Idea: Trusted Emergency Management
نویسندگان
چکیده
Through first-responder access to sensitive information for which they have not been pre-vetted, lives and property can be saved. We describe enhancements to a trusted emergency information management (EIM) system that securely allows for extraordinary access to sensitive information during a crisis. A major component of the architecture is the end-user device, the security of which is enhanced with processorlevel encryption of memory. This paper introduces an approach to more efficiently use the processor-encryption feature for secure data storage, as well as ISA instructions for the management of emergency state.
منابع مشابه
Establishment of a communitywide EMS first-responder program.
By reading, you can know the knowledge and things more, not only about what you get from people to people. Book will be more trusted. As this establishment of a communitywide ems first responder program fellow project emergency medical system, it will really give you the good idea to be successful. It is not only for you to be success in certain life you can be successful in everything. The suc...
متن کاملTrusted Emergency Management
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation or of DARPA ATO. ii Abstract The ability for emergency first responders to access sensitive information for which they have not been pre-vetted can save lives and property. We describe a trusted emergency manag...
متن کاملTrusted Integrity Measurement and Reporting for Virtualized Platforms
Verifiable trust is a desirable property for computing platforms. Current trusted computing systems developed by Trusted Computing Group (TCG) provide verifiable trust by taking immutable snapshots of the whole set of platform components. It is, however, difficult to use this technology directly in virtualized platforms because of complexity and dynamic changes of platform components. In this p...
متن کاملThe Role of the Mosque as an Emergency Shelter in Disasters: A Systematic Review
Background: Providing emergency shelter for disaster victims is a part of disaster risk mitigation strategies. International organizations have proposed a framework for appropriate planning and emergency shelter design. These agencies are encouraging local authorities to manage events to use existing structures such as schools, community centers, etc., as emergency shelters for the victims. Acc...
متن کاملA Trusted Computing Identity Collation Protocol to Simplify Deployment of New Disaster Response Devices
The use of modern computing equipment by emergency service units in a disaster area assures increased efficiency during disaster response. Emergency devices must be easy to use and secure. Trusted Computing is a promising approach to help protect the software integrity of commodity emergency devices and thus increase their security. To efficiently use Trusted Computing in an emergency scenario ...
متن کامل