Trusted emergency management
MetadataShow full item record
The ability for emergency first responders to access sensitive information for which they have not been pre-vetted can save lives and property. We describe a trusted emergency management solution for ensuring that sensitive information is protected from unauthorized access, while allowing for extraordinary access to be authorized under the duress of an emergency. Our solution comprises an emergency access control policy, an operational model and a scalable system security architecture. The operational model involves endusers who are on call as first responders, providers of critical information, and a coordinating authority. Extraordinary access to information is allowed to occur only during emergencies, and only in a confined emergency partition, which is unavailable before the emergency and can be completely purged after the emergency. As all information remains within its assigned partition, after the emergency the system can meaningfully enforce its pre-emergency access control policy. A major component of the architecture is the end-user device, and we describe mechanisms on the device for secure storage of data, and for management of emergency state, to indicate feasibility.
NPS Report NumberNPS-CS-09-001
Showing items related by title, author, creator and subject.
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture shifflet (ACM/IEEE, Springer-Verlag, 2009-04-01);During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the names and addresses of non-ambulatory residents. ...
Quah, Raymond. (Monterey, California. Naval Postgraduate School, 2010-12);Allowing first responders to access emergency-support information for which they are normally not authorized can save lives and property. A trusted emergency management solution was developed at the Naval Postgraduate ...
Irvine, Cynthia E.; Levin, Timothy E.; Clark, Paul C.; Nguyen, Thuy D. (Proceedings of the Modeling Security Workshop, Toulouse, France, 2008-10-01);In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped inside of a burning building, firefighters ...