2009 World Congress on Privacy, Security, Trust and the Management of E-Business 2009
DOI: 10.1109/congress.2009.11
|View full text |Cite
|
Sign up to set email alerts
|

Securing First Response Coordination with Dynamic Attribute-Based Encryption

Abstract: Every minute saved in emergency management processes can save additional lives of affected victims. Therefore, an effective coordination of the incident reactions of mobile first responders is very important, especially in the face of rapidly changing situations of large scale disasters. However, tactical communication and messaging between the headquarter and mobile first responders, initiated for coordination purposes, has to meet a strong security requirement: it must preserve confidentiality in order to pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
4
1
1

Relationship

3
3

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 15 publications
0
11
0
Order By: Relevance
“…In [15], we show that ABE allows for building a security architecture for secure data sharing, also suitable for emergency management applications, i. e., it can be used to implement an end-to-end encryption allowing operational headquarters to target dynamic groups of first responders. Albeit, the so far proposed concept lacks support for a controlled override of access restrictions in emergency cases.…”
Section: Attribute-based Encryptionmentioning
confidence: 99%
See 2 more Smart Citations
“…In [15], we show that ABE allows for building a security architecture for secure data sharing, also suitable for emergency management applications, i. e., it can be used to implement an end-to-end encryption allowing operational headquarters to target dynamic groups of first responders. Albeit, the so far proposed concept lacks support for a controlled override of access restrictions in emergency cases.…”
Section: Attribute-based Encryptionmentioning
confidence: 99%
“…Only a few works in the disaster management domain explicitly consider security issues; in [15], we propose an ABE-based security architecture for sharing sensitive data in emergency management applications. Tailored to a different application context, Huang and Verma [8] present an ABE-based framework for establishing secure communications and enforcing access control policies within vehicular ad hoc networks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Their real-time position and tracking information can be displayed on a digital map in an emergency management headquarter, so that the data can by analyzed by a decision maker. While the current tracking information supports the coordination of rescue missions through the decision maker in the headquarter [5], collected historical position information of the first responders also creates some kind of log which documents the rescue missions. This data log is what we call a mission log.…”
Section: A Application Scenario and Settingmentioning
confidence: 99%
“…Consider the example of a smart emergency management application: once mobile units are continuously tracked, e.g. by sending their GPS positions and further data to a headquarter, a precise coordination of rescue missions is possible [53] and vital signs of first responders can be monitored. Moreover, units can act as mobile sensors to monitor levels of air pollution, also mission auditing can be supported by creating digital mission logs based on the collected GPS traces [52].…”
Section: Perspective: Mission-critical Applicationsmentioning
confidence: 99%