摘要 |
<P>PROBLEM TO BE SOLVED: To provide techniques for executing a task while preserving the privacy or confidentiality of information used as input for the task. <P>SOLUTION: In one embodiment, a task is broken down into smaller tasks (called sub-tasks or micro-tasks), which are then outsourced. Input information for each of the micro-tasks is based upon and is generally a subset of input information received for that task. Determination of micro-tasks for a task is performed in such a manner that constraints associated with the task are satisfied. For example, micro-tasks for a task may be determined based upon risk (e.g., risk associated with the privacy or confidentiality of input information being compromised as a result of the outsourcing), quality constraints (e.g., desired quality of a product resulting from execution of the task), cost constraints, and other constraints associated with jobs. <P>COPYRIGHT: (C)2012,JPO&INPIT |