Publications
Idea: Trusted emergency management
Abstract
Through first-responder access to sensitive information for which they have not been pre-vetted, lives and property can be saved. We describe enhancements to a trusted emergency information management (EIM) system that securely allows for extraordinary access to sensitive information during a crisis. A major component of the architecture is the end-user device, the security of which is enhanced with processor-level encryption of memory. This paper introduces an approach to more efficiently use the processor-encryption feature for secure data storage, as well as ISA instructions for the management of emergency state.
- Date
- March 14, 2026
- Authors
- Timothy E Levin, Cynthia E Irvine, Terry V Benzel, Thuy D Nguyen, Paul C Clark, Ganesha Bhaskara
- Conference
- Engineering Secure Software and Systems: First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings 1
- Pages
- 32-36
- Publisher
- Springer Berlin Heidelberg