Idea: Trusted Emergency Management

  • Authors:
  • Timothy E. Levin;Cynthia E. Irvine;Terry V. Benzel;Thuy D. Nguyen;Paul C. Clark;Ganesha Bhaskara

  • Affiliations:
  • Naval Postgraduate School, Monterey, USA CA 93943;Naval Postgraduate School, Monterey, USA CA 93943;USC Information Sciences Institute, Marina Del Rey, CA 90292;Naval Postgraduate School, Monterey, USA CA 93943;Naval Postgraduate School, Monterey, USA CA 93943;USC Information Sciences Institute, Marina Del Rey, CA 90292

  • Venue:
  • ESSoS '09 Proceedings of the 1st International Symposium on Engineering Secure Software and Systems
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Through first-responder access to sensitive information for which they have not been pre-vetted, lives and property can be saved. We describe enhancements to a trusted emergency information management (EIM) system that securely allows for extraordinary access to sensitive information during a crisis. A major component of the architecture is the end-user device, the security of which is enhanced with processor-level encryption of memory. This paper introduces an approach to more efficiently use the processor-encryption feature for secure data storage, as well as ISA instructions for the management of emergency state.