Trusted Emergency Management
نویسندگان
چکیده
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation or of DARPA ATO. ii Abstract The ability for emergency first responders to access sensitive information for which they have not been pre-vetted can save lives and property. We describe a trusted emergency management solution for ensuring that sensitive information is protected from unauthorized access, while allowing for extraordinary access to be authorized under the duress of an emergency. Our solution comprises an emergency access control policy, an operational model and a scalable system security architecture. The operational model involves end-users who are on call as first responders, providers of critical information, and a coordinating authority. Extraordinary access to information is allowed to occur only during emergencies, and only in a confined emergency partition, which is unavailable before the emergency and can be completely purged after the emergency. As all information remains within its assigned partition, after the emergency the system can meaningfully enforce its pre-emergency access control policy. A major component of the architecture is the end-user device, and we describe mechanisms on the device for secure storage of data, and for management of emergency state, to indicate feasibility.
منابع مشابه
Idea: Trusted Emergency Management
Through first-responder access to sensitive information for which they have not been pre-vetted, lives and property can be saved. We describe enhancements to a trusted emergency information management (EIM) system that securely allows for extraordinary access to sensitive information during a crisis. A major component of the architecture is the end-user device, the security of which is enhanced...
متن کاملThe Role of the Mosque as an Emergency Shelter in Disasters: A Systematic Review
Background: Providing emergency shelter for disaster victims is a part of disaster risk mitigation strategies. International organizations have proposed a framework for appropriate planning and emergency shelter design. These agencies are encouraging local authorities to manage events to use existing structures such as schools, community centers, etc., as emergency shelters for the victims. Acc...
متن کاملA Trusted Computing Identity Collation Protocol to Simplify Deployment of New Disaster Response Devices
The use of modern computing equipment by emergency service units in a disaster area assures increased efficiency during disaster response. Emergency devices must be easy to use and secure. Trusted Computing is a promising approach to help protect the software integrity of commodity emergency devices and thus increase their security. To efficiently use Trusted Computing in an emergency scenario ...
متن کاملSecuring the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the names and addresses of non-ambulatory residents. Yet, currently, access to such information may not be possible because government policy makers and third-party data providers lack confidence that today’s IT systems will p...
متن کاملEstablishment of a communitywide EMS first-responder program.
By reading, you can know the knowledge and things more, not only about what you get from people to people. Book will be more trusted. As this establishment of a communitywide ems first responder program fellow project emergency medical system, it will really give you the good idea to be successful. It is not only for you to be success in certain life you can be successful in everything. The suc...
متن کامل