Idea: Trusted Emergency Management
Loading...
Authors
Levin, Timothy
Irvine, Cynthia E.
Benzel, Terry V.
Nguyen, Thuy, D.
Clark, Paul C.
Bhaskara, Ganesha
Subjects
Advisors
Date of Issue
2005-07-02
Date
Publisher
Association for Computing Machinery (ACM)
Language
Abstract
Through first-responder access to sensitive information for which they have not been pre-vetted, lives and property can be saved. We describe enhancements to a trusted emergency information management (EIM) system that securely allows for extraordinary access to sensitive information during a crisis. A major component of the architecture is the end-user device, the security of which is enhanced with processor- level encryption of memory. This paper introduces an approach to more efficiently use the processor-encryption feature for secure data storage, as well as ISA instructions for the management of emergency state.
Type
Article
Description
Series/Report No
Department
Computer Science (CS)
Identifiers
NPS Report Number
Sponsors
Funder
Format
Citation
ACM Transactions on Reconfigurable Technology and Systems, Volume 3, Issue 2, Article No.: 10, May 10, 2010.
Distribution Statement
Approved for public release; distribution is unlimited.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.