policy specifications available to lay users. This
intuitive user interface allows policy authority users
to make use of the entire arsenal of policy features
without requiring detailed knowledge about the inner
workings of the policy decision point nor any specific
technical specification skills.
5 CONCLUSION
Enterprises need to share a wide variety of
information with their partners to pursue their
objectives. Their dilemma is that these data are often
sensitive, and protecting privacy is important. One
importance piece for resolving this dilemma is to
provide fine-grained specifications of exactly which
data to share with which partners so that only needed
data is shared. The methods for specifying data
sharing need to be expressive both for specifying the
data and specifying the requesters who may access
the data. Furthermore, the methods need to be clear
and easy to use by non-experts so that errors are rare
and easy to catch and using the methods does not
require specialized training.
Our methods meet both criteria. Here, we
described these methods in the context of a pandemic
use case. Policy authorities define data sharing
policies that specify which persons’ medical data, or
counts of those data, are shared with different classes
of data requesters.
Our methods include a sophisticated JDS
specification of which data types to share and what
constraints to apply, a shareability theory-based
approach to processing requests for subsets,
supersets, and inversely specified requests, an
expressive role-based specification of data requesters,
and a decision process that incorporates both
precedence-based and policy authority hierarchy-
based overrides. Importantly, this policy decision
point requires no access to the data contents in order
to makes these policy-based sharing decisions.
Enterprises using these methods may come to
share more data and thereby realize more objectives
because they can be confident that they can precisely
control which data are shared with who and how and
which data remain private from all others. This
enhanced sharing should be useful in a wide variety
of context, and vital in global emergences, such as
pandemics, where the appropriate, tailored sharing of
sensitive information is crucial.
Distribution Statement "A" (Approved for Public
Release, Distribution Unlimited).
REFERENCES
Martiny, K., Elenius, D., Denker, G., 2018. Protecting
Privacy with a Declarative Policy Framework. In 12th
IEEE International Conference on Semantic
Computing (ICSC), Laguna Hills, California, USA
St. John, M., Moore, R., Martin, A., Gustafson, W.,
Jaramillo, M., Denker, G., Martiny, K., Briesemeister,
L., 2018. Enterprise-Level Private Data Sharing:
Framework and User Interface Concepts. In 9th
International Conference on Applied Human Factors
and Ergonomics (AHFE) Orlando, Florida, USA.
Briesemeister, L., Gustafson, W., Denker, G., Martin, A.,
Martiny, K., Moore, R., Pavlovic, D., and St. John, M,
2019: Policy Creation for Enterprise-level Data
Sharing. In 21st International Conference on Human-
Computer Interaction (HCI), Orlando, Florida, USA.
Myers, K., Ellis, T., Lepoint, T., Moore, R., Archer, D.,
Denker, G., Lu, S., Magill, S., Ostrovsky, R., 2017.
Privacy Technologies for Controlled Information
Sharing in Coalition Operations. In 9th International
Conference on Knowledge Systems for Coalition
Operations, Los Angeles, California, USA
OASIS XACML Standard, Version 3.0, 2013
http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-
spec-os-en.html, last accessed 2020/06/12
Damianou, N., Dulay, N., Lupu, E., Sloman, M., 2001.The
Ponder Specification Language. In Policy 01:
Workshop on Policies for Distributed Systems and
Networks.
Ashley, P., Hafa, S., Karjoth, G., Powers, C., Schunter, M.:
Enterprise Policy Authorization Language,
http://www.w3.org/Submission/2003/SUBM-EPAL-
20031110/, last accessed 2020/06/15
Kagal, L., Finin, T., Joshi, A., 2003. A Policy Language for
a pervasive Computing Environment. In Policy 03: 4th
International Workshop on Policies for Distributed
Systems and Networks.
Uszok, A., Bradshaw, J., Jeffers, R., 2004. KAoS: A policy
and domain services framework for grid computing and
semantic web services. In: iTrust 2004, Second
International Conference on Trust Management.
Kagal, L., Hanson, C., Weitzner, D., 2008. Using
dependency tracking to provide explanations for policy
management. In 2008 IEEE Workshop on Policies for
Distributed Systems and Networks, pp. 54–61.
Becker, M., Fournet, C., Gordon, A., 2010. SecPAL:
Design and semantics of a decentralized authorization
language. In: Journal of Computer Security, vol. 18/4,
pp. 619–665.
Sweeney, L., 2000. Simple Demographics Often Identify
People Uniquely. In Data Privacy Working Paper 3.
Pittsburgh.
St. John, M. F., Pankova, A., Denker, G., Laud, P., Martiny,
K. & Pavlovic, D., 2020. Decision Support for Sharing
Data Using Differential Privacy. Manuscript/Under Re-
view.