Data processing: database and file management or data structures – Database design – Data structure types
Reexamination Certificate
2006-04-04
2006-04-04
Channavajjala, Srirama (Department: 2166)
Data processing: database and file management or data structures
Database design
Data structure types
C707S793000, C707S793000
Reexamination Certificate
active
07024409
ABSTRACT:
A data transform system comprises a processor, a memory connected to the processor, storing a collection of data, and a data transform module, accepting two data constraints and the collection of data from memory, wherein a first constraint is a usage constraint and a second constraint is a privacy constraint, the data transform module transforming the collection of data according to the usage constraint and the privacy constraint.
REFERENCES:
patent: 5045853 (1991-09-01), Astle et al.
patent: 5408657 (1995-04-01), Bigelow et al.
patent: 5491629 (1996-02-01), Fox et al.
patent: 5708828 (1998-01-01), Coleman
patent: 5751949 (1998-05-01), Thomson et al.
patent: 5801688 (1998-09-01), Mead et al.
patent: 6112194 (2000-08-01), Bigus
patent: 6144966 (2000-11-01), Roberts
patent: 6275824 (2001-08-01), O'Flaherty et al.
patent: 6388592 (2002-05-01), Natarajan
patent: 6480850 (2002-11-01), Veldhuisen
patent: 6513065 (2003-01-01), Hafez et al.
patent: 6560541 (2003-05-01), Singh
patent: 6564174 (2003-05-01), Ding et al.
patent: 6691067 (2004-02-01), Ding et al.
patent: 6728703 (2004-04-01), Wan et al.
patent: 6751663 (2004-06-01), Farrell et al.
patent: 2001/0011247 (2001-08-01), O'Flaherty et al.
patent: 2001/0056410 (2001-12-01), Ishigaki
patent: 2002/0010679 (2002-01-01), Felsher
patent: 2002/0124253 (2002-09-01), Eyer et al.
patent: 2002/0178151 (2002-11-01), Chaudhuri et al.
patent: 2003/0041042 (2003-02-01), Cohen et al.
patent: 2003/0145000 (2003-07-01), Arning et al.
patent: 2003/0145004 (2003-07-01), Egilsson et al.
patent: 2003/0149744 (2003-08-01), Bierre et al.
patent: 2003/0212851 (2003-11-01), Drescher et al.
patent: 2376318 (2002-12-01), None
patent: WO 02/093378 (2002-11-01), None
patent: WO 03/021473 (2003-03-01), None
Latanya.S, k-Anonymity: a model for protecting privacy, international journal on uncertainity, Fuzziness and knowledge-based system 10(5), 2002, pp1-14.
Lawrence H. C0x, national center for health statistics, DIMACS working group on challenges for Cryptographers in Health Data privacy, DIMACS, Rutgers University, Jun. 30,2004.
Fred M Behlen et al. Multicenter Patient records research, security policies and tools, JAMIA, Nov. 1999 6(6), , 17 pages.
Adam Meyerson et al. General k-Anonymization is Hard, CMU-CS-03-113, Mar. 2003, pp 1-4.
Suhail Ansari et al. “integrating E-commerce and data mining: architecture and challenges”, ICDM '01: the 2001 IEEE international conference on daa mining, 2001., 8 pages.
Rakesh Agrawal et al. “Hippocratic databases”, proceedings of the 28th VLDB conference, 2002, 12 pages.
Vijay S Iyengar, “Transforming data to satisfy privacy constraints”, SIGKDD, '02, ACM, pp 279-288.
Shariq J.Rizvi et al. “Maintaining data privacy in association rule mining”, proceedings of the 28th VLDB conference, 2002 12 pages.
MartinS.Oliver “database privacy: balancing confidentiality, integrity and availability”, vol. 4, issue 2, Dec. 2002, pp 20-27.
Lingyu Wang et al. “securing OLAP data cubes against privacy breaches”, proceedings of the 2004 IEEE symposium on security and privacy (S&P'04), 15 pages.
Rakesh Agarawal, et al. “report on DIMACS*working group on privacy/confidentiality of health data”, Dec. 2003, pp 1-19.
Praveen guduru et al. “user interfaces for privacy agents”, Aug. 2, 2004, pp 1-43.
Security and privacy requirements analaysis tool (SPRAT), software requirements specification version 2.00 Jul. 12, 2004, 28 pages.
Daniel E Geer,Jr, Verdasys,Inc, “securing the point of use the new foundation for data security”, May 20057 pages.
Sushil Jajodia et al. “enforcing primary key requirements in multilevel relations”, proc.4th RADC workshop on multilevel database security, Apr. 1991, 7 pages.
Alastair R. Beresford et al. “location privacy in pervasive computing”, IEEE CS and IEEEcommunications society, 2003, pp 46-55.
Alexandre Evfimevski et al. “limiting privacy breaches in privacy preserving data mininig”, symposium on principles of database systems, proceedings of the twenty-second ACM SIGMOD, 2003, pp 21-222.
Paul Ashley et al. “E-P3P privacy policies and privacy authorization”, workshop on privacy in the electronic socienty, proceedings of the 2002 ACM workshop on privacy in th eelectronic society, pp 103-109.
Graham, William, “HotSpots, process, privacy, ”, COMP3410, Aug. 2004, 5 pages.
Agrawal, Rakesh, et al.,Privacy-Preserving Data Mining, IBM Almaden Research Center, San Jose, CA. ACM SIGMOD, May 2000.
Hundepool, A.J., et al.,u- and t-Argus: Software for Statistical Disclosure Control, 3rdInternational Seminar on Statistical Confidentiality, Sep. 26, 1996.
Samarati, P.,Protecting Respondents' Identities in Microdata Release, IEEE, vol. 13, No. 6, Nov./Dec. 2001.
Sweeney, Latanya,Datafly: A System for Providing Anonymity in Medical Data, Database Security XI, Editors: T.Y. Lin and Shelly Qian, 1998.
Whitley, Darrell,The GENITOR Algorithm and Selection Pressure: Why Rank-Based Allocation of Reproductive Trial is Best, Computer Science Department, Colorado State University, CO., 1989, pp 116-123.
Channavajjala Srirama
F. Chau & Associates LLC
LandOfFree
System and method for transforming data to preserve privacy... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for transforming data to preserve privacy..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for transforming data to preserve privacy... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3531626