Trusted computing for automotive systems

被引:0
|
作者
Bogdanov, A. [1 ]
Eisenbarth, T.
Wolf, M. [1 ]
Wollinger, T. [1 ]
机构
[1] Embedded Sec, Bochum, Germany
来源
AUTOMOTIVE SECURITY | 2007年 / 2016卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
For new automotive applications and services, information technology (IT) has gained central importance. Safety and reliability has become a relatively well-established field. However, the protection of vehicular IT-systems against systematic manipulation or intrusion has started to emerge just recently. For example, user privacy aspects aren't considered at all for the time being. Nevertheless, some complex IT-systems are already base of various security-critical vehicular applications, such as immobilizers or digital tachographs. In Order to securely enable future automotive applications and business models while ensuring users' privacy as well, IT-security will be an obligatory technology for the next generation of vehicles.
引用
收藏
页码:227 / 237
页数:11
相关论文
共 50 条
  • [31] Trusted computing and forensic investigations
    Mason, S
    DIGITAL INVESTIGATION, 2005, 2 (03) : 189 - 192
  • [32] TRUSTED COMPUTING AND INFORMATION SECURITY
    Zhang Huanguo
    Mu Yi
    CHINA COMMUNICATIONS, 2013, 10 (11) : IX - X
  • [33] EXTENDING THE TRUSTED COMPUTING BASE
    DEMELLO, JT
    WISSEMAN, WS
    AIAA COMPUTERS IN AEROSPACE VII CONFERENCE, PTS 1 AND 2: A COLLECTION OF PAPERS, 1989, : 1070 - 1077
  • [34] Mobile Security and Trusted Computing
    Mitchell, Chris
    IT-INFORMATION TECHNOLOGY, 2006, 48 (06): : 321 - 326
  • [35] Experiences in Trusted Cloud Computing
    Oliver, Ian
    Holtmanns, Silke
    Miche, Yoan
    Lal, Shankar
    Hippelainen, Leo
    Kalliola, Aapo
    Ravidas, Sowmya
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 19 - 30
  • [36] TRUSTED COMPUTING AND INFORMATION SECURITY
    张焕国
    MU Yi
    China Communications, 2013, 10 (11) : 11 - 12
  • [37] Experiences in Trusted Cloud Computing
    Oliver, Ian (ian.oliver@nokia-bell-labs.com), 2018, River Publishers (06):
  • [38] Trusted Computing: An Elusive Goal
    Michael, James Bret
    COMPUTER, 2015, 48 (03) : 99 - 101
  • [39] Trusted Computing: Challenges & Solutions
    Awang, Nor Fatimah Bt
    COMPUTING & INFORMATICS, 2009, : 434 - 438
  • [40] Trusted Logging for Grid Computing
    Huh, Jun Ho
    Martin, Andrew
    APTC 2008: THIRD ASIA-PACIFIC TRUSTED INFRASTRUCTURE TECHNOLOGIES CONFERENCE, PROCEEDINGS, 2008, : 30 - 42