Idea: Trusted Emergency Management

نویسندگان

  • Timothy E. Levin
  • Cynthia E. Irvine
  • Terry V. Benzel
  • Thuy D. Nguyen
  • Paul C. Clark
  • Ganesha Bhaskara
چکیده

Through first-responder access to sensitive information for which they have not been pre-vetted, lives and property can be saved. We describe enhancements to a trusted emergency information management (EIM) system that securely allows for extraordinary access to sensitive information during a crisis. A major component of the architecture is the end-user device, the security of which is enhanced with processorlevel encryption of memory. This paper introduces an approach to more efficiently use the processor-encryption feature for secure data storage, as well as ISA instructions for the management of emergency state.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Establishment of a communitywide EMS first-responder program.

By reading, you can know the knowledge and things more, not only about what you get from people to people. Book will be more trusted. As this establishment of a communitywide ems first responder program fellow project emergency medical system, it will really give you the good idea to be successful. It is not only for you to be success in certain life you can be successful in everything. The suc...

متن کامل

Trusted Emergency Management

Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation or of DARPA ATO. ii Abstract The ability for emergency first responders to access sensitive information for which they have not been pre-vetted can save lives and property. We describe a trusted emergency manag...

متن کامل

Trusted Integrity Measurement and Reporting for Virtualized Platforms

Verifiable trust is a desirable property for computing platforms. Current trusted computing systems developed by Trusted Computing Group (TCG) provide verifiable trust by taking immutable snapshots of the whole set of platform components. It is, however, difficult to use this technology directly in virtualized platforms because of complexity and dynamic changes of platform components. In this p...

متن کامل

The Role of the Mosque as an Emergency Shelter in Disasters: A Systematic Review

Background: Providing emergency shelter for disaster victims is a part of disaster risk mitigation strategies. International organizations have proposed a framework for appropriate planning and emergency shelter design. These agencies are encouraging local authorities to manage events to use existing structures such as schools, community centers, etc., as emergency shelters for the victims. Acc...

متن کامل

A Trusted Computing Identity Collation Protocol to Simplify Deployment of New Disaster Response Devices

The use of modern computing equipment by emergency service units in a disaster area assures increased efficiency during disaster response. Emergency devices must be easy to use and secure. Trusted Computing is a promising approach to help protect the software integrity of commodity emergency devices and thus increase their security. To efficiently use Trusted Computing in an emergency scenario ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009