Search papers, labs, and topics across Lattice.
The paper introduces DAVE, an LLM spokesperson architecture designed to enforce fine-grained usage policies during multi-document data sharing, addressing the limitations of asset-level policy enforcement. DAVE employs "virtual redaction" to suppress sensitive information at query time, avoiding the need for manual document redaction and enabling dynamic policy adjustments. The authors formalize policy violation within this framework and propose an architecture for integrating DAVE with Eclipse Dataspace Components and ODRL policies, outlining an evaluation methodology for future empirical validation.
Forget manual redaction: DAVE uses an LLM to answer questions over private documents while enforcing fine-grained usage policies on the fly.
In current inter-organizational data spaces, usage policies are enforced mainly at the asset level: a whole document or dataset is either shared or withheld. When only parts of a document are sensitive, providers who want to avoid leaking protected information typically must manually redact documents before sharing them, which is costly, coarse-grained, and hard to maintain as policies or partners change. We present DAVE, a usage policy-enforcing LLM spokesperson that answers questions over private documents on behalf of a data provider. Instead of releasing documents, the provider exposes a natural language interface whose responses are constrained by machine-readable usage policies. We formalize policy-violating information disclosure in this setting, drawing on usage control and information flow security, and introduce virtual redaction: suppressing sensitive information at query time without modifying source documents. We describe an architecture for integrating such a spokesperson with Eclipse Dataspace Components and ODRL-style policies, and outline an initial provider-side integration prototype in which QA requests are routed through a spokesperson service instead of triggering raw document transfer. Our contribution is primarily architectural: we do not yet implement or empirically evaluate the full enforcement pipeline. We therefore outline an evaluation methodology to assess security, utility, and performance trade-offs under benign and adversarial querying as a basis for future empirical work on systematically governed LLM access to multi-party data spaces.