J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007.
DOI : 10.1109/SP.2007.11

A. D. Brucker and D. Hutter, Information Flow in Disaster Management Systems, 2010 International Conference on Availability, Reliability and Security, 2010.
DOI : 10.1109/ARES.2010.107

A. D. Brucker and H. Petritsch, Extending access control models with break-glass, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.197-206, 2009.
DOI : 10.1145/1542207.1542239

A. Ferreira, R. Cruz-correia, L. Antunes, P. Farinha, E. Oliveira-palhares et al., How to Break Access Control in a Controlled Manner, 19th IEEE Symposium on Computer-Based Medical Systems (CBMS'06), pp.847-854, 2006.
DOI : 10.1109/CBMS.2006.95

R. W. Gardner, S. Garera, M. W. Pagano, M. Green, and A. D. Rubin, Securing medical records on smart phones, Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems, SPIMACS '09, pp.31-40, 2009.
DOI : 10.1145/1655084.1655090

C. Gentry, Handbook of Information Security, IBE (Identity-Based Encryption), pp.575-592, 2006.

D. Huang and M. Verma, ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks, Ad Hoc Networks, vol.7, issue.8, pp.1526-1535, 2009.
DOI : 10.1016/j.adhoc.2009.04.011

C. W. Johnson, Complexity, structured chaos and the importance of information management for mobile computing in the uk floods of, pp.1-11, 2007.

J. Lachner and H. Hellwagner, Information and Communication Systems for Mobile Emergency Response, Information Systems and e-Business Technologies (uniscon), LNBIP, pp.213-224, 2008.
DOI : 10.1007/978-3-540-78942-0_22

T. E. Levin, J. S. Dwoskin, G. Bhaskara, T. D. Nguyen, P. C. Clark et al., Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture, International Conference on Trusted Computing (Trust), pp.133-152, 2009.
DOI : 10.1016/S1389-1286(98)00019-X

J. Löffler and M. Klann, Mobile Information Technology for Emergency Response, MobileResponse), 2009.

M. Pirretti, P. Traynor, P. Mcdaniel, and B. Waters, Secure attribute-based systems, ACM conference on Computer and communications security (ccs), pp.99-112, 2006.
DOI : 10.3233/jcs-2009-0383

URL : http://doi.org/10.3233/jcs-2009-0383

A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, International Conference on the Theory and Applications of Cryptographic Techniques (eurocrypt), pp.457-473, 2005.
DOI : 10.1007/11426639_27

S. G. Weber, Securing First Response Coordination with Dynamic Attribute-Based Encryption, 2009 World Congress on Privacy, Security, Trust and the Management of e-Business, pp.58-69, 2009.
DOI : 10.1109/CONGRESS.2009.11

S. Yu, K. Ren, and W. Lou, fdac: Toward fine-grained distributed data access control in wireless sensor networks, IEEE Conference on Computer Communications (infocom, 2009.