Securing the dissemination of emergency response data with an integrated hardware-software architecture

Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhaskara, Thuy D. Nguyen, Paul C. Clark, Ruby B. Lee, Cynthia E. Irvine, Terry V. Benzel

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the names and addresses of non-ambulatory residents. Yet, currently, access to such information may not be possible because government policy makers and third-party data providers lack confidence that today's IT systems will protect their data. Our approach to the management of emergency information provides first responders with temporary, transient access to sensitive information, and ensures that the information is revoked after the emergency. The following contributions are presented: a systematic analysis of the basic forms of trusted communication supported by the architecture; a comprehensive method for secure, distributed emergency state management; a method to allow a userspace application to securely display data; a multifaceted system analysis of the confinement of emergency information and the secure and complete revocation of access to that information at the closure of an emergency.

Original languageAmerican English
Title of host publicationTrusted Computing - Second International Conference, Trust 2009, Proceedings
Pages133-152
Number of pages20
DOIs
StatePublished - 2009
Event2nd International Conference on Trusted Computing, Trust 2009 - Oxford, United Kingdom
Duration: Apr 6 2009Apr 8 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5471 LNCS

Other

Other2nd International Conference on Trusted Computing, Trust 2009
Country/TerritoryUnited Kingdom
CityOxford
Period4/6/094/8/09

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Keywords

  • Computer Security
  • Emergency Response
  • Information Assurance
  • Policy Enforcement
  • Secret Protection (SP)
  • Transient Trust

Fingerprint

Dive into the research topics of 'Securing the dissemination of emergency response data with an integrated hardware-software architecture'. Together they form a unique fingerprint.

Cite this