2019 IEEE Intelligent Vehicles Symposium (IV) 2019
DOI: 10.1109/ivs.2019.8814265
|View full text |Cite
|
Sign up to set email alerts
|

Integration of Attribute-based Access Control into Automotive Architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 11 publications
0
11
0
Order By: Relevance
“…A few papers that at least exhaustively define the space of contextual information used in their work can be roughly classified into key-value approaches (K/-), without following stringent notations. Two publications stand out, which use a markup-based approach [101] and an objectoriented model [120], [121].…”
Section: Comparison Findings Based On the Methodological Taxonomymentioning
confidence: 99%
See 2 more Smart Citations
“…A few papers that at least exhaustively define the space of contextual information used in their work can be roughly classified into key-value approaches (K/-), without following stringent notations. Two publications stand out, which use a markup-based approach [101] and an objectoriented model [120], [121].…”
Section: Comparison Findings Based On the Methodological Taxonomymentioning
confidence: 99%
“…Only five of the papers make data, ontologies, or implementation freely available online. Particularly positive here are the works [101], which provide both code and simulation environment, and [145], which offer a publicly accessible database including query interface.…”
Section: Comparison Findings Based On the Methodological Taxonomymentioning
confidence: 99%
See 1 more Smart Citation
“…3) Security mechanisms in IVNs: Firewalls and access control mechanisms can prevent attacks with stateful inspection, rate limiting, and filtering [36]. Gateways can filter messages between different sections of the IVN [37] and analyze event chains based on behavior specifications [38].…”
Section: In-vehicle Network Securitymentioning
confidence: 99%
“…None of these approaches exposes context information about the control flows in networking protocols that are used for the forwarding decision in the network. Instead, Rumez et al [7] integrate access control in automotive gateways that shall filter unwanted messages based on policies and attributes.…”
Section: Background and Related Workmentioning
confidence: 99%