Proceedings of the 2nd International Workshop on Mobile Commerce 2002
DOI: 10.1145/570705.570711
|View full text |Cite
|
Sign up to set email alerts
|

Framework for security and privacy in automotive telematics

Abstract: Automotive telematics may be defined as the informationintensive applications that are being enabled for vehicles by a combination of telecommunications and computing technology. Telematics by its nature requires the capture of sensor data, storage and exchange of data to obtain remote services. In order for automotive telematics to grow to its full potential, telematics data must be protected. Data protection must include privacy and security for end-users, service providers and application providers. In this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
32
0
2

Year Published

2006
2006
2015
2015

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 111 publications
(34 citation statements)
references
References 7 publications
0
32
0
2
Order By: Relevance
“…Goodman et al presented a system that was designed for information transfer in a cellular network in [21]. Note that the communication protocol should take consideration of the customer's privacy, which is important to vehicular telematics applications [22], [23]. The WDT applications possess some unique characteristics for data exchange and modeling.…”
Section: Related Workmentioning
confidence: 99%
“…Goodman et al presented a system that was designed for information transfer in a cellular network in [21]. Note that the communication protocol should take consideration of the customer's privacy, which is important to vehicular telematics applications [22], [23]. The WDT applications possess some unique characteristics for data exchange and modeling.…”
Section: Related Workmentioning
confidence: 99%
“…In the same year Duri et al presented in [4] a framework for security in vehicle telematics. They see the success of vehicle telematics directly connected with the use of security and privacy mechanisms.…”
Section: Related Workmentioning
confidence: 99%
“…For example, a location-based service might choose to reveal that a group of users is at a specific location (such as an office), or an individual is located in a vague location (such as in a building), but would not reveal that a specific individual is located at a specific location. Duri examined the protection of telematics data by applying a set of privacy and security techniques [30].…”
Section: Related Workmentioning
confidence: 99%