2015
DOI: 10.1109/msp.2015.59
|View full text |Cite
|
Sign up to set email alerts
|

Information Security Compliance over Intelligent Transport Systems: Is IT Possible?

Abstract: e automotive industry has used emerging technological concepts to transform automobiles into sophisticated cyber platforms. However, this extended technological evolution hides multiple security risks capable of a ecting both the intelligent transportation domain and human life itself.E very government takes advantage of cooperation between industrial and technological domains to achieve social and economic prosperity. e automotive industry's use of information and communications technology (ICT), for example,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
2

Year Published

2016
2016
2021
2021

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 9 publications
0
3
0
2
Order By: Relevance
“…Many of the cybersecurity tools and techniques, processes and procedures to identify and assess security vulnerabilities have been developed over the years (Dellios et al , 2015). Some of these are defined in familiar information and cyber security frameworks, standards and guidelines, such as COBIT and ISO 27001 (Baskerville et al , 2014).…”
Section: Critical Infrastructure Cybersecuritymentioning
confidence: 99%
“…Many of the cybersecurity tools and techniques, processes and procedures to identify and assess security vulnerabilities have been developed over the years (Dellios et al , 2015). Some of these are defined in familiar information and cyber security frameworks, standards and guidelines, such as COBIT and ISO 27001 (Baskerville et al , 2014).…”
Section: Critical Infrastructure Cybersecuritymentioning
confidence: 99%
“…Nəqliyyat sistemində İKT-nin tətbiqi ilə reallaşdırılan bütün proseslər infrastruktur obyektləri, nəqliyyat vasitələri, bu sistemdə dövr edən informasiya, o cümlədən fiziki poçt məlumatları informasiya təhlükəsizliyinin obyektinə çevrilir [68].…”
Section: Nəqliyyat Sisteminin Təhlükəsizliyi Və Informasiya Təhlükəsiunclassified
“…A more private solution for vehicle EDRs has recently been introduced in [64], exploiting the properties of timed release encryption. Unfortunately, this fragmented landscape extends even further since existing security standards, methodologies, and tools don't explicitly cover the rapidly developed automotive and ITS environment or address its specific requirements, as indicated by Dellios et al [24].…”
Section: Vehicle Securitymentioning
confidence: 99%