“…Much of the existing research on information sharing during crises has extensively addressed the need for secure access, focusing on comprehensive policy designs and analysis and efficient management of users' privileges and privacy. Recent studies found that in mission-critical systems, e.g., military, firefighting or supervisory control and data acquisition (i.e., computerized monitoring and controlling system), conventional access control mechanisms may be too rigid for urgent information-sharing scenarios and often fail to provide adequate support for access in non-routine, critical situations (Cheng, Rohatgi, Keser, Karger, Wagner, & Reninger, 2007;MITRE Corp., 2004;Swarup, Seligman, and Rosenthal, 2006;Keppler, Swarup, and Jajodia, 2006;Singh, Sanders, Nicol, and Seri, 2006). In critical infrastructures such as utility networks, oil and gas pipelines, and disaster and anti-terrorist communications, there is an increasing need to secure the information collected from and about the infrastructure, and yet to be able to allow flexible data sharing to facilitate problem-solving.…”