-
1
-
-
47349131000
-
Architecture for secure and private vehicular communications
-
P. Papadimitratos, L. Buttyan, J.-P. Hubaux, F. Kargl, A. Kung, and M. Raya, "Architecture for secure and private vehicular communications," in International Conference on ITS Telecommunications (ITST), Sophia Antipolis, France, 2007, pp. 1-6.
-
International Conference on ITS Telecommunications (ITST), Sophia Antipolis, France, 2007
, pp. 1-6
-
-
Papadimitratos, P.1
Buttyan, L.2
Hubaux, J.-P.3
Kargl, F.4
Kung, A.5
Raya, M.6
-
2
-
-
77950410586
-
-
Deliverable D2.3 of EVITA
-
A. Ruddle, D. Ward, B. Weyl, S. Idrees, Y. Roudier, M. Friedewald, T. Leimbach, A. Fuchs, S. Gürgens, O. Henniger, R. Rieke, M. Ritscher, H. Broberg, L. Apvrille, R. Pacalet, and G. Pedroza, "Security requirements for automotive on-board networks based on dark-side scenarios," Deliverable D2.3 of EVITA, 2009.
-
(2009)
Security Requirements for Automotive On-board Networks Based on Dark-side Scenarios
-
-
Ruddle, A.1
Ward, D.2
Weyl, B.3
Idrees, S.4
Roudier, Y.5
Friedewald, M.6
Leimbach, T.7
Fuchs, A.8
Gürgens, S.9
Henniger, O.10
Rieke, R.11
Ritscher, M.12
Broberg, H.13
Apvrille, L.14
Pacalet, R.15
Pedroza, G.16
-
3
-
-
2942753973
-
Specifying reusable security requirements
-
D. Firesmith, "Specifying reusable security requirements," Journal of Object Technology (JOT), vol.3, no.1, pp. 61-75, 2004.
-
(2004)
Journal of Object Technology (JOT)
, vol.3
, Issue.1
, pp. 61-75
-
-
Firesmith, D.1
-
4
-
-
77950455429
-
-
Deliverable D0.2.4 of EASIS
-
M. Hiller, J. Böhm, X. Chen, K. Echtle, T. Eymann, A. Ferre, B. Hedenetz, E. Kelling, V. Lauer, M. Osella, T. Voss, and D. van Wageningen, "Electronic architecture and system engineering for integrated safety systems - General architecture framework," Deliverable D0.2.4 of EASIS, 2004.
-
(2004)
Electronic Architecture and System Engineering for Integrated Safety Systems - General Architecture Framework
-
-
Hiller, M.1
Böhm, J.2
Chen, X.3
Echtle, K.4
Eymann, T.5
Ferre, A.6
Hedenetz, B.7
Kelling, E.8
Lauer, V.9
Osella, M.10
Voss, T.11
Van Wageningen, D.12
-
5
-
-
77950397788
-
-
Deliverable D2.1 of EVITA
-
E. Kelling, M. Friedewald, T. Leimbach, M. Menzel, P. Saeger, H. Seudié, and B. Weyl, "Specification and evaluation of e-security relevant use cases," Deliverable D2.1 of EVITA, 2009.
-
(2009)
Specification and Evaluation of E-security Relevant Use Cases
-
-
Kelling, E.1
Friedewald, M.2
Leimbach, T.3
Menzel, M.4
Saeger, P.5
Seudié, H.6
Weyl, B.7
-
7
-
-
84874092983
-
Identification of authenticity requirements in systems of systems by functional security analysis
-
A. Fuchs and R. Rieke, "Identification of authenticity requirements in systems of systems by functional security analysis," in Workshop on Architecting Dependable Systems (WADS) at the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Estoril, Lisbon, Portugal, 2009.
-
Workshop on Architecting Dependable Systems (WADS) at the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Estoril, Lisbon, Portugal, 2009
-
-
Fuchs, A.1
Rieke, R.2
-
8
-
-
77950416407
-
-
Institut Telecom
-
TTool: The TURTLE Toolkit, Institut Telecom, http://labsoc.comelec.enst. fr/turtle/ttool.html.
-
TTool: The TURTLE Toolkit
-
-
-
12
-
-
84906554377
-
Securing vehicular on-board IT systems: The EVITA project
-
O. Henniger, A. Ruddle, H. Seudié, B. Weyl, M. Wolf, and T. Wollinger, "Securing vehicular on-board IT systems: The EVITA project," in 25th VDI/VW Automotive Security Conference, Ingolstadt, Germany, 2009.
-
25th VDI/VW Automotive Security Conference, Ingolstadt, Germany, 2009
-
-
Henniger, O.1
Ruddle, A.2
Seudié, H.3
Weyl, B.4
Wolf, M.5
Wollinger, T.6
|