Trusted Emergency Management

نویسندگان

  • Timothy Levin
  • Cynthia Irvine
  • Terry Benzel
  • Thuy Nguyen
  • Paul Clark
  • Ganesha Bhaskara
چکیده

Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation or of DARPA ATO. ii Abstract The ability for emergency first responders to access sensitive information for which they have not been pre-vetted can save lives and property. We describe a trusted emergency management solution for ensuring that sensitive information is protected from unauthorized access, while allowing for extraordinary access to be authorized under the duress of an emergency. Our solution comprises an emergency access control policy, an operational model and a scalable system security architecture. The operational model involves end-users who are on call as first responders, providers of critical information, and a coordinating authority. Extraordinary access to information is allowed to occur only during emergencies, and only in a confined emergency partition, which is unavailable before the emergency and can be completely purged after the emergency. As all information remains within its assigned partition, after the emergency the system can meaningfully enforce its pre-emergency access control policy. A major component of the architecture is the end-user device, and we describe mechanisms on the device for secure storage of data, and for management of emergency state, to indicate feasibility.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Idea: Trusted Emergency Management

Through first-responder access to sensitive information for which they have not been pre-vetted, lives and property can be saved. We describe enhancements to a trusted emergency information management (EIM) system that securely allows for extraordinary access to sensitive information during a crisis. A major component of the architecture is the end-user device, the security of which is enhanced...

متن کامل

The Role of the Mosque as an Emergency Shelter in Disasters: A Systematic Review

Background: Providing emergency shelter for disaster victims is a part of disaster risk mitigation strategies. International organizations have proposed a framework for appropriate planning and emergency shelter design. These agencies are encouraging local authorities to manage events to use existing structures such as schools, community centers, etc., as emergency shelters for the victims. Acc...

متن کامل

A Trusted Computing Identity Collation Protocol to Simplify Deployment of New Disaster Response Devices

The use of modern computing equipment by emergency service units in a disaster area assures increased efficiency during disaster response. Emergency devices must be easy to use and secure. Trusted Computing is a promising approach to help protect the software integrity of commodity emergency devices and thus increase their security. To efficiently use Trusted Computing in an emergency scenario ...

متن کامل

Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture

During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the names and addresses of non-ambulatory residents. Yet, currently, access to such information may not be possible because government policy makers and third-party data providers lack confidence that today’s IT systems will p...

متن کامل

Establishment of a communitywide EMS first-responder program.

By reading, you can know the knowledge and things more, not only about what you get from people to people. Book will be more trusted. As this establishment of a communitywide ems first responder program fellow project emergency medical system, it will really give you the good idea to be successful. It is not only for you to be success in certain life you can be successful in everything. The suc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009