Publications

Idea: Trusted emergency management

Abstract

Through first-responder access to sensitive information for which they have not been pre-vetted, lives and property can be saved. We describe enhancements to a trusted emergency information management (EIM) system that securely allows for extraordinary access to sensitive information during a crisis. A major component of the architecture is the end-user device, the security of which is enhanced with processor-level encryption of memory. This paper introduces an approach to more efficiently use the processor-encryption feature for secure data storage, as well as ISA instructions for the management of emergency state.

Date
March 14, 2026
Authors
Timothy E Levin, Cynthia E Irvine, Terry V Benzel, Thuy D Nguyen, Paul C Clark, Ganesha Bhaskara
Conference
Engineering Secure Software and Systems: First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings 1
Pages
32-36
Publisher
Springer Berlin Heidelberg