Securing the dissemination of emergency response data with an integrated hardware-software architecture

Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhaskara, Thuy D. Nguyen, Paul C. Clark, Ruby B. Lee, Cynthia E. Irvine, Terry V. Benzel

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations


During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the names and addresses of non-ambulatory residents. Yet, currently, access to such information may not be possible because government policy makers and third-party data providers lack confidence that today's IT systems will protect their data. Our approach to the management of emergency information provides first responders with temporary, transient access to sensitive information, and ensures that the information is revoked after the emergency. The following contributions are presented: a systematic analysis of the basic forms of trusted communication supported by the architecture; a comprehensive method for secure, distributed emergency state management; a method to allow a userspace application to securely display data; a multifaceted system analysis of the confinement of emergency information and the secure and complete revocation of access to that information at the closure of an emergency.

Original languageEnglish (US)
Title of host publicationTrusted Computing - Second International Conference, Trust 2009, Proceedings
Number of pages20
StatePublished - 2009
Event2nd International Conference on Trusted Computing, Trust 2009 - Oxford, United Kingdom
Duration: Apr 6 2009Apr 8 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5471 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other2nd International Conference on Trusted Computing, Trust 2009
Country/TerritoryUnited Kingdom

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science


  • Computer Security
  • Emergency Response
  • Information Assurance
  • Policy Enforcement
  • Secret Protection (SP)
  • Transient Trust


Dive into the research topics of 'Securing the dissemination of emergency response data with an integrated hardware-software architecture'. Together they form a unique fingerprint.

Cite this