메뉴 건너뛰기




Volumn 7, Issue 2, 2014, Pages 516-526

Adapted Development Process for Security in Networked Automotive Systems

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMOBILE PARTS AND EQUIPMENT; AUTOMOTIVE ENGINEERING;

EID: 84903379059     PISSN: 19464614     EISSN: 19464622     Source Type: Journal    
DOI: 10.4271/2014-01-0334     Document Type: Article
Times cited : (24)

References (36)
  • 5
    • 84903396724 scopus 로고    scopus 로고
    • BYD's Two New Models and Three World-Class Technologies to Premiere at 2012 Beijing International Automotive Exhibition
    • BYD Auto, "", April
    • BYD Auto, "BYD's Two New Models and Three World-Class Technologies to Premiere at 2012 Beijing International Automotive Exhibition", http://www.energytrend.com/news/BYD_EV_20120419.html, April 2012.
    • (2012)
  • 6
    • 84891584966 scopus 로고    scopus 로고
    • Effective FMEAs: Achieving Safe, Reliable, and Economical Products and Processes Using Failure Mode and Effects Analysis
    • Wiley
    • Carlson, C., "Effective FMEAs: Achieving Safe, Reliable, and Economical Products and Processes Using Failure Mode and Effects Analysis". Quality and Reliability Engineering Series. Wiley, 2012.
    • (2012) Quality and Reliability Engineering Series
    • Carlson, C.1
  • 7
    • 84878802635 scopus 로고    scopus 로고
    • System Security and System Safety Engineering: Differences and Similarities and a System Security Engineering Process Based on the ISO 26262 Process Framework
    • doi: 10.4271/2013-01-1419
    • Czerny, B., "System Security and System Safety Engineering: Differences and Similarities and a System Security Engineering Process Based on the ISO 26262 Process Framework," SAE Int. J. Passeng. Cars - Electron. Electr. Syst. 6(1):349-359, 2013, doi:10.4271/2013-01-1419.
    • (2013) SAE Int. J. Passeng. Cars - Electron. Electr. Syst. , vol.6 , Issue.1 , pp. 349-359
    • Czerny, B.1
  • 8
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Denning, D., "A lattice model of secure information flow". Communications of the ACM, 19:236-243, 1976.
    • (1976) Communications of the ACM , vol.19 , pp. 236-243
    • Denning, D.1
  • 9
    • 51849131973 scopus 로고    scopus 로고
    • On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
    • of, pages Springer Berlin Heidelberg
    • Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M., "On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme", volume 5157 of Lecture Notes in Computer Science, pages 203-220. Springer Berlin Heidelberg, 2008.
    • (2008) Lecture Notes in Computer Science , vol.5157 , pp. 203-220
    • Eisenbarth, T.1    Kasper, T.2    Moradi, A.3    Paar, C.4    Salmasizadeh, M.5    Shalmani, M.6
  • 13
    • 84903376690 scopus 로고    scopus 로고
    • Common Criteria for Information Technology Security Evaluation
    • International Organization for Standardization, September
    • International Organization for Standardization, Common Criteria for Information Technology Security Evaluation, Technical Report ISO 15408, September 2012.
    • (2012) Technical Report ISO 15408
  • 14
    • 77950393615 scopus 로고    scopus 로고
    • Road vehicles - Functional safety
    • International Organization for Standardization, November
    • International Organization for Standardization, Road vehicles - Functional safety, Technical Report ISO 26262, November 2011.
    • (2011) Technical Report ISO 26262
  • 18
    • 84899735434 scopus 로고    scopus 로고
    • Being Vulnerable to the Threat of Confusing Threats with Vulnerabilities
    • Viewpoint Paper
    • Johnston, R., "Being Vulnerable to the Threat of Confusing Threats with Vulnerabilities", Viewpoint Paper. Journal of Physical Security, 4:30-34, 2010.
    • (2010) Journal of Physical Security , vol.4 , pp. 30-34
    • Johnston, R.1
  • 19
    • 84903373937 scopus 로고
    • Qualitative and quantitative reliability analysis of safety systems
    • Energy Laboratory and Department of Nuclear Engineering, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139, May
    • Karimi, R., Rasmussen, N., Wolf. L., "Qualitative and quantitative reliability analysis of safety systems", Technical Report MIT-EL 80-015, Energy Laboratory and Department of Nuclear Engineering, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139, May 1980.
    • (1980) Technical Report MIT-EL 80-015
    • Karimi, R.1    Rasmussen, N.2    Wolf, L.3
  • 21
    • 84903396727 scopus 로고    scopus 로고
    • Utilization of customer-relevant driving behavior for reliable friction potential estimation by scaling nonlinear tyre models
    • In, Stuttgart, Stuttgarter Symposium
    • Kroll, H.-M., Schmidt, K., Buschardt, B., Lienkamp, M., "Utilization of customer-relevant driving behavior for reliable friction potential estimation by scaling nonlinear tyre models", In 14th Stuttgart International Symposium Automotive and Engine Technology, Stuttgart, 2014. Stuttgarter Symposium.
    • (2014) 14th Stuttgart International Symposium Automotive and Engine Technology
    • Kroll, H.-M.1    Schmidt, K.2    Buschardt, B.3    Lienkamp, M.4
  • 29
    • 80755131380 scopus 로고    scopus 로고
    • Experiences threat modeling at Microsoft
    • In. Dept. of Computing, Lancaster University, UK
    • Shostack, A., "Experiences threat modeling at Microsoft", In Modeling Security Workshop. Dept. of Computing, Lancaster University, UK, 2008.
    • (2008) Modeling Security Workshop
    • Shostack, A.1
  • 30
    • 80755131380 scopus 로고    scopus 로고
    • Experiences Threat Modeling at Microsoft
    • In, Toulouse, September
    • Shostack, A., "Experiences Threat Modeling at Microsoft", In Workshop on Modeling Security, Toulouse, September 2008.
    • (2008) Workshop on Modeling Security
    • Shostack, A.1
  • 31
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre, G., Opdahl, A., "Eliciting security requirements with misuse cases", Requirements Engineering, 10:34-44, 2005.
    • (2005) Requirements Engineering , vol.10 , pp. 34-44
    • Sindre, G.1    Opdahl, A.2
  • 33
    • 84878771276 scopus 로고    scopus 로고
    • Threat Analysis and Risk Assessment in Automotive Cyber Security
    • doi: 10.4271/2013-01-1415
    • Ward, D., Ibarra, I., and Ruddle, A., "Threat Analysis and Risk Assessment in Automotive Cyber Security," SAE Int. J. Passeng. Cars - Electron. Electr. Syst. 6(2):507-513, 2013, doi:10.4271/2013-01-1415.
    • (2013) SAE Int. J. Passeng. Cars - Electron. Electr. Syst. , vol.6 , Issue.2 , pp. 507-513
    • Ward, D.1    Ibarra, I.2    Ruddle, A.3
  • 34
  • 36
    • 84874007526 scopus 로고    scopus 로고
    • A Systematic Approach to a Quantified Security Risk Analysis for Vehicular IT Systems
    • In, pages GI, November
    • Wolf, M. Scheibel, M., "A Systematic Approach to a Quantified Security Risk Analysis for Vehicular IT Systems", In Automotive - Safety & Security 2012, volume 210, pages 195-210. GI, November 2012.
    • (2012) Automotive - Safety & Security 2012 , vol.210 , pp. 195-210
    • Wolf, M.1    Scheibel, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.