policy  specifications  available  to  lay  users.  This 
intuitive user interface allows policy authority users 
to  make  use  of  the  entire arsenal of policy features 
without requiring detailed knowledge about the inner 
workings of the policy decision point nor any specific 
technical specification skills. 
5  CONCLUSION 
Enterprises  need  to  share  a  wide  variety  of 
information  with  their  partners  to  pursue  their 
objectives. Their dilemma is that these data are often 
sensitive,  and  protecting  privacy  is  important.  One 
importance  piece  for  resolving  this  dilemma  is  to 
provide fine-grained specifications of exactly which 
data to share with which partners so that only needed 
data  is  shared.  The  methods  for  specifying  data 
sharing need to be expressive both for specifying the 
data  and  specifying  the  requesters  who  may  access 
the data. Furthermore, the methods need to be clear 
and easy to use by non-experts so that errors are rare 
and  easy  to  catch  and  using  the  methods  does  not 
require specialized training. 
Our  methods  meet  both  criteria.  Here,  we 
described these methods in the context of a pandemic 
use  case.  Policy  authorities  define  data  sharing 
policies that specify which persons’ medical data, or 
counts of those data, are shared with different classes 
of data requesters. 
Our  methods  include  a  sophisticated  JDS 
specification of which data types to share and what 
constraints  to  apply,  a  shareability  theory-based 
approach  to  processing  requests  for  subsets, 
supersets,  and  inversely  specified  requests,  an 
expressive role-based specification of data requesters, 
and  a  decision  process  that  incorporates  both 
precedence-based  and  policy  authority  hierarchy-
based  overrides.  Importantly,  this  policy  decision 
point requires no access to the data contents in order 
to makes these policy-based sharing decisions. 
Enterprises  using  these  methods  may  come  to 
share more data and thereby realize more objectives 
because they can be confident that they can precisely 
control which data are shared with who and how and 
which  data  remain  private  from  all  others.  This 
enhanced sharing should be useful in a wide variety 
of  context,  and  vital  in  global  emergences,  such  as 
pandemics, where the appropriate, tailored sharing of 
sensitive information is crucial.  
Distribution Statement "A" (Approved for Public 
Release, Distribution Unlimited). 
REFERENCES 
Martiny,  K.,  Elenius,  D.,  Denker,  G.,  2018.  Protecting 
Privacy with a Declarative Policy Framework. In 12th 
IEEE International Conference on Semantic 
Computing (ICSC), Laguna Hills, California, USA 
St.  John,  M.,  Moore,  R.,  Martin,  A.,  Gustafson,  W., 
Jaramillo, M., Denker, G., Martiny, K., Briesemeister, 
L.,  2018.  Enterprise-Level  Private  Data  Sharing: 
Framework  and  User  Interface  Concepts.  In  9th 
International Conference on Applied Human Factors 
and Ergonomics (AHFE) Orlando, Florida, USA. 
Briesemeister, L., Gustafson, W., Denker, G., Martin, A., 
Martiny, K., Moore, R., Pavlovic, D., and St. John, M, 
2019:  Policy  Creation  for  Enterprise-level  Data 
Sharing. In 21st International Conference on Human-
Computer Interaction (HCI), Orlando, Florida, USA. 
Myers,  K.,  Ellis,  T.,  Lepoint,  T.,  Moore,  R.,  Archer,  D., 
Denker,  G.,  Lu,  S.,  Magill,  S.,  Ostrovsky,  R.,  2017. 
Privacy  Technologies  for  Controlled  Information 
Sharing  in  Coalition  Operations.  In  9th International 
Conference on Knowledge Systems for Coalition 
Operations, Los Angeles, California, USA 
OASIS  XACML  Standard,  Version  3.0,  2013 
http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-
spec-os-en.html, last accessed 2020/06/12 
Damianou, N., Dulay, N., Lupu, E., Sloman, M., 2001.The 
Ponder  Specification  Language.  In  Policy 01: 
Workshop on Policies for Distributed Systems and 
Networks. 
Ashley, P., Hafa, S., Karjoth, G., Powers, C., Schunter, M.: 
Enterprise  Policy  Authorization  Language, 
http://www.w3.org/Submission/2003/SUBM-EPAL-
20031110/, last accessed 2020/06/15 
Kagal, L., Finin, T., Joshi, A., 2003. A Policy Language for 
a pervasive Computing Environment. In Policy 03: 4th 
International Workshop on Policies for Distributed 
Systems and Networks. 
Uszok, A., Bradshaw, J., Jeffers, R., 2004. KAoS: A policy 
and domain services framework for grid computing and 
semantic  web  services.  In:  iTrust 2004, Second 
International Conference on Trust Management. 
Kagal, L., Hanson, C., Weitzner,  D.,  2008.  Using 
dependency tracking to provide explanations for policy 
management. In 2008 IEEE Workshop on Policies for 
Distributed Systems and Networks, pp. 54–61. 
Becker,  M.,  Fournet,  C.,  Gordon,  A.,  2010.  SecPAL: 
Design and semantics of a decentralized authorization 
language. In: Journal of Computer Security, vol. 18/4, 
pp. 619–665. 
Sweeney,  L.,  2000.  Simple  Demographics  Often  Identify 
People  Uniquely.  In Data Privacy Working Paper 3. 
Pittsburgh.  
St. John, M. F., Pankova, A., Denker, G., Laud, P., Martiny, 
K. & Pavlovic, D., 2020. Decision Support for Sharing 
Data Using Differential Privacy. Manuscript/Under Re-
view.