at least one proposed workflow satisfies soft constraints.
    Type: Application
    Filed: January 4, 2007
    Publication date: July 10, 2008
    Inventors: Kay Schwendimann Anderson, Pau-Chen Cheng, Trenton Ray Jaeger, Zhen Liu, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Schuett Reninger, Grant Wagner
  • Publication number: 20070162976
    Abstract: An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage process with security risks managed by the first security-related information and the second security-related information is performed to produce the requested product.
    Type: Application
    Filed: January 10, 2006
    Publication date: July 12, 2007
    Applicant: International Business Machines Corporation
    Inventors: Kay Anderson, Pau-Chen Cheng, Mark Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent Jaeger, Paul Karger, Zhen Liu, Ronald Perez, Anton Riabov, Pankaj Rohatgi, Angela Schuett, Michael Steiner, Grant Wagner
  • Publication number: 20060253709
    Abstract: An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the range is acceptable with mitigation measures. A mitigation module determines the mitigation measures which reduce the parameter within the range.
    Type: Application
    Filed: May 6, 2005
    Publication date: November 9, 2006
    Inventors: Pau-Chen Cheng, Shai Halevi, Trent Jaeger, Paul Karger, Ronald Perez, Pankaj Rohatgi, Angela Schuett, Michael Steiner, Grant Wagner